Empowerment Technology Third Quarter Reviewer

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following best describes the role of Internet of Things (IoT) in modern technology?

  • Functions as a collective network facilitating communication between devices and the cloud. (correct)
  • Deals exclusively with remote delivery of computing services.
  • Primarily focuses on enhancing the speed of internet connections.
  • Involves managing broadcast media and network-based control systems.

Cloud computing enables users to do which of the following?

  • Access computing resources over the internet with scalability and flexibility. (correct)
  • Bypass the need for internet connectivity for data storage.
  • Directly manage physical hardware resources.
  • Install and maintain software on local devices only.

What is the defining characteristic of fiber-optic internet compared to other types of internet access?

  • It is primarily used for mobile devices like smartphones and tablets.
  • It transmits information using light through optical fibers. (correct)
  • It uses radio waves to wirelessly transmit data.
  • It relies on traditional copper cables for data transmission.

Which of the following is the MOST accurate description of 'Big Data'?

<p>A massive volume of structured and unstructured data from various sources. (D)</p> Signup and view all the answers

Which of the following explains the function of Business Intelligence?

<p>To use data for optimizing corporate decision-making and reporting. (A)</p> Signup and view all the answers

Which statement accurately describes the purpose of Communication Technologies?

<p>They are tools and methods used to process, transmit, and receive information electronically. (D)</p> Signup and view all the answers

What is a key characteristic of Machine-to-Machine (M2M) communication?

<p>It facilitates direct data exchange between devices without human intervention. (C)</p> Signup and view all the answers

Electronic transactions enhance business by doing which of the following?

<p>Integrating ICT to optimize operations, improve experiences, and drive innovation. (A)</p> Signup and view all the answers

What distinguishes Web 3.0 from its predecessors?

<p>Its immersive and decentralized nature driven by blockchain and AI. (B)</p> Signup and view all the answers

What is the core idea behind the concept of Convergent Technology?

<p>The blending of independent technologies to form new digital solutions. (A)</p> Signup and view all the answers

Which of the following is the best example of Device and Service Convergence?

<p>Smartphones becoming mini-computers with fitness tracking. (B)</p> Signup and view all the answers

E-Governance primarily leverages ICT to do which of the following?

<p>Provide online platforms for government services and public consultation. (B)</p> Signup and view all the answers

What is the main purpose of Assistive Technology?

<p>To help individuals with disabilities perform functions that might be difficult otherwise. (D)</p> Signup and view all the answers

Which of the following is the most accurate description of Digital Inclusion Initiatives?

<p>Ensuring equitable access to technology for marginalized communities. (D)</p> Signup and view all the answers

What is the main function of Robotics in relation to AI?

<p>To design machines that can interact with the environment and perform automated tasks. (B)</p> Signup and view all the answers

What is one of the key characteristics of blockchain technology that makes it secure?

<p>It records information in a way that is difficult to alter or hack. (B)</p> Signup and view all the answers

What does Computer-Assisted Translation (CAT) software primarily aim to do?

<p>Enhance translation workflows by automating and assisting in the process. (C)</p> Signup and view all the answers

What is the key feature of holography that distinguishes it from traditional photography?

<p>It records both the intensity and phase of light waves to create 3D images. (C)</p> Signup and view all the answers

Which statement MOST accurately reflects a current issue in ICT within the Philippines?

<p>Misinformation and fake news spreading through unverified digital sources. (C)</p> Signup and view all the answers

How has the evolution of 5G networks addressed latency issues?

<p>By increasing speeds, increasing capacity, and reducing latency. (C)</p> Signup and view all the answers

Why is 'Spatial computing' considered an emerging trend in ICT?

<p>Because it is making strides in improving how humans interact with the digital world. (D)</p> Signup and view all the answers

How does homomorphic encryption enhance data security?

<p>By allowing data processing without first decrypting the information. (B)</p> Signup and view all the answers

What is a primary goal of Generative AI?

<p>To replicate human output. (D)</p> Signup and view all the answers

What is the main focus of 'Digital Awareness'?

<p>Promoting the responsible, safe, and ethical use of technology. (C)</p> Signup and view all the answers

What is the intent of promoting 'Online Ethics'?

<p>To focus on acceptable behavior while using internet resources. (D)</p> Signup and view all the answers

Which statement BEST summarizes the goal of online safety and security measures?

<p>Involving practices to keep oneself safe while using digital technologies. (B)</p> Signup and view all the answers

In the context of online interactions, what does 'Netiquette' primarily refer to?

<p>The digital equivalent of good manners for creating a positive online environment. (C)</p> Signup and view all the answers

When using data in a spreadsheet, what does data analytics primarily focus in?

<p>On generating information to aid with future forecasts using the current data. (D)</p> Signup and view all the answers

Flashcards

Overview of ICT

Refers to all technology that is used to handle telecommunications and access of information.

Internet Access

A facility or service that provides connectivity for a computer, a computer network, or other device to the internet.

Fiber-optic Internet

Uses optical fibers to transmit information in the form of light rather than electricity. These fibers carry pulses of laser or LED lights, transmitting data in binary form (0s and 1s).

Data

A collection of individual raw facts or statistics that can be in the form of text, observations, figures, images, graphs, or symbols.

Signup and view all the flashcards

Data Science

The predictive and prescriptive analysis of data.

Signup and view all the flashcards

Operating System

Manages hardware and provides a platform for running programs.

Signup and view all the flashcards

Convergent Technology

The blending of independent technologies to form new digital solutions.

Signup and view all the flashcards

Internet of Things (IoT)

Smart interconnected devices for homes, cities, and industries.

Signup and view all the flashcards

E-Governance

Online platforms for government services, public consultation, and civic engagement.

Signup and view all the flashcards

Assistive Technology

Technology used to assist individuals with disabilities in performing functions that might otherwise be difficult or impossible.

Signup and view all the flashcards

Digital Inclusion Initiatives

Ensuring equitable access to technology for marginalized communities.

Signup and view all the flashcards

Blockchain

A system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system.

Signup and view all the flashcards

Holography

A photographic technique that uses light to project objects in a way that appears three-dimensional

Signup and view all the flashcards

Old Issues.

High cost of telecom services, limited internet infrastructure.

Signup and view all the flashcards

Netiquette

The digital equivalent of good manners, helps us create a positive and inclusive online environment for everyone.

Signup and view all the flashcards

Protection of Private Information

Safeguarding our right to privacy and preventing unauthorized access to our sensitive information.

Signup and view all the flashcards

Internet Security

A branch of computer security related to protecting online data, including browser and network security

Signup and view all the flashcards

Fake News

Fabricated or misleading information presented as news with the intention to deceive or manipulate audiences.

Signup and view all the flashcards

Ransomware

Black mails that come with the ransom. It locks and encrypts a Victim's device or data and demands a ransom to restore access.

Signup and view all the flashcards

Internet Threat

Online threats are a category of cybersecurity risks that may cause an undesirable event or action via the Internet.

Signup and view all the flashcards

Respect and Responsibility

Treating others online with the same respect you would in person, regardless of ethnicity, differences in opinion, or background.

Signup and view all the flashcards

Critical Thinking

Developing essential skills for navigating the digital world, including searching for information effectively, evaluating online sources critically, and understanding cyber-safety practices.

Signup and view all the flashcards

Digital Privacy

Understanding and protecting your personal information online, practicing good password hygiene, and respecting others' privacy.

Signup and view all the flashcards

Healthy Balance

Maintaining a healthy balance between your online and offline life.

Signup and view all the flashcards

Good Digital Citizen

Promote positive online behavior, report cyberbullying and harassment, and help make the internet a better place for everyone.

Signup and view all the flashcards

Word Processing

Word processing refers to the production, storage, and manipulation of text on a computer using a word processor.

Signup and view all the flashcards

Microsoft Word

A word processor developed by Microsoft.

Signup and view all the flashcards

Understanding Functions

Pre-programmed formulas that perform calculations in areas such as statistics, dates, time, finance, lists, engineering, etc.

Signup and view all the flashcards

Study Notes

  • Covers the Empowerment Technology Third Quarter Reviewer content.
  • Covers trends and issues in ICT, the current state and emerging technologies, online safety, productivity software, photo editing, and more.

Overview of ICT

  • Refers to all technology that handles telecommunications and information access.
  • Includes broadcast media, management systems, and network-based control.

Modern Definition

  • It is the convergence of technologies, primarily focusing on access and information sharing.
  • Uses computers, radio, television, cellular phones, network hardware, software, internet connections, satellite systems and video conferencing applications.

Components of ICT

  • Cloud computing enables users to access computing resources (storage, processing power, and software) over the Internet.
  • Intelligent cloud involves new cloud applications with artificial intelligence.
  • Internet access provides connectivity for devices to the internet.
  • Wi-Fi is a wireless networking technology for internet connection via a router.
  • Fiber-optic internet uses optical fibers to transmit information as light.
  • LTE is a cellular network for high-speed wireless internet access on mobile devices.
  • 5G technology is the latest cellular network generation, offering faster speeds and improved network capacity.
  • Data is a collection of raw facts or statistics.
  • Big Data is a massive volume of structured and unstructured data generated daily.
  • Data science is the predictive and prescriptive analysis of data.
  • Business intelligence optimizes corporate decision-making and reporting using data.
  • Data services enable on-demand data access, similar to Software as a Service (SaaS).
  • Communication technologies are tools and methods used to process and transmit information electronically.
  • Infrared (IR) connection allows short-range file transfers between devices.
  • Bluetooth technology replaces cables for device connections wirelessly.
  • Machine-to-machine communication (M2M) allows direct data exchange between devices without human intervention.
  • Human-to-machine interaction (HMI) focuses on how humans interact with wearable technology.
  • Wearable technology integrates M2M and HMI for intuitive smart wearable interactions.

Transactions

  • Businesses integrate ICT to optimize operations and improve customer experiences.
  • Mobile Wallets/E-wallets, Online Appointments/Reservations, Blockchain Technology are types of transactions.
  • Online shopping and mobile banking are examples.
  • The physical parts make up a computer.
  • Includes personal computers, servers, laptops, tablets, smartphones etc.
  • Software programs tell the hardware what to do.
  • An operating system (OS) manages hardware and provides a platform for running programs (e.g., Windows, macOS, Linux).

Productivity Software

  • Tools for document creation, spreadsheets, presentations, and communication (e.g., Microsoft Office, Google Workspace).
  • Hardware includes a keyboard and monitor to make up a physical computer.

Web Generation

  • Refers to the timeline of the evolution of web technology.
  • Web 1.0 (1991-1995) had static HTML pages with limited user interaction.
  • Web 2.0 (2005-Present) supports user-generated content, social media, and dynamic applications.
  • Web 3.0 (Emerging) is an immersive web driven by blockchain and AI-powered personalization.

Convergent Technology

  • Involves blending independent technologies to form new digital solutions.
  • The Internet of Things (IoT) has smart interconnected devices.
  • Cloud computing gives Remote access to computing resources.
  • Device and service convergence involves smartphones becoming mini-computers, smart TVs merging television and computing and wearables integrating fitness tracking.

Social Use of ICT

  • E-governance has online platforms for government services.
  • Education has online learning platforms and digital educational resources.
  • Healthcare uses telemedicine and AI-powered diagnostics etc.

Assistive Technology

  • Technology used to assist individuals with disabilities.
  • Has accessibility tools and assistive robotics.
  • Digital inclusion initiatives ensure equitable access to technology for marginalized communities.

Emerging Technologies

  • Artificial intelligence (AI) involves machines simulating human intelligence.
  • Robotics involves machines designed to interact with the environment and perform automated tasks.
  • Biometrics uses physical characteristics for identification.
  • Quantum computing uses quantum mechanics for enhanced processing power.
  • Cryptocurrencies such as Bitcoin are used to buy goods and services.
  • Blockchain is a system that secures recorded information.
  • NFT's are unique digital assets stored on the blockchain.
  • Virtual Reality and Augmented Reality are immersive experiences that blend real and digital environments.
  • Computer-Assisted Translation (CAT) uses software to assist in translations.
  • 3d imaging and holography is a photographic technique using light to project objects in a 3D way.

Issues in ICT (Philippine Setting)

  • Old issues involve high telecom service costs and limited internet infrastructure.
  • Current issues include unequal infrastructure development and slow internet speeds/limited coverage.
  • Current new trends include 5G networks, edge computing and spatial computing.
  • This refers to the coming partnership between edge computing and AI where processes take place outside of data centers conducted on devices closer to their data origination.
  • Cyber ​​resilience embraces and leads since a cyber attack is inevitable.

Digital Awareness

  • Relates to using technology safely and ethically.
  • Online ethics focus on acceptable use of online resources.
  • Netiquette defines acceptable behavior while using internet resources.
  • Online safety and security have practices to keep oneself safe when using digital technologies.

Online Security and Safety

  • Internet security protects online data.
  • Internet safety means knowing about online privacy.

Staying Safe Online

  • Involves being careful of fake websites and using strong passwords.

Online Ethics

  • Protects all forms of data and follows a code of good conduct.
  • Involves adhering to guidelines for respectful online behavior.
  • Respectful behavior with good manners creates a safe and inclusive online environment.

Internet Threats and Safety

  • Internet threats are cybersecurity risks
  • Malware code damages data, hosts, or networks.
  • Viruses are code inserted in applications, programs, or systems.
  • Worms spread across computers and replicate themselves.
  • Ransomware blackmails with the ransom.
  • It locks and encrypts a Victim's device or data and demands a ransom to restore access.
  • Trojans sneak malware onto a PC by disguising them.
  • Botnets turn PCs into zombies and send unwanted bulk messages.
  • Phishing generally targets users to steal personal information.
  • Cyberstalking is the use of electronic means to harass or threaten someone.

Online Safety Issues

  • Hacking involves unauthorized access to a computer system.
  • Cyberbullying (trolling) uses digital platforms to offend or bully someone.
  • Sextortion blackmails someone for explicit content.

Being a Good Digital Citizen

  • Encompasses rights, responsibilities, and ethical practices when using technology.
  • Treating others respectfully online and recognizing the impact of words and actions.
  • Using skills for navigating the digital world and consuming/sharing information critically.
  • Engaging positively with others online and maintaining a healthy balance between online and offline activities.

Application Software Packages (Word Processing)

  • Word processing manipulates text on a computer using a word processor.
  • MS Word - Released on October 25, 1983.
  • Word processors differ from text editors by including text manipulation features.
  • Applications of MS Word include creating letters, envelopes, templates, and resumes.

MS Word Tools

  • The Quick Access Toolbar (QAT) contains buttons for frequently used commands, includes save, undo, redo, and print.
  • The Ribbon organizes commands on tabs.
  • The File Tab displays backstage view and the Status Bar displays the page and line number etc.

Editing Tools

  • Cut, copy, paste, font size, undo, replace etc are key editing tools.

Common Enhancement for Photo

  • Bightness and Contrast
  • Saturation
  • Focus
  • Cropping and Optimization

File types/formats

  • JPG, PNG, TIFF, GIF, RAW, PSD etc are image file types.

Data Analysis

  • Cleaning, organizing, and analyzes data with the best tools.
  • To extract data insight and its patterns for a decision making.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser