ICT and Information Technologies Lecture Review

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/53

flashcard set

Earn XP

Description and Tags

Comprehensive practice flashcards covering ICT infrastructure, Microsoft Office (Word, Excel, Access), HTML web development, cybersecurity, and advanced topics in Artificial Intelligence and Machine Learning.

Last updated 3:11 PM on 5/9/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

54 Terms

1
New cards

Information and communication technologies (ICT)

A wide range of digital technologies used to create, transfer, and disseminate information and services, including hardware, software, and the Internet.

2
New cards

What is the main essence of data management?

The effective collection, storage, processing, protection, and use of data to support accurate decision-making.

3
New cards

Electronic Medical Record (EMR)

A digital version of a patient’s medical history maintained by healthcare providers.

4
New cards

Standardization Organizations

The three main organizations developing standards in the field of information technology: ISO, IEC, and ITU.

5
New cards

Information

Information about persons, objects, facts, events, phenomena, and processes, regardless of the form of their presentation.

6
New cards

MS Word File Name Limit

The name of a file in MS Word must not exceed 255255 characters.

7
New cards

Ribbon

A line in MS Word where the group of commands is located.

8
New cards

Table

A grid of rows and columns that intersect to form cells.

9
New cards

Page Orientation Types

The two types of orientation in Word are landscape and portrait.

10
New cards

MS Excel Basic Element

The cell is the basic element of an Excel spreadsheet.

11
New cards

Relative Cell Address

An Excel address that contains the row number and column name (e.g., A1A1).

12
New cards

Absolute Cell Address

An Excel address that remains constant when copied, denoted with dollar signs (e.g., $A$1\$A\$1).

13
New cards

Formula Bar

An area in MS Excel that displays the contents of the active cell.

14
New cards

Logic Functions

Functions such as IF, FALSE, and TRUE used for decision-making logic in Excel.

15
New cards

NAME!

An error value that appears in MS Excel when a cell name in a formula is invalid or a range name is typed incorrectly.

16
New cards

NUM!

An Excel error caused by an invalid argument in a function.

17
New cards

Primary Key

A field or set of fields in MS Access that uniquely identifies each record in a table.

18
New cards

Record

The rows of an MS Access table.

19
New cards

Field

The columns of an MS Access table.

20
New cards

Form

An object in MS Access used for user data entry and editing.

21
New cards

Report

An object in MS Access used to print data based on queries or tables.

22
New cards

Database

A collection of information organized so that it can be easily accessed, managed, and updated.

23
New cards

Tag

A defined element in HTML enclosed between angle brackets <>< >.

24
New cards

Attributes

Components of an HTML tag consisting of a name and a value.

25
New cards

HEAD Section

The header section of an HTML document.

26
New cards

href Parameter

An attribute in HTML that determines the destination of a link.

27
New cards

HTML List Types

The main types of lists provided in HTML: Bulleted (UL), Numbered (OL), and Definition (DL) lists.

28
New cards

E-mail protocols

Protocols used for e-mail include POP3 and IMAP for receiving and SMTP for sending messages.

29
New cards

Computer Virus

A program that can self-replicate and attach themselves to computer systems or networks without user knowledge.

30
New cards

Stealth Virus

A virus that actively hides itself from antivirus software by temporarily removing itself from infected files and placing a copy elsewhere.

31
New cards

Retrovirus

A computer virus that actively attacks an anti-virus program to prevent detection.

32
New cards

Polymorphic Virus

A virus that encrypts and changes its coding to make detection harder.

33
New cards

Cryptography

A method of protecting information by transforming messages in ways that are hard to decipher.

34
New cards

Cryptanalysis

The study of methods focused on deciphering encrypted data without knowledge of the enciphering details.

35
New cards

Symmetric Cryptosystems

Cryptosystems that use a single secret key for both encryption and decryption.

36
New cards

Asymmetric Cryptosystems

Also known as public-key cryptosystems, these use a public key for everyone and a private key known only to the recipient.

37
New cards

Electronic Signature

Digital data attached to a document as verification of its authenticity, ownership, and immutability.

38
New cards

Vector Graphics

Graphics composed of paths rather than pixels.

39
New cards

Raster Graphics

Graphics composed of individual pixels.

40
New cards

Resolution

A term referring to the sharpness or clarity of an image.

41
New cards

Multimedia

The integration of still and moving images, text, and sounds by means of computer technology.

42
New cards

Virtual Reality

An artificially created world in which a person is immersed.

43
New cards

E-government

A system providing direct communication between the population and the government.

44
New cards

Generative Artificial Intelligence

AI that can create new content, such as text, images, audio, or code, based on learned patterns.

45
New cards

Transformer architecture

The underlying algorithm for modern large language models (LLM).

46
New cards

Token

A basic unit of text, such as a word or part of a word, used by a language model.

47
New cards

Prompt

An input instruction or query given to an AI model.

48
New cards

Embedding

A numerical vector representation of data that captures meaning.

49
New cards

Machine Learning

A direction in computer science aimed at creating self-analysis algorithms based on empirical data.

50
New cards

Supervised Learning

Learning from labeled data where input–output pairs are known; includes classification and regression.

51
New cards

Unsupervised Learning

A type of machine learning that uses unlabeled data, often employing clustering methods like K-means.

52
New cards

Deep Learning

A subset of machine learning that uses multi-layer neural networks.

53
New cards

Natural Language Processing (NLP)

A field of AI that enables computers to understand and process human language.

54
New cards

Computer Vision

The ability of a computer to analyze images and automatically recognize objects.