Digital Technology, Data, and Devices: Exam Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/92

flashcard set

Earn XP

Description and Tags

A set of 300 flashcards covering key concepts from the lecture notes on digital technology, data, and devices.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

93 Terms

1
New cards

What is digital literacy?

Digital literacy means acquiring current knowledge and understanding of computers, mobile devices, the web, and related technologies.

2
New cards

What defines a digital citizen?

A digital citizen is a person familiar with how to use technology to become an educated and productive member of the digital world.

3
New cards

What is a computer?

A computer is an electronic device that operates under the control of instructions stored in its memory and can accept and process data to produce information for future use.

4
New cards

What is the role of memory in a computer?

Memory consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data into information.

5
New cards

What is the Internet?

The Internet is a global collection of millions of computers linked together to share information.

6
New cards

Define a network.

A network is a collection of two or more computers connected to share resources.

7
New cards

What is Wi-Fi?

Wi-Fi (short for wireless fidelity) is a wireless data network technology that provides high-speed data connections to mobile devices.

8
New cards

What is a server?

A server is a powerful, high-capacity computer accessed using the Internet or other networks that stores files and provides them to users.

9
New cards

What is big data?

Big data refers to large and complex data sources that defy easy management with traditional data processing methods.

10
New cards

How do assistive technologies support users?

Assistive technologies are devices, software, or equipment that help people work around challenges such as disabilities.

11
New cards

What is privacy?

Privacy is defined as the state or condition of being free from public attention to the degree that you determine.

12
New cards

What is identity theft?

Identity theft involves using someone’s personal information, such as their name, Social Security number, or credit card number, to commit financial fraud.

13
New cards

What is digital divide?

The digital divide is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not.

14
New cards

What are the major components of an intelligent workplace?

Technology connects employees to the company's network, facilitates communications, and supports productivity through software.

15
New cards

What role does a social networking tool play in education?

Social networking tools promote school events, work cooperatively on group projects, and teach concepts.

16
New cards

What is telemedicine?

Telemedicine uses telecommunications technology to diagnose and treat patients remotely.

17
New cards

How does a digital camera function?

A digital camera creates an electronic image of an object, person, or scene.

18
New cards

What are some types of digital media players?

Digital media players are applications that let you play audio and video files.

19
New cards

What does 'convergence' mean in technology?

Convergence is the increasing integration of technological capabilities into previously unrelated devices.

20
New cards

What is assistive technology for visually impaired users?

Assistive technologies for visually impaired users include screen readers and adjustable screen settings.

21
New cards

What is the purpose of memory in a computer?

Memory holds data and programs being processed by the CPU.

22
New cards

What is the difference between RAM and ROM?

RAM is volatile memory used for temporary storage, while ROM is non-volatile memory that contains permanent data.

23
New cards

What is the function of cache memory?

Cache memory speeds up processes by storing frequently used instructions and data for quick access.

24
New cards

How do users interact with input devices?

Users issue commands and responses to input devices to perform specific tasks.

25
New cards

Define phishing.

Phishing involves deceiving individuals into revealing personal information when responding to emails or visiting malicious websites.

26
New cards

What is the main function of an operating system?

An operating system manages computer hardware and software and provides services for computer programs.

27
New cards

How does data encryption enhance security?

Encryption scrambles data during transmission, making it unreadable for anyone not authorized to access it.

28
New cards

What are the benefits of cloud storage?

Cloud storage offers accessibility, cost efficiency, and space saving by storing data remotely on the Internet.

29
New cards

What is the risk associated with e-waste?

E-waste contains toxic materials that can harm the environment if not disposed of properly.

30
New cards

What is a digital certificate?

A digital certificate verifies a user's identity with a digital key that has been signed by a trusted third party.

31
New cards

How can users reduce the risks of cyberbullying?

Users should register cautiously, manage privacy settings, and limit the information shared online.

32
New cards

What is a network hub?

A hub provides a central point for cables in a network and transfers data to all devices.

33
New cards

How do routers function in a network?

Routers connect two or more networks and direct the flow of information among them.

34
New cards

What is a peer-to-peer network?

A peer-to-peer network connects a small number of computers that can share resources directly with one another.

35
New cards

What is a firewall?

A firewall creates a barrier between a secure internal network and untrusted external networks.

36
New cards

What are modes of data transmission on the Internet?

Data can be transmitted through wired or wireless channels, usually managed by protocols such as TCP/IP.

37
New cards

What does bandwidth refer to?

Bandwidth describes the capacity of a communications channel to transmit data.

38
New cards

What is the purpose of the Domain Name System (DNS)?

The DNS translates domain names into IP addresses for routing requests to the correct computers.

39
New cards

What is a methodology for effective online searches?

Using search operators and filters helps refine web searches for more relevant results.

40
New cards

How do smart devices interact in the Internet of Things (IoT)?

Smart devices communicate with each other via the Internet and perform tasks based on user input or sensor data.

41
New cards

What does 'net neutrality' mean?

Net neutrality is the principle that all Internet traffic should be treated equally, without favoring or blocking particular services.

42
New cards

What defines a dynamic web page?

A dynamic web page regenerates its content every time it is displayed based on user interaction or data changes.

43
New cards

What safety measures should be observed while online?

Use strong passwords, enable two-factor authentication, and regularly monitor privacy settings.

44
New cards

What is the significance of video conferencing tools?

Video conferencing tools facilitate real-time communication and collaboration among remote participants.

45
New cards

What are assistive technologies for hearing-impaired individuals?

Assistive technologies for hearing-impaired users may include visual alerts and captions for audio information.

46
New cards

What is the function of an embedded computer?

An embedded computer is a dedicated component within a larger system that performs specific functions.

47
New cards

How do online banking systems function?

Online banking systems allow users to access and manage their financial accounts from any Internet-capable device.

48
New cards

What considerations should be made before using cloud storage?

Evaluate the provider's reputation, security measures, compatibility, and terms of service before using cloud storage.

49
New cards

What is data mining?

Data mining involves extracting useful patterns and knowledge from large datasets.

50
New cards

What is a digital rights management (DRM)?

DRM is a collection of technologies that control access and usage of digital content.

51
New cards

What is a wearable device?

A wearable device is a small computing device that can be worn on a user's body for various applications.

52
New cards

What are the main types of online privacy concerns?

Concerns include unauthorized data access, misuse of information, and lack of control over personal data.

53
New cards

Define assistive technology.

Assistive technology refers to devices or systems that support individuals with disabilities in their daily tasks.

54
New cards

What is the primary use of a USB flash drive?

A USB flash drive is used as portable storage for transferring files between devices.

55
New cards

What is cloud computing?

Cloud computing allows users to access and store data on remote servers via the Internet instead of a local computer.

56
New cards

What ethical responsibility do digital citizens have?

Digital citizens should respect the rights and privacy of others and use technology responsibly.

57
New cards

How does telehealth utilize technology?

Telehealth facilitates remote consultation, enabling healthcare providers to diagnose and treat patients online.

58
New cards

What types of outputs can a printer produce?

Printers can produce hard copies of text, graphics, and images in various formats.

59
New cards

How does a computer virus function?

A computer virus damages data or corrupts systems by replicating itself when executed.

60
New cards

What is the function of a switch in a network?

A switch connects devices and controls data traffic in a network, sending information only to the intended recipient.

61
New cards

What constitutes e-waste?

E-waste is discarded electronic devices, often containing toxic materials that can harm the environment.

62
New cards

What is the importance of strong passwords in online security?

Strong passwords protect against unauthorized access to accounts and sensitive information.

63
New cards

What is a lifecycle of cloud services?

Cloud service lifecycle includes stages such as provisioning, management, and decommissioning of cloud resources.

64
New cards

How have smartphones changed communication?

Smartphones integrate multiple communication methods (voice, text, video), enabling instant connectivity.

65
New cards

What does CARS checklist stand for?

CARS stands for Credibility, Accuracy, Reasonableness, and Support, used for evaluating online information.

66
New cards

What factors contribute to the digital divide?

Factors include age, income, location, and educational access to technology and the Internet.

67
New cards

Highlight the significance of ergonomics in computing.

Ergonomics is essential to ensure the comfort of users and prevent repetitive strain injuries from prolonged device use.

68
New cards

Define intelligent workplace technology.

Intelligent workplace technology enhances collaboration, communication, and productivity among employees.

69
New cards

What are the potential risks of cloud storage?

Risks include data breaches, loss of data, and dependency on service providers for data security.

70
New cards

What is the role of a network administrator?

A network administrator plans, sets up, secures, and maintains a computer network within an organization.

71
New cards

How can phishing be avoided?

Phishing can be avoided by being cautious about sharing personal information and by verifying the source of requests.

72
New cards

What is RSS?

RSS (Really Simple Syndication) allows users to regularly receive updates from their favorite websites or blogs.

73
New cards

What does a webcam do?

A webcam captures video and still images, typically for video calls or streaming and is often built into computers.

74
New cards

What is a router's primary function?

A router connects multiple networks and directs data traffic between them.

75
New cards

Explain the concept of smart devices.

Smart devices are connected to the Internet and can communicate with other devices or systems for automated tasks.

76
New cards

Define encryption in data security.

Encryption transforms data into a coded format that can only be read or accessed by authorized parties.

77
New cards

What are the most common types of storage devices?

Common storage devices include hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, and cloud storage.

78
New cards

What are the major characteristics of a WAN?

A WAN connects devices over a large geographic area and often involves leased telecommunication lines.

79
New cards

What does IoT stand for?

IoT stands for the Internet of Things, encompassing interconnected devices that communicate and exchange data.

80
New cards

What are biometric security measures?

Biometric security uses unique physical characteristics, such as fingerprints or facial recognition, for authentication.

81
New cards

What distinguishes a virtual private network (VPN)?

A VPN secures a connection over the Internet, allowing users to access remote networks while protecting data privacy.

82
New cards

Define solid-state drive (SSD).

An SSD is a storage device that uses flash memory to store data, offering faster access speeds than traditional HDDs.

83
New cards

What are the primary benefits of telecommuting?

Benefits include reduced commuting time, flexibility in work schedules, and potential cost savings for both employers and employees.

84
New cards

What is the basic functionality of a modem?

A modem enables communication between a computer and the Internet by modulating and demodulating signals.

85
New cards

How does digital citizenship relate to ethical technology use?

Digital citizenship involves understanding the ethical implications of using technology and acting responsibly online.

86
New cards

Describe the characteristics of a cloud database.

A cloud database is an online data storage system that allows for scalable access, management, and security over the Internet.

87
New cards

What is the main focus of data protection regulations?

Data protection regulations aim to safeguard personal information from misuse, unauthorized access, and data breaches.

88
New cards

What is the significance of e-waste recycling?

E-waste recycling prevents environmental pollution and conserves resources by reclaiming valuable materials from old electronics.

89
New cards

How can social media impact mental health?

Excessive use of social media can lead to negative effects, such as anxiety, depression, and disrupted sleep patterns.

90
New cards

What best practices should individuals adopt for secure online transactions?

Use secure websites (https), avoid public Wi-Fi for transactions, and monitor financial statements regularly.

91
New cards

Explain the purpose of an Acceptable Use Policy (AUP).

An AUP outlines guidelines for the proper use of organizational electronic resources and Internet access.

92
New cards

What is edge computing?

Edge computing involves processing data near the source of data generation rather than relying on a centralized data center.

93
New cards