Q1 Flashcards

(83 cards)

1
Q

deals with the entire
information domain, which involves the
hardware, software, peripherals, and various
subspecialties.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to the branch of IT associated to
digital devices that are used to communicate or
interact with digital information.

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These are raw facts, figures, and
statistics that are encoded so that it can be
processed by the system to provide
information.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

These are the physical
components of a computer required to input
and process data.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is the result of processing
data. This is the output from the system.

A

Imformation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

These are the individuals
that supply and enter the data through
various methods.

A

People/users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

These are the actions and steps
that must be taken to ensure that the system
executes the tasks that it is expected to do.

A

Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

These are the computer programs
that provide the step-by-step instructions
which must be done to finish a task.

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is regarded as the
time period in which human started
communicating with the use of language or
simple picture drawings known as petroglyphs.

A

Pre Mechanical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This age is where the connections between our
ancestors and our current technology can be
seen.

A

Mechanical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Advancements in the field of information
technology was helped by every one of these
important revolutionizing technologies.

A

Electromechanical age

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is the current era in which
modern people live in.

A

Electronic age

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

started off as a military research
project in the 1960’s. The internet was used to
help soldiers share information during the Cold
war.

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The internet has its history anchored on the project started
by the United States Government called?

A

DARPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

established in 1958 formerly known as ARPA then headed by J.C.R Licklider in 1962.

A

ARPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

head of the
information processing office
in DARPA with Larry
Roberts from MIT initiated
the project called ARPANET
to build a working computer
network.

A

Robert Taylor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

essentially was the pioneering technical
contributor to what we know today as the Internet.

A

Arpanet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is the evolution of Web1.0 by adding dynamic
webpages, the user is able to see a website differently
from others. Examples of such websites includes social
networking sites, blogs, wikis, video sharing sites,
hosted services, and web applications.

A

Web 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

(also known as a flat page or
stationary page) in the sense that the page is “as is” and
cannot be manipulated by the user.

A

Web 1.0 or static

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The aim of this is to have machines understand the
user’s preferences to be able to deliver web content
specifically targeting the user.

A

Web 3.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Increased number of people are now
working from home using their
computers.

A

Additional Jobs and Employment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

People today have easier access to their
bank accounts using online banking
services without the need to visit the
bank.

A

Convenience in Banking and Finance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Communication is very essential in
making a small business grow.
Instead of going to various places,
business now use technology to
communicate with their clients or
customers.

A

Easier and Faster Business Transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Today, there are already small and
wireless devices that can be worn by
patients, as wells as smartphone apps,
that can monitor and keep track of one’s
health.

A

Health Awareness and Better Healthcare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
ICT helps both students and teachers by providing an easier way of learning and teaching though the introduction of modern technologies such as laptops, desktops, and more.
Improved and Advanced Education
25
improved the flow of information which helps public safety agencies. With ICT, they are able to respond quickly in critical situations, operations, and manhunt.
Increased Safety and Security
26
Almost everyone, from toddlers to adults, are now using gadgets and other ICT for entertainment and leisure.
Wide Range of Entertainment
27
For business and companies, the purchase and maintenance of ICT hardware and software come at a high cost. It can be quite expensive to purchase and maintain.
Additional Cost
28
People who are exposed to gadgets may adopt a lifestyle that is characterized by inactivity and lack of physical exercise.
Health Problems
29
Technology has also brought along privacy issues. During the past years, data protection became a hot issue among the public, government, and large companies.
Invasion of Privacy
30
This results to people being too focused on using their gadgets. Nowadays, a lot of relationships start and develop from online conversations making people more individualistic and introverted.
Less interaction
31
The internet has now become the major tool or source of information, however checking the credibility of any information is still needed.
Reliability of Information
32
In spite of additional new jobs, especially those under the IT category, ICT also brought unemployment to some people. This is because manual operations are now being replaced by automation.
Unemployment
33
Installing operating system updates Starting, restarting, and shutting down a computer system Understanding basic computer hardware components and terminologies Using Help and Troubleshooting basic computer programs.
Basic computer skills
34
Adding an attachment to a message Composing, sending, replying, and forwarding messages Copy, paste, and print messages Downloading and attachment from an email messages Organizing Email folders Using a common e-mail application
Electronic Communication Skills
35
Connecting to the internet Downloading files from the web Installing and upgrading a web browser Keeping personal information safe while using the internet Navigating through different websites Searching queries on the web Setting up a password on a network Setting up a router and other similar configurations Setting up and securing an internet connection Using a browser and its elements Using a search engine and directories to find information on the web.
Internet Skills
36
Copy, Cut, Rename, and Delete files Creating specific type of document and saving it in the desired location Printing a document Retrieving an existing document from a specific file location Select, copy, cut, paste, and delete text in a document.
Productivity Software Proficiency
37
is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange user - generated content.
Social media
38
These are sites that allow you to connect with other people with the same interests or background.
Social network
39
These are sites that allow you to store and manage links to various websites and resources.
Bookmarking Sites
40
These are sites that allow users to post their own news items or links to other news sources. These users can also comment on the post and comments may also be ranked.
Social news
41
These are sites that focus on short updates from the user. Those subscribed to the user will be able to receive these updates.
Microblogging
41
These are sites that allow you to upload and share media content like images, music, and video.
Media sharing
42
The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices’ capability to do tasks that were originally found in personal computers.
Mobile Technologies
43
These websites allow users to post their content. Other users are able to comment on the said topic.
Blogs and Forums
43
is the latest generation of connectivity after 4G or LTE.
5G
44
Business processes will continuously become automated with the use of software.
Automation
45
is a technology used to record and secure transactions through encryption.
Blockchain
46
refers to technologies used to create more engaging digital experiences including VR and AR.
Extended reality
47
is an open-source service that is available to the public to obtain information and is interconnected worldwide.
World Wide Web
48
most web pages were static and cannot be manipulated or edited by the users.
Web 1.0/static
49
is referred to as the semantic web or intelligent web.
Web 3.0/semantic
50
is not a new version of the World Wide Web rather it describes a wave of web applications that followed the dot.com bubble of 1997 - 2001 and began to appear around 2004
Web 2.0/dynamic
51
Allows users to categorize and classify / arrange information using freely chosen keywords (e.g tagging). Popular with social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with the pound sign (#). This is also referred as the hashtag.
Folksonomy
52
Content is dynamic and is responsive to user’s input.
Rich User Experience
53
The owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comments, reviews, and evaluation.
User Participation
54
Users will subscribe to a software only when needed rather than purchasing them. This is a cheaper option if you do not always need to use a software. For instance, Google Docs is a free web-based application that allows the user to create and edit word processing and spreadsheet documents online.
Software as a Service
55
Diverse information sharing through universal web access. Since most users can use the internet, Web 2.0’s content is based on people from various cultures.
Mass participation
56
These are described as personal diaries or journals on the web. It may cover different topics and express many opinions, a commentary on current events, a collection of memories or thoughts and a place to post photos and comments.
Blogging
56
is a digital medium that consists of an episodic series of audio, digital radio, PDF or epub files.
Podcasting
57
is the process of collecting, organizing, and displaying information relevant to a particular topic of area of interest.
Curating
57
is and electronic or digital compilation exhibiting abilities, demonstrating achievements and growth, permitting for flexible expression, and consenting access from varied interested parties.
E - Portfolio
58
In Information systems, a tag is a non-hierarchical keyword or term assigned to a piece of information. This kind of metadata helps describe an item and allows it to be found again by browsing or searching.
Tagging
59
is basically a page or collection of web pages designed to enable any user - private or public who accesses them to collaboratively build up a body of content on particular topics of interests and modify them easily.
Wiki
60
also called mobile social networking, is a form of blogging that limits the size of each message or post to less than 200 characters, and publish them via web browser-based services, email, or mobile phones.
micro blogging
61
A malicious program designed to replicate itself and transfer from one computer to another when executed.
Virus
62
A malicious Program that transfers from one computer to another without human intervention.
Worm
63
A program designed to send you ads usually in the form of pop-ups
Adware
64
A Malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected.
Trojan
65
Tricks the user into posing that it is a security software. It asks for the user to pay to improve their security but in reality they are not protected at all.
Rogue security software
66
A program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing through Keylogging*.
spyware
67
refers to the act of embarrassing, harassing, or bullying a person using the internet and communication technologies.
Cyberbullying
68
refers to the act of stalking and repeatedly harassing someone else through internet or other electronic devices.
Cyberstalking
69
is the act of gaining access or controlling one’s account or computer.
Hacking
70
happens when someone steal another person’s personal information and use them without permission.
Identity theft
71
might include texts, photos, and videos that are illegal, offensive, or inappropriate for some age groups.
Inappropriate content
72
refer to a network of compromised computers controlled by a robot that performs malicious acts for its creator.
Internet bots/botnets
73
refer to the act of deceiving a user through fabricated promises or stories, typically, to gain money from the victim.
Internet Scams
74
happens when someone manipulates, exploits, or abuses a minor online.
Online grooming
75
uses malicious codes that direct users to a fake website to collect personal information.
Pharming
76
is the act of sending an email claiming to be an established enterprise asking for personal information. It is almost similar to pharming.
Phishing
77
is the act of pretending to be a legitimate business, a neighbor, or someone else.
Spoofing
78
refer to unwanted and unsolicited messages, often through email. They can also be found on internet forums, text messages, blog comments, and social media.
Spam