SHS_ETECH | Q1 EXAMINATIONS REVIEWER

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/269

encourage image

There's no tags or description

Looks like no tags are added yet.

270 Terms

1
New cards

Information and Communications Technology (ICT)

Refers to all technology that is used to handle telecommunication and access information. 

2
New cards

Wireless Fidelity (WiFi)

Technology for radio wireless local area networking of devices based on the IEEE 802.11 standards. 

3
New cards

Bluetooth

Wireless technology standard for exchanging data over short distances from fixed and mobile devices, and building personal area networks (PANs). 

4
New cards

Infrared Radiation Wireless (IR) 

The use of wireless technology in devices or systems that convey data through infrared (IR) radiation. 

5
New cards

4G 

Generation of broadband cellular network technology, succeeding 3G. Potential and current applications include amended mobile web access, IP telephony, gaming services, high-definition mobile TV, video conferencing, and 3D television.

6
New cards

5G

Next great leap in speed for wireless devices. This speed includes both the rate mobile users can download data to their devices and the latency, or lag, they experience between sending and receiving information. 

7
New cards

GSM

A standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation digital cellular networks used by mobile devices such as tablets. 

8
New cards

GPRS

Packet oriented mobile data standard on the 2G and 3G cellular communication network's global system for mobile communications (GSM). Data Services – data networking services for mobile phones. 

9
New cards

Dial-up Services 

Data networking services using modems and telephone lines.

10
New cards

Virtual Private Networks (VPN)

Extends across a public or shared network, and acts like a tunnel so you can exchange data securely and anonymously across the internet as if you were connected directly to a private network.

11
New cards

Wireless Access Point

Allows wireless devices to connect to the wireless network. 

12
New cards

WIreless router

Hardware devices that Internet service providers use to connect you to their cable or xDSL Internet network. 

13
New cards

Mobile Hotspot

A common feature on smartphones with both tethered and untethered connections. 

14
New cards

Portable Wi-Fi hotspot

A small device that uses cellular towers that broadcast high-speed 3G or 4G broadband signals.

15
New cards

Data Services

A service provider that enables data access on demand to users regardless of their geographic location.

16
New cards

1G - First Generation

Generation of commercial cellular network was introduced in the late 70's with fully implemented standards being established throughout the 80's. 

17
New cards

2G - Second Generation

Main motive of this generation was to provide secure and reliable communication channel. 

18
New cards

3G - Third Generation

Web browsing, email, video downloading, picture sharing and other Smartphone technology were introduced in this generation.

19
New cards

4G - Fourth Generation

This generation’s purpose is to provide high speed, high quality and high capacity to users while improving security and lower the cost of voice and data services, multimedia and internet over IP.

20
New cards

Artificial Intelligence

It is an area of computer science that emphasizes the creation of intelligent machines that work and react like humans.

21
New cards

Robotics

It is the field of computer science and engineering concerned with creating devices that can move and react to sensory input.

22
New cards

Biometrics

the technology used to measure and analyze human body characteristics such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns, and hand measurements, mainly for authentication purposes.

23
New cards

Quantum computing

It is an area of computing focused on developing computer technology based on the principles of quantum theory.

24
New cards

Quantum Cryptography

It is the science of encoding and decoding information or messages which depends on physics, not mathematics.

25
New cards

Cryptocurrencies

Are digital currencies (or tokens), like Bitcoin, Ethereum or Litecoin, that can be used to buy goods and services

26
New cards

Blockchain

Is a decentralized and distributed digital ledger technology that records transactions in a secure and irreversible manner.

27
New cards

Computer-Assisted Translation (CAT)

Is the use of computers to assist in the translation of one or more natural languages into another or others, and vice-versa.

28
New cards

3D Imaging and Holography

Is a photographic technique that uses light to project objects in a way that appears threedimensional

29
New cards

Virtual Reality

Is the term used to describe a three-dimensional, computer-generated environment that can be explored and interacted with a person.

30
New cards

Platform

defined as a group of technologies that are used as a base upon which other applications, processes, or technologies are developed.

31
New cards

Social Media

It is a web-based technology that allows the development, deployment, and management of social media solutions and services.

32
New cards

E-Commerce and M-Commerce

Is a collection of software technologies that allows merchants to create a storefront on the Internet while m-commerce transacts business entirely on mobile technologies.

33
New cards

Online Learning

It is an incorporated set of interactive online services that provide teachers, learners, parents, and others involved in the education sector with a wide range of tools and resources to support and enhance the delivery and management of education through the Internet.

34
New cards

Content Sharing Platform

It is a service-providing website where users can upload, share, and discover various types of content, such as videos (YouTube), images (Pinterest), and articles/blogs (Medium).

35
New cards

Communication Platforms

These platforms provide tools for real-time communication, such as instant messaging (WhatsApp, Messenger, Slack), video conferencing (Zoom), and email services.

36
New cards

Gaming Platforms

These are online digital platforms that offer video games and allow players to connect, compete, and collaborate with others online. Examples include Steam, Xbox Live, PlayStation Network, and mobile app stores.

37
New cards

Financial Platforms

Online platforms that provide financial services like banking, payment processing, investing, and crowdfunding. Examples include GCash, PayPal, and PayMaya.

38
New cards

Digital awareness

Refers to the understanding, knowledge, and consciousness of the digital world,including its technologies, opportunities, risks, and impact on individuals and society

39
New cards

Online ethics

Focuses on the acceptable use of online resources in an online environment.

40
New cards

Netiquette

focuses on the acceptable behavior of the person while using the internet resource.

41
New cards

Online safety and security

define how you are going to keep yourself safe while surfing the web andwhen using these technologies.

42
New cards

Data Privacy Act

is a law that seeks to protect all forms of information, be it private,personal, or sensitive. It is meant to cover both natural and juridical persons involved inthe processing of personal information

43
New cards

The limits of presumed freedom of expression

Freedom of expression is not an absolute right and can be subjected to restrictions.

44
New cards

Issues of libel

Defamation involves writing or saying something about someone that damages thatperson’s reputation.

45
New cards

Copyright Law

a part of a law, wherein you have the right/s to your work, and anyone who uses itwithout your consent is punishable by law.

46
New cards

intellectual property

an idea, an invention, a form of literary work, or research, you have theright to how it should be used by others.

47
New cards

trademark

is often used in a general sense to refer to both trademarks andservice marks.

48
New cards

TRUE OR FALSE:

Unlike patents and copyrights, trademarks do not expire after a set term ofyears.

TRUE

49
New cards

Patent

Is an exclusive right granted for an invention, which is a product or a process thatprovides, in general, a new way of doing something, or offers a new technical solution to aproblem.

50
New cards

Fair Use

means that intellectual property may be used without consent as long as it is usedin commentaries, criticisms, search engines, parodies, news reports, research, libraryarchiving, teaching, and education.

51
New cards

Internet Threats

a category of cybersecurity risks that may cause an undesirableevent or action via the internet. Regardless of intent or cause, the consequences of a web threat maydamage both individuals and organizations

52
New cards

Malware

It is a code or software that isspecifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimateaction on data, hosts, or networks

53
New cards


Viruses

a type of malware that often take the form of a piece of code inserted in anapplication, program, or system and they’re deployed by victims themselves.

54
New cards

Worms

a type of malware that replicates itself. can copy itself without any human interaction, and it’s not host-dependent, meaning it does not need to attach itself to a software program to cause damage

55
New cards

Trojans

a type of malware disguised as bona fide software, applications, or files to deceiveusers into downloading it and, unknowingly, granting control of their devices.

56
New cards

Ransomware

Is a type of malware that comes with a ransom. It locks andencrypts a victim’s device or data and demands a ransom to restore access.

57
New cards

Bots

meaning a program that crawls the internet looking for holesin security infrastructures to exploit, and the hacking is done automatically or robotically if youwill.

58
New cards

Adware

Also known as advertising-supported software, adware displays unwanted advertisements on your computer, sometimes inthe form of pop-up ads that track users’ browsing activity.

59
New cards

Spyware

a type of malware that infiltrates devices without the owner’s knowledge. This is oftenfor the purpose of spying on internet activity, tracking log in and password information, orcollecting sensitive information that can be used for fraudulent purposes.

60
New cards

Spamming

is the use of electronic messaging systems like e-mails and other digital delivery systemsand broadcast media to send unwanted bulk messages indiscriminately.

61
New cards

Phishing

It is identity theft that generally targets users with the aim to con them into revealing their personaland confidential information.

62
New cards

Pharming

t is a complicated form of phishing. A user can fall victim to pharming even on clicking on an authenticlink if the website’s domain name system (DNS) has been hijacked by a hacker.

63
New cards

Internet Security

a branch of computer security specifically related to the Internet, often involvingbrowser security but also network security on a more general level as it applies to other applicationsor operating systems as a whole.

64
New cards

Internet Security

Its objective is to establish rules and measures to use against attacksover the Internet.

65
New cards

Internet Safety

Includes knowing about one’s internet privacy and how one’s behaviorcan support a healthy interaction with the use of the internet” together with the existing applicationstechnological device

66
New cards

Digital Citizenship

the ability to navigate our digital environments in a way that's safe andresponsible and to actively and respectfully engage in these spaces.

67
New cards

Word Processing

refers to the production, storage, and manipulation of text on a computer or wordprocessor.

68
New cards

Word Processor

Is an electronic device or computer software application, that performs thetask of composing, editing, formatting, and printing of documents.

69
New cards

Microsoft Word

word processor developed by Microsoft. It was first released on October 25, 1983 under the name Multi-tool Word for Xenix systems

70
New cards

Quick Access Toolbar

knowt flashcard image
71
New cards

Ribbon

knowt flashcard image
72
New cards

File Tab

knowt flashcard image
73
New cards

Tabs

knowt flashcard image
74
New cards

group name

knowt flashcard image
75
New cards

Dialogue Box Launcher

knowt flashcard image
76
New cards

Insertion Point

knowt flashcard image
77
New cards

Word Document Window

knowt flashcard image
78
New cards

Status Bar

knowt flashcard image
79
New cards

Print Layout Button

knowt flashcard image
80
New cards

View Options

knowt flashcard image
81
New cards

Zoom Slider

knowt flashcard image
82
New cards

Vertical Scroll Bar

knowt flashcard image
83
New cards

Scroll Box

knowt flashcard image
84
New cards

Program Level Control Buttons

knowt flashcard image
85
New cards

Title Bar

knowt flashcard image
86
New cards

Pictures

MICROSOFT WORD MATERIALS:
Generally, these are electronic or digital pictures or photographs you have saved in anylocal storage device.

87
New cards

TRUE

True or False: .GIF is capable of displaying simple animation and can support 256 colors.

88
New cards

FALSE

True or False: .PNG supports animation and is known for its compressible size.

89
New cards

TRUE

True or False: .TIFF is mainly used by professional designers and photographers for illustrations and observations.

90
New cards

FALSE

True or False: .SVG is famous for having a higher quality image but is not resizable without loss of quality.

91
New cards

TRUE

True or False: .RAW images are minimally processed data from the image sensor.

92
New cards

TRUE

True or False: .PSD is the output image type for editing in Adobe Photoshop and produces higher quality images.

93
New cards


c. .PNG

Which image file type supports transparency?
a. .JPG
b. .GIF
c. .PNG
d. .TIFF

94
New cards

b. .GIF

Which image file type can display simple animation?
a. .JPG
b. .GIF
c. .PNG
d. .TIF

95
New cards

a. .JPG

Which image file type is known for having a compressible size?
a. .JPG
b. .GIF
c. .PNG
d. .TIFF

96
New cards

d. .TIFF

Which image file type is mainly used by professional designers and photographers for illustrations and observations?
a. .JPG
b. .GIF
c. .PNG
d. .TIFF

97
New cards

d. .SVG

Which image file type can be resized without loss of quality?

a. .JPG

b. .GIF

c. .PNG

d. .SVG

98
New cards

True

True or False: Desktop publishing (DTP) software is designed for creating visual communications such as brochures, business cards, and web pages.

99
New cards

False

True or False: Adobe Illustrator is primarily used for post-production in film making and motion graphics.

100
New cards

True

True or False: Adobe Photoshop is used for photo editing, artworks, and bitmap graphics.