QUIZ 1 - EMP TECH

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/85

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

86 Terms

1
New cards

Information and Communication Technology

Diverse set of technological tools and resources, both hardware and software, that

enable humans to communicate with one another

2
New cards

Premechanical, Mechanical, Electromechanical, Electronic

4 main periods of ICT

3
New cards

Pre mechanical

Humans started communicating withone another using words and pictograms

4
New cards

Mechanical

Served as the bridge between the current period and premechanical

period. During this time, the interest in automating and speeding up

numerical calculations grew.

5
New cards

Pascaline

Mechanical period is in the advent of?

6
New cards

Blaise Pascal

The first mechanical calculator was invented by?

7
New cards

Analytical Engine

What is the first programmable mechanical computer?

8
New cards

Charles Babbage

He is the father of Computers and he invented the first programmable mechanical computer

9
New cards

Ada Lovelace

She is the first computer programmer. She provided the algorithm

10
New cards

Electromechanical

○ The use of electricity for information

handling and transfer bloomed

○ This period saw the use of telegraph to

transmit information over long

distances

○ The telephone was later invented

11
New cards

Electronic

The highlight of this period is focused on the advent of solid state drives or electronic devices (Integrated circuit was introduced)

12
New cards

World Wide Web

This is the system that enables you to access hypertext documents

and other files over the internet.

13
New cards

Tim Burners Lee

He introduced World Wide Web in 1989

14
New cards

Web 1.0, 2.0, 3.0

3 stages of WWW

15
New cards

Web 1.0

Read-only web

Website pages are static, and cannot be manipulated by the user. Content is

the same for all users.

16
New cards

Web 2.0

Read and write web

Allows user to interact with the page, users may be able to comment or create a user account

We are in this era. (User experience)

17
New cards

internet and user

In Web 1.0, there is no interaction between?

18
New cards

Web 3.0

Semantic executing web

Stage where the computer can easily interpret programs

19
New cards

Convergent Technologies, Social Media, Assistive Media

3 Trends in ICT

20
New cards

Convergent Technologies

Any technologies that applies the process of convergence refer to the

meeting of different elements to make up a whole

21
New cards

Integrated Technology

different devices connected with each other

22
New cards

Social network, Bookmarking sites, Social news, Media sharing, Microblogging, Blogs and forums

6 types of social media

23
New cards

Social Network

these sites allow the creation of personal accounts to connect with other people

24
New cards

Bookmarking Sites

These are sites that allow you to store and manage links to various websites and resources

25
New cards

Social News

these are sites that allow the users to post

their own news items or links to other news sources

26
New cards

Media Sharing

these are the sites that allow the users to

upload and share multimedia content like images, music, and video

27
New cards

Microblogging

these are sites that focus on short updates from the user

28
New cards

Blogs and Forums

B_ allow the user to post his/her

content. - F_ contain question and answer discussion boards

29
New cards

Assistive media

Is a nonprofit service designed to help people who have visual and reading impairments

30
New cards

Empowerment Technology

Deals with the use of different technologies such as mobile

phones, telephone, computer, and other devices to communicate and to inform

31
New cards

Cybersecurity

Online Safety is often referred to as?

32
New cards

Online Safety

Maximizing the user’s knowledge and awareness of safety protocols, online crimes and security risks

33
New cards

Online Security

Refers to the rules that are followed and the actions that are taken to make sure

that online users and data privacy aren’t compromised by cybercriminals

34
New cards

Flaming

an online fight using

electronic messages with angry and

vulgar languages

35
New cards

Harassment

the act of repeatedly

sending nasty, mean, and insulting

messages

36
New cards

Denigration

sending or posting gossip or rumors about a person to damage his or her reputation or friendships

37
New cards

Impersonation

when someone is pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person’s reputation or friendships

38
New cards

Outing

the act of sharing someone’s secrets or embarrassing information or images online

39
New cards

Trickery

when someone is talking to a person to let him or her reveal his or her

secrets or embarrassing information then, share the sensitive information online

40
New cards

Exclusion

when one is intentionally or cruelly excluded from an online group

41
New cards

Cyberstalking

the act of repeated, intense harassment and denigration

that includes threats or creates significant fear

42
New cards

Identity Theft

all types of crimes in which someone wrongfully obtains and uses

another person’s personal data in someway that involves fraud or deception, typically for

economic gain

43
New cards

Phising

the fraudulent practice of sending emails purporting to be from reputable companies in

order to induce individuals to reveal personal information such as passwords and credit card

numbers

44
New cards

Plagiarism

presenting someone else’s work or ideas as your own, with or without their

consent, by incorporating it in your work without full acknowledgement

45
New cards

Copyright Infringement

occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed, or made into a derivative work without the permission of the copyright owner

46
New cards

Malwares, Computer Worms, Spam, Phishing

4 common internet security threats

47
New cards

Malwares

Viruses - Intends to destroy your files

c. Some IT professionals can earn by countering the viruses by creating anti-viruses (This is the shortened form of malicious software.)

48
New cards

Computer Worms

These are programs that can replicate themselves from one computer to

another in great volume and can spread themselves rapidly without

human intervention

49
New cards

Spam

They are usually junk mails sent in your email, but there are

times that they contain links that put you at risk. These links may be

connected to malwares that intend to steal your data.

50
New cards

Browser selection, Email security, Multi Factor Authentication, Firewalls

4 Internet Security Strategies

51
New cards

Online Etiquette

refers to the acceptable conduct that adheres to polite behaviors and respectful manners

52
New cards

SUM FUNCTION

Allows to sum numerical data in any number of columns or rows by selecting them or typing them in

53
New cards

SUM IF FUNCTION

Used to summate the values of cell in a range that meet the criteria that have

been specified

54
New cards

AVERAGE FUNCTION

Allows user to get the average of all the numbers in the chosen cell

55
New cards

COUNT FUNCTION

Used to count the number of chosen cells that have a number value in them

56
New cards

IF FUNCTION

Allows users to achieve a particular value if the condition has been satisfied or TRUE, or if the condition has not been satisfied or FALSE

57
New cards

AND FUNCTION

Is also a logical function in Excel, and it checkers if certain conditions or criteria are true or false

58
New cards

VLOOKUP FUNCTION

Enables users to find something on the leftmost column of the chosen range and return a value related to it

59
New cards

CONCATENATE

  • Combines two or more text strings

  • Combines the values from two or more cells into another cell

60
New cards

MAX AND MIN FUNCTION

MAX function is used to search for the highest value in an array while MIN

function is used to search for the lowest value in an array

61
New cards

Online System

Hardwares (Tangible) - Softwares (Apps, Programs)

- Internet (Information)

- Integration of hardwares, softwares, and Internet

62
New cards

Online Function

Things that technology can give us

63
New cards

Online Platforms

Different platforms and tools that the internet offers

64
New cards

Balance

Refers how elements are evenly arranged throughout the screen. No part gives too much weight

65
New cards

Emphasis

This refers to giving more weight or focus to some elements on the screen

66
New cards

Proximity and Unity

Closely related elements should be placed together so that they will be perceived as one unit

67
New cards

Proportion

Relative sizes and scales of the different elements of the design in connection to the overall design

68
New cards

Variety

Refers to how the design must contain different elements to catch the viewer’s attention

69
New cards

Infographics

Graphical representation of information and data to make the presentation visually appealing

70
New cards

Uniqueness

Infog must be innovative and should not be a rehashed version of other infographics

71
New cards

Simplicity

Remember to put only the important info in the infographics.

72
New cards

Creativity and Boldness

Information must be obvious and direct to the point

73
New cards

Minimalist Orientation

A minimalist infographic is much easier to understand

74
New cards

Shareability

Depends on the characteristic of the infographic to be understood easily

75
New cards

Joint Photographic Experts Group

Ideal for displaying complex images and photographs that includes lots of colors. Not advisable to be used for images with very few colors

76
New cards

Graphics Interchange Format

Format is used to showcase animations

77
New cards

Portable Network Graphics

Ideal for displaying images with few colors

78
New cards

Image manipulation

Process of editing and modifying an image using various methods

79
New cards

Text Overlaid on an Image

Text hover above the image

80
New cards

Text Wrapped Around Image

Text surrounds or wrapped around the image. The wrapping may follow the contours of the images, or it could be a straight line

81
New cards

Text and Image Intersect

Texts are placed within or behind images

82
New cards

Uploading

Process of saving pictures online or through an external server

83
New cards

Sharing

The act of passing pictures uploaded online

84
New cards

Image hosting

Allows user to upload images to a website, usually to a site that generally provides image hosting service

85
New cards

Multimedia

Combination of different media in one product

86
New cards

Rich media

Combination of texts, audio, video, visuals, and other interactive web elements