1/123
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
network and etiquette
the term netiquette is compromised of what words?
network
a group of computers that are connected together
etiquette
refers to our behaviour
netiquette
It is a set of rules for behaving properly online.
identity theft
what is one of the many crimes that can be involved if you shar eyour first and last name?
online threat
It is deemed any malicious act that attempts to gain
access to a computer network without authorization
or permission from the owners.
online threat
These are usually done by computer hackers who
uses the World Wide Web to facilitate cybercrime.
web threats / online threats
this usse multiple types of malware and
fraud, all of which HTTP or HTTPS protocol and
components, such as links in email or Instant
messaging apps, or any malware attachments on
servers that access the Web.
botnets
online threats benefit cybercriminals, they steal info for sale and help absorb pcs into what?
phishing
happens when an email is sent from an internet
criminal disguised as an email from a legitimate,
trustworthy source. The message is meant to lure
you into revealing sensitive or confidential
information.
pharming
this happens when a hacker directs an internet user to a fake website
pharmer
what do you call the hacker in pharming?
internet scam
generally refers to someone using the internet
services or software to defraud or take advantage
of victims, typically for financial gain.
internet scam
they may contact victims and obtain info about them. a common example is lottery scams, charity fraud scams, job offer scams and online dating scams
internet robots
are also known as spiders, crawlers, and web bots. It is a
software application that is programmed to do certain
tasks.
internet robots
they are automated, they run tasks according to their instructions without a human user.
malware or malicious software
this is any program or file that is harmful to a computer user
adware (avertising supported software)
is unwanted software designed to throw advertisements
up on your screen.
spyware
is malware that secretly observes the computer user's activities
without permission and reports it to the software's author.
virus and worms
are malwares that attach to another program and, when
executed unintentionally by the user replicates itself by
modifying other computer programs and infecting them
with its own bits of code.
trojan horse or trojan
is one of the most dangerous malware types. dangerous malware types. It usually represents itself as
something useful in order to trick you.
ransomware
is a form of malware that locks you out of your device and encrypts your files then forces you to pay a ransom to get them back
spams
are unsolicited emails, instant messages
coming from recipients that are not granted
verifiable permission for the message to be sent.
spams
they can be damaging if you open or respond to it
cyberstalking
refers to the use of the internet or other
electronic device to harass or stalk individuals or
organizations.
cyberbullying
refers to the act of tormenting,
harassing, or embarrassing another
person using the internet.
spoofing
happens when someone or something
pretends to be something else to gain our
confidence, get access to our systems, steal
data, steal money, or spread malware.
firewall
this is a system designed to prevent unauthorized access to or from a private networkfi
firewall
this prevents unathorized internet users from accessing private networks connected to the itnernet, specially the intranets.
online safety
this is the act of staying online, and encompasses all tech devises which have access to the internet. this is protecting onself and others from online harm.
information
this refers to the knowledge obtained from reading. this is knowledge and helps us fulfill our daily tasks.
communication
this is an act of transmitting messages and is an important component in order to gain knowledge.
technology
this is the use of scientific knowledge, experience and resources. this is vital in communication
ict
this is the technology required for information processing.
information and communication technology
what does ict stand for?
first generation
this generation of computer uses vacuum tubes, has a very large system and the processing is very slow.
true
the first generation computer has 30 tons. 1,8k sqrft of space, 1.5k relays, 70k resistors and 10k capacitors.
1951 to 1959
from what time period did the first generation of computers go?
vacuum tube
they consist of a glass bulb and wire. the wire is used to carry data in the form of electronic signals.
electronic numerical intergrator and computer
what does eniac stand for?
eniac
this is the first electronic general purpose computer, it was turing complete and could solve a large class of numerical problems.
ENIAC
this calculates artillery firing tables for the US army's ballistic research lab and is considered a thermonuclear weapon.
second generation
the technology used in this generation of computers is a transistor, the size is smaller and the processing is faster.
1959 to 1963
from what time period did the second generation last?
transistor computer
this is now often called a second gen computer.
transistor computer
this is a computer which uses discrete transistors instead of vacuum tubes.
false, they were bulky and unreliable.
the first generation used vacuum tubes, which generated large amounts of heat- they were small and very reliable despite the heat produced.
third generation
this generation of computer has ics and incoporated many transistors and electronic circuits on a single chip. it is small and faster compared to 2nd gen.
1963-1975
how long did the third generation of computers last?
integrated circuits
what does ICs stand for?
third generation
this computer is marked by the use of ICs in place of a transistor.
true
a single IC has many transistors, resistors and capacitors along with the associated circuitry.
jack kilby
he invented the intefrated circuits which made computers smaller in size, reliable and efficient.
fourth generation
this generation of computers has a VLSI (microprocessor)
1971-1980
for how long did the fourth generation last?
fourth generation
these computers used VLSI tech.
microprocessors
VLSI is also known as its other name called what?
very large scale integrated technology
what does VLSI stand for?
intel
they are the first company to develop a microprocessor
microprocessors
they consist of a small silicon chip on which thousands of circuit are placed.
fifth generation
this generation uses technology of the AI intelligence (ULSI) and a parallel processing hardware.
1982 until present time.
for how long did the fifth generation exist?
false, 5th gen.
in the 4th gen, VLSI became ULSI.
ultra large scale integration technology.
what does ULSI stand for?
fifth gen
this generation is based on parallel processing and AI software.
ULSI
the existence of this has resulted to the production of the microprocessor chips having ten million electronic components.
vacuum tubes
this component is used to store an process data, an example of this is eniac.
transistor
this component is used to replace vacuum tubes in computers. it does not produce lots of heat and uses less power. they are faster, cheaper and smaller.
integrated circuits
this component is replacing transistors, they are more reliable and compact and cost less to manufacture.
microprocessor
this component is built onto a single silicon chip, it is 100 times smaller than eniac.
artificial intelligence
this component is still in development, some application such as voice recognition is under this.
ICT
this often deals with the use of the different technological inventions like mobile phones.
ict hub of asia
what is the philippines called as?
internet
this is the gloval system of interconnected computer networks that uses the internet protocl suite (tcp/ip)
internet
this is the network of connected computers that the web works on as well as what emails and files travel accross.
tcp or ip
what protocol suite is used to access the internet?
www or web
these are what you call the pages that you see when youre at a device and youre online.
the world wide web
this is an information system on the internet that allows documents to be connected to other documents by hypertext links, which enables the user to search for info.
hypertext links
what element allows documents to be linked to other documents?
the world wide web
this is also an internet based hypermedia initiative for global information sharing while at CERN, the european particle physics lab.
tim berners lee
he invented the worldwide web. he is a professional fellow of compsci at oxford and a prof at masachusetts institute of tech.
1989
when did tim berners lee invented the world wide web?
web 1.0 or static website
this is the first stage of the world wide web evolution. this is a flat or stationary page since it cannot be manipulated by the user.
web 2.0 or dynamic website
this allows the user to interact with the page, the user may be able to comment or create an account.
true
most websites we see are a web 2.0
web 3.0 or semantic web
this provides a framework that allows data to be shared and reused to deliver web content specifically the search engine. this is will learn about your habits.
web 2.0
what is the current version of the web?
false, web 3.0
the web 2.0 represents the next phase that will be decentralized, open and greater utility in web page.
folksonomy
this is a feature that allows users to collectively classify and find information using freely chosen keywords.
folksonomy
an example of this keyfeature is tagging at facebook, hashtags or a pound sign is typically used.
rich user experience
this feature says that the dynamic content is present and its responsive to the user's input.
rich user experience
this key feature allows a user to click on an image to zoom.
user participation
the ower of the website is not the only one who is able to put in content on their own.
long tails
these are sites that offer services and brings individuals and businesses into selling different goods like lazada and shapi.
software as service
this is where users will subscribe to a software only when needed rather than purchasing them
mass participation
this is the sharing of diverse info through universal web access.
online platforms
these are technologies that are grouped to be used as a base upon which other app processes or tech are developed.
Online platforms
they are a specially developed platform using internet tech
presentation / visualization
these are graphics program that allow you to create a slide, present a topic and etc.
zoho
this is an online project management app that helps you plan your work and keeptrack of your progress