1/44
Flashcards for ICT C3 - Year 9 - 2024 Exam Questions
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Operating System (OS)
To control the computer's hardware and manage resources
Early computer instructions
Via punch cards
Kernel (in OS)
The core component that interacts with computer hardware
RAM's role
Temporarily holding data for the CPU to access
Data in RAM when computer is off
It gets wiped clean
Google Docs
Not an operating system
Embedded Systems
They control specific functions
Device Drivers
They enable hardware to work on a variety of systems
Digital Etiquette
Netiquette
Sending rude emails and messages online
Flaming
Risks associated with changing human nature using technology
Ethical Risks
Central Challenge of Navigating Social Media
Determining what is right and wrong
Integration of technology and biology to enhance human abilities
Human Enhancement
"Cyborg" refers to
Human-Machine Hybrids
HTML commonly used for
Building web pages
HTML stands for
Hypertext Markup Language
CMS stands for
Content Management System
Skills NOT required to use a Content Management System like WordPress
Coding skills in programming languages
Significance of Open-Source CMS
They are constantly being improved by the community
CMS known for its ability to power a large portion of the internet
WordPress
Characteristic of Cyberbullying
Act quietly and anonymously behind a screen
A message with the subject line saying "naked pictures of you", refers to
Sextortion
Ethical Statement Regarding a Nasty Video Clip Uploaded on Social Media
Being watched by many does not make it right
What should you do if a friend of yours is a victim of cyberbullying?
All the above
Golden Rule 'Talk' in the context of cyberbullying
Talk with the victim on the issue and try to convince him to report to an adult
Offensive and inappropriate edited photo posted online is considered
Cyberbullying
Someone online asks you for inappropriate pictures. What should you do?
Block and report the person
A real big relief to victims of sextortion
When someone they really trust knows what they are going through
What does cybercrime involve?
All the above
Software engineers try to improve their software by
Make the software as secure as possible
Multitasking
Running several programs simultaneously
Why were device drivers introduced?
To aid the operating system in controlling external devices
Before the graphical user interface, how did users mainly interact with their computers?
Through the command line interface
What helps the Operating System manage multiple tasks efficiently?
Time slicing
A primary function of a Content Management System
Organizing and managing content
Two-Factor Authentication in CMS security
Adding an extra layer of security with a second password
One way to ensure clear communication in online messages
Rereading the message and checking tone and spelling
Primary goal of a DDoS attack
Overloading and disrupting a target's online services
Main objective of a phishing attack
Deceptively obtaining sensitive information from individuals
A recommended step to avoid getting hacked?
All of the above
Section A (video editing window) is used to
Import video clips and pictures which can later be used in the project
Section B (video editing window) is used to:
Insert video clips and pictures lined up as they would appear in the final video
Section C (video editing window) is used to:
Use this section of the window to preview the final video
Tool used to zoom out left of a photo on the timeline
Motion
Effect to apply on a picture to show as an old vintage photo
Sepia