Living in the IT Era - GEED 012 Review Flashcards

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/90

flashcard set

Earn XP

Description and Tags

These flashcards cover key vocabulary and concepts from the course "Living in the IT Era", including netiquette, cybercrimes, and elements of graphic design, providing definitions and explanations for each term.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

91 Terms

1
New cards

Netiquette

Network etiquette; the proper way to communicate in an online environment.

2
New cards

Golden Rule

Treat others as you wish to be treated.

3
New cards

Screaming in Typed Messages

Typing in all caps, considered shouting and unprofessional.

4
New cards

Proofreading

Reviewing messages for errors before sending.

5
New cards

Cybercrime

Crimes in which a computer is the object or tool for committing an offense.

6
New cards

Republic Act No. 10175

Philippine law addressing issues related to cybercrime.

7
New cards

Cybercriminals

Individuals who exploit technology for malicious purposes.

8
New cards

Data Privacy Act of 2012 (RA 10173)

Law protecting personal information from unauthorized processing.

9
New cards

Personal Information Controller

Entity controlling the processing of personal data.

10
New cards

Sensitive Personal Information

High-confidential personal data requiring protection.

11
New cards

Copyright

Exclusive legal right to reproduce, publish, or sell creative works.

12
New cards

Plagiarism

Using someone else's work or ideas without proper attribution.

13
New cards

Computer Addiction

Excessive use of computers and the internet, impacting daily functions.

14
New cards

Hacking

Unauthorized access to computers or networks to manipulate data.

15
New cards

Malware

Malicious software designed to damage or gain unauthorized access.

16
New cards

Phishing

Fraudulent attempt to obtain sensitive information by deception.

17
New cards

Ransomware

Malware that locks or encrypts files and demands payment for access.

18
New cards

Spam

Unsolicited messages sent over the internet, often for advertising.

19
New cards

Virus

Malicious program designed to replicate and infect computers.

20
New cards

Worms

Self-replicating malware that spreads through computer networks.

21
New cards

Wi-Fi Eavesdropping

Listening to unencrypted communications over a wireless network.

22
New cards

Artificial Intelligence

Simulation of human intelligence processes by machines.

23
New cards

Big Data

Large and complex data sets that require advanced processing tools.

24
New cards

Automation

Use of technology to perform tasks without human intervention.

25
New cards

Digital Age

Period marked by the rise of digital technology and the internet.

26
New cards

Cloud Computing

Internet-based storage, management, and processing of data.

27
New cards

Mobile Computing

Use of portable computing devices and wireless networks.

28
New cards

Emerging Technologies

Innovative technologies currently developing or will be developed.

29
New cards

Graphic Design

Art of combining text and images to communicate a message visually.

30
New cards

Typography

The art and technique of arranging type to make written language legible.

31
New cards

Color Theory

Study of color mixing and the visual effects of color combinations.

32
New cards

Vector Image

Image that maintains quality when resized, using shapes and lines.

33
New cards

Raster Image

Image made of pixels that loses resolution when scaled.

34
New cards

ISO

Measure of a camera's sensitivity to light, affecting exposure.

35
New cards

Shutter Speed

Duration the camera's shutter is open to allow light in.

36
New cards

Aperture

Opening in a camera lens that controls light exposure.

37
New cards

Exposure

Amount of light that reaches the camera sensor or film.

38
New cards

Landscape Photography

Art of capturing outdoor settings and environments.

39
New cards

Portrait Photography

Photography aimed at capturing the personality and mood of a person.

40
New cards

Documentary Photography

Capturing real-life events or situations without manipulation.

41
New cards

Infographic

Visual representation of information or data.

42
New cards

Data Visualization

Graphic representation of data to communicate information clearly.

43
New cards

Layout

Arrangement of visuals and text within a design to facilitate communication.

44
New cards

Branding

Creating a unique name and image for a product in consumers' minds.

45
New cards

Identity

Visual representation of a brand including design elements.

46
New cards

Proximity

Placing related design elements near each other.

47
New cards

White Space

Empty space in design to improve readability and focus.

48
New cards

Alignment

Arranging elements to create a clean and organized layout.

49
New cards

Contrast

Differences in color and light to highlight key areas.

50
New cards

Repetition

Using the same design elements consistently for unity.

51
New cards

Complementary Colors

Colors opposite each other on the color wheel.

52
New cards

Analogous Colors

Colors that are next to each other on the color wheel.

53
New cards

CMYK

Color model used in color printing representing Cyan, Magenta, Yellow, and Key (Black).

54
New cards

RGB

Color model used for digital displays representing Red, Green, and Blue.

55
New cards

5G

Fifth generation of mobile networks, enabling faster wireless communication.

56
New cards

Augmented Reality

Technology that overlays digital information onto the real world.

57
New cards

Virtual Reality

Computer-generated simulation of a 3D environment for user interaction.

58
New cards

Blockchain

Decentralized digital ledger technology for secure transactions.

59
New cards

IoT

Network of physical objects connected to the internet for data exchange.

60
New cards

Cyberbullying

Use of technology to harass, threaten, or intimidate another person.

61
New cards

Cybersex

Use of the internet for sexual acts and communication.

62
New cards

Child Pornography

Illegal depiction of minors engaged in sexual activities.

63
New cards

Cyber Defamation

False statements made online that harm a person's reputation.

64
New cards

Audio-Visual Elements

Use of sound and imagery in multimedia presentations.

65
New cards

Graphic User Interface (GUI)

Visual way of interacting with a computer using items like windows and icons.

66
New cards

User Experience (UX)

Overall experience of a person using a product or service.

67
New cards

Human-Computer Interaction (HCI)

Study of how people interact with computers and design technologies.

68
New cards

Digital Footprint

The trail of data left behind by users on digital platforms.

69
New cards

Content Management System (CMS)

Software for creating and managing digital content.

70
New cards

Search Engine Optimization (SEO)

Process of optimizing web content to rank higher in search engine results.

71
New cards

Affiliate Marketing

Performance-based marketing where a business rewards affiliates for referrals.

72
New cards

E-commerce

Buying and selling of goods or services using the internet.

73
New cards

Online Privacy

Right to keep personal information secure and private online.

74
New cards

Device Security

Protection of devices from unauthorized access or damage.

75
New cards

Digital Literacy

Ability to effectively find, evaluate, and communicate information online.

76
New cards

Information Overload

State of being overwhelmed by the amount of information available.

77
New cards

Social Media Influence

Impact social media has on people's opinions and behavior.

78
New cards

Telecommuting

Working from a location other than the central office, usually at home.

79
New cards

Distance Learning

Education conducted over the internet instead of in a traditional classroom.

80
New cards

Wearable Technology

Devices worn on the body to collect data and communicate.

81
New cards

Digital Citizenship

Responsible use of technology by individuals to engage in society.

82
New cards

Privacy Policy

Legal document explaining how personal information will be used.

83
New cards

Data Breach

Incident where unauthorized access to confidential data occurs.

84
New cards

User Agreement

Contract outlining the rights and responsibilities of system users.

85
New cards

Web Development

Creation and maintenance of websites and applications.

86
New cards

Digital Marketing

Promotion of products or services through digital channels.

87
New cards

Community Management

Building and maintaining relationships in online communities.

88
New cards

Market Research

Process of gathering and analyzing information about consumers.

89
New cards

Lead Generation

Initiatives to attract and convert potential customers.

90
New cards

Product Development

Creating a new product or improving an existing one.

91
New cards

Customer Relationship Management (CRM)

Strategies to manage interactions with customers and potential clients.