1/92
A set of 300 flashcards covering key concepts from the lecture notes on digital technology, data, and devices.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is digital literacy?
Digital literacy means acquiring current knowledge and understanding of computers, mobile devices, the web, and related technologies.
What defines a digital citizen?
A digital citizen is a person familiar with how to use technology to become an educated and productive member of the digital world.
What is a computer?
A computer is an electronic device that operates under the control of instructions stored in its memory and can accept and process data to produce information for future use.
What is the role of memory in a computer?
Memory consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data into information.
What is the Internet?
The Internet is a global collection of millions of computers linked together to share information.
Define a network.
A network is a collection of two or more computers connected to share resources.
What is Wi-Fi?
Wi-Fi (short for wireless fidelity) is a wireless data network technology that provides high-speed data connections to mobile devices.
What is a server?
A server is a powerful, high-capacity computer accessed using the Internet or other networks that stores files and provides them to users.
What is big data?
Big data refers to large and complex data sources that defy easy management with traditional data processing methods.
How do assistive technologies support users?
Assistive technologies are devices, software, or equipment that help people work around challenges such as disabilities.
What is privacy?
Privacy is defined as the state or condition of being free from public attention to the degree that you determine.
What is identity theft?
Identity theft involves using someone’s personal information, such as their name, Social Security number, or credit card number, to commit financial fraud.
What is digital divide?
The digital divide is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not.
What are the major components of an intelligent workplace?
Technology connects employees to the company's network, facilitates communications, and supports productivity through software.
What role does a social networking tool play in education?
Social networking tools promote school events, work cooperatively on group projects, and teach concepts.
What is telemedicine?
Telemedicine uses telecommunications technology to diagnose and treat patients remotely.
How does a digital camera function?
A digital camera creates an electronic image of an object, person, or scene.
What are some types of digital media players?
Digital media players are applications that let you play audio and video files.
What does 'convergence' mean in technology?
Convergence is the increasing integration of technological capabilities into previously unrelated devices.
What is assistive technology for visually impaired users?
Assistive technologies for visually impaired users include screen readers and adjustable screen settings.
What is the purpose of memory in a computer?
Memory holds data and programs being processed by the CPU.
What is the difference between RAM and ROM?
RAM is volatile memory used for temporary storage, while ROM is non-volatile memory that contains permanent data.
What is the function of cache memory?
Cache memory speeds up processes by storing frequently used instructions and data for quick access.
How do users interact with input devices?
Users issue commands and responses to input devices to perform specific tasks.
Define phishing.
Phishing involves deceiving individuals into revealing personal information when responding to emails or visiting malicious websites.
What is the main function of an operating system?
An operating system manages computer hardware and software and provides services for computer programs.
How does data encryption enhance security?
Encryption scrambles data during transmission, making it unreadable for anyone not authorized to access it.
What are the benefits of cloud storage?
Cloud storage offers accessibility, cost efficiency, and space saving by storing data remotely on the Internet.
What is the risk associated with e-waste?
E-waste contains toxic materials that can harm the environment if not disposed of properly.
What is a digital certificate?
A digital certificate verifies a user's identity with a digital key that has been signed by a trusted third party.
How can users reduce the risks of cyberbullying?
Users should register cautiously, manage privacy settings, and limit the information shared online.
What is a network hub?
A hub provides a central point for cables in a network and transfers data to all devices.
How do routers function in a network?
Routers connect two or more networks and direct the flow of information among them.
What is a peer-to-peer network?
A peer-to-peer network connects a small number of computers that can share resources directly with one another.
What is a firewall?
A firewall creates a barrier between a secure internal network and untrusted external networks.
What are modes of data transmission on the Internet?
Data can be transmitted through wired or wireless channels, usually managed by protocols such as TCP/IP.
What does bandwidth refer to?
Bandwidth describes the capacity of a communications channel to transmit data.
What is the purpose of the Domain Name System (DNS)?
The DNS translates domain names into IP addresses for routing requests to the correct computers.
What is a methodology for effective online searches?
Using search operators and filters helps refine web searches for more relevant results.
How do smart devices interact in the Internet of Things (IoT)?
Smart devices communicate with each other via the Internet and perform tasks based on user input or sensor data.
What does 'net neutrality' mean?
Net neutrality is the principle that all Internet traffic should be treated equally, without favoring or blocking particular services.
What defines a dynamic web page?
A dynamic web page regenerates its content every time it is displayed based on user interaction or data changes.
What safety measures should be observed while online?
Use strong passwords, enable two-factor authentication, and regularly monitor privacy settings.
What is the significance of video conferencing tools?
Video conferencing tools facilitate real-time communication and collaboration among remote participants.
What are assistive technologies for hearing-impaired individuals?
Assistive technologies for hearing-impaired users may include visual alerts and captions for audio information.
What is the function of an embedded computer?
An embedded computer is a dedicated component within a larger system that performs specific functions.
How do online banking systems function?
Online banking systems allow users to access and manage their financial accounts from any Internet-capable device.
What considerations should be made before using cloud storage?
Evaluate the provider's reputation, security measures, compatibility, and terms of service before using cloud storage.
What is data mining?
Data mining involves extracting useful patterns and knowledge from large datasets.
What is a digital rights management (DRM)?
DRM is a collection of technologies that control access and usage of digital content.
What is a wearable device?
A wearable device is a small computing device that can be worn on a user's body for various applications.
What are the main types of online privacy concerns?
Concerns include unauthorized data access, misuse of information, and lack of control over personal data.
Define assistive technology.
Assistive technology refers to devices or systems that support individuals with disabilities in their daily tasks.
What is the primary use of a USB flash drive?
A USB flash drive is used as portable storage for transferring files between devices.
What is cloud computing?
Cloud computing allows users to access and store data on remote servers via the Internet instead of a local computer.
What ethical responsibility do digital citizens have?
Digital citizens should respect the rights and privacy of others and use technology responsibly.
How does telehealth utilize technology?
Telehealth facilitates remote consultation, enabling healthcare providers to diagnose and treat patients online.
What types of outputs can a printer produce?
Printers can produce hard copies of text, graphics, and images in various formats.
How does a computer virus function?
A computer virus damages data or corrupts systems by replicating itself when executed.
What is the function of a switch in a network?
A switch connects devices and controls data traffic in a network, sending information only to the intended recipient.
What constitutes e-waste?
E-waste is discarded electronic devices, often containing toxic materials that can harm the environment.
What is the importance of strong passwords in online security?
Strong passwords protect against unauthorized access to accounts and sensitive information.
What is a lifecycle of cloud services?
Cloud service lifecycle includes stages such as provisioning, management, and decommissioning of cloud resources.
How have smartphones changed communication?
Smartphones integrate multiple communication methods (voice, text, video), enabling instant connectivity.
What does CARS checklist stand for?
CARS stands for Credibility, Accuracy, Reasonableness, and Support, used for evaluating online information.
What factors contribute to the digital divide?
Factors include age, income, location, and educational access to technology and the Internet.
Highlight the significance of ergonomics in computing.
Ergonomics is essential to ensure the comfort of users and prevent repetitive strain injuries from prolonged device use.
Define intelligent workplace technology.
Intelligent workplace technology enhances collaboration, communication, and productivity among employees.
What are the potential risks of cloud storage?
Risks include data breaches, loss of data, and dependency on service providers for data security.
What is the role of a network administrator?
A network administrator plans, sets up, secures, and maintains a computer network within an organization.
How can phishing be avoided?
Phishing can be avoided by being cautious about sharing personal information and by verifying the source of requests.
What is RSS?
RSS (Really Simple Syndication) allows users to regularly receive updates from their favorite websites or blogs.
What does a webcam do?
A webcam captures video and still images, typically for video calls or streaming and is often built into computers.
What is a router's primary function?
A router connects multiple networks and directs data traffic between them.
Explain the concept of smart devices.
Smart devices are connected to the Internet and can communicate with other devices or systems for automated tasks.
Define encryption in data security.
Encryption transforms data into a coded format that can only be read or accessed by authorized parties.
What are the most common types of storage devices?
Common storage devices include hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, and cloud storage.
What are the major characteristics of a WAN?
A WAN connects devices over a large geographic area and often involves leased telecommunication lines.
What does IoT stand for?
IoT stands for the Internet of Things, encompassing interconnected devices that communicate and exchange data.
What are biometric security measures?
Biometric security uses unique physical characteristics, such as fingerprints or facial recognition, for authentication.
What distinguishes a virtual private network (VPN)?
A VPN secures a connection over the Internet, allowing users to access remote networks while protecting data privacy.
Define solid-state drive (SSD).
An SSD is a storage device that uses flash memory to store data, offering faster access speeds than traditional HDDs.
What are the primary benefits of telecommuting?
Benefits include reduced commuting time, flexibility in work schedules, and potential cost savings for both employers and employees.
What is the basic functionality of a modem?
A modem enables communication between a computer and the Internet by modulating and demodulating signals.
How does digital citizenship relate to ethical technology use?
Digital citizenship involves understanding the ethical implications of using technology and acting responsibly online.
Describe the characteristics of a cloud database.
A cloud database is an online data storage system that allows for scalable access, management, and security over the Internet.
What is the main focus of data protection regulations?
Data protection regulations aim to safeguard personal information from misuse, unauthorized access, and data breaches.
What is the significance of e-waste recycling?
E-waste recycling prevents environmental pollution and conserves resources by reclaiming valuable materials from old electronics.
How can social media impact mental health?
Excessive use of social media can lead to negative effects, such as anxiety, depression, and disrupted sleep patterns.
What best practices should individuals adopt for secure online transactions?
Use secure websites (https), avoid public Wi-Fi for transactions, and monitor financial statements regularly.
Explain the purpose of an Acceptable Use Policy (AUP).
An AUP outlines guidelines for the proper use of organizational electronic resources and Internet access.
What is edge computing?
Edge computing involves processing data near the source of data generation rather than relying on a centralized data center.