LIE CH2 Flashcards

(46 cards)

1
Q

has undergone a decisive transformation in a short period
thanks to the technological developments that underpin it.

A

The telecommunications sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a fundamental and innovative revolution
that has touched human life considerably in the last century.

A

information technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

impacts of information technology in Society

A
  1. IT IN EDUCATION
  2. IT IN HEALTH SYSTEM
  3. IT IN POLITICS
  4. IT IN ECONOMY
  5. IT IN THE SOCIAL ASPECT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is defined as “the science and activity of using computers and other electronic equipment to store and send information.”

A

INFORMATION TECHNOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

sometimes referred to as infrastructure automation

A

IT Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is the use of software to create repeatable instructions and processes to replace or reduce human interaction with IT systems.

A

IT Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

works within the confines of those instructions, tools, and frameworks to carry out the tasks with little to no human intervention.

A

Automation Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is key to IT optimization and digital transformation.

A

Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is all about heavy lifting, whether on bare metal or in a private, hybrid, or public cloud.

A

provisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

can help you move from commit and build to testing to deployment in a proven, trusted, and codified manner.

A

deployment automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

allows you to deploy your applications with certainty, configure needed
services from the start, and get your apps and their artifacts up and running—all via a common, transparent approach that’s understandable by all of your IT staff.

A

IT Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is an important reason for automating an industrial operation.

A

worker safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The technology that powered the industrial revolution created the

A

industrial society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is an ever present part of our daily lives and the amount of time we spend interacting with our personal technology devices is only increasing as we feel the need to stay connected.

A

technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

are developments in information technology, which quickly gain ground and are commonly used by many.

A

IT trends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List the IT trends of today

A
  1. Artificial Intelligence
  2. Internet Of Things
  3. Cybersecurity
  4. Alternatives to Cloud Computing
  5. 5G Network
  6. Virtual Reality
  7. Augmented Reality
  8. Chatbot
  9. Blockchain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

are capable of processing data at an amazing speed and accuracy.

A

AI-powered machines and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is one of the most commonplace types of errors and AI solutions don’t suffer from that.

20
Q

What are the latest cybersecurity threats?

A
  1. Phishing
  2. Ransomware
  3. Cryptojacking
  4. Cyber-Physical Attack
  5. State-Sponsored Attacks
  6. IoT Attacks
21
Q

It’s the practice of bringing data and computation closer to the location where it’s needed.

A

edge computing

22
Q

It’s built to bypass the issue with cloud computing not able to process huge amount of data in time.

A

fog computing

23
Q

This is great for managing data flood in a networked environment.

A

fog computing

24
Q

is an initiative brought by the inventor of the web itself, Tim Berners-Lee. This method provides users with complete control over their data by placing them into a container.

A

Project Solid

25
A service initiative that aims to provide everyone with the needed bandwidth to process their data at tremendous speed.
mesh networks
26
A cloud storage service which does not require servers. It follows the principle of torrents where files are divided and shared in tiny pieces among each member.
resilio
27
Combines the blockchain technology with the file-sharing property similar to torrents. This is a great way of distributing videos without the complex RDM schemes.
LBRY
28
are the next big thing in mobile internet connectivity.
5G networks
29
immerses the user into an environment. By stimulating their hearing and vision, it makes them feel as if they are experiencing the simulated environment firsthand.
virtual reality
30
enhances a real-life view with digital images. This is commonly an app that works with camera lenses. Usually, the overlay images blend into reality in a way that users can easily tell them apart.
Augmented reality
31
is a program whose main function is to simulate conversation with humans.
chatbot
32
in its most bare form, is a data which you can only add to. It’s like creating a link of blocks to form a chain, hence the name.
blockchain
33
The technology is usually related to cryptocurrency such as Bitcoin but it’s more than that.
blockchain
34
Some of the major ethical issues faced by Information Technology (IT) are:
1. Personal Privacy 2. Access Right 3. Harmful Actions 4. Patents 5. Copyright 6. Trade Secrets 7. Liability 8. Piracy
35
becomes a high priority issue for the IT and cyberspace with the great advancement in technology.
access right
36
is used to determine whether the user is an intruder or an appropriate user.
intrusion detection system
37
refers to the damage or negative consequences to the IT such as loss of important information, loss of property, loss of ownership, destruction of property and undesirable substantial impacts.
harmful actions
38
works as a very powerful legal tool in protecting computer software, both before a security breach and surely after a security breach.
copyright law
39
secures something of value and usefulness. This law protects the private aspects of ideas which is known only to the discover or his confidants.
trade secret
40
is an activity in which the creation of illegal copy of the software is made. It is entirely up to the owner of the software as to whether or not users can make backup copies of their software.
piracy
41
is an essential element for maintaining humanity and social responsibilities and relationships.
privacy
42
is referred as automated systems for processing and storing huge junks of data and circulating information.
information technology
43
when public uses internet they generate huge junks of data when surfing online.
big data
44
providing a set of rules and regulations in the initial stage of the design process keeping in mind certain ethics and values.
design methods
45
It has been used as a means of protecting data for a very long time.
cryptography
46
it is a means of authenticating and authorizing individuals or groups to have access to their accounts or systems in an organization through network.
identity management