Information and Communications Technology Quiz
16 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which emerging technology specifically focuses on simulating human-like actions in computers?

  • Robotics
  • Artificial Intelligence (correct)
  • Quantum Cryptography
  • 3D Imaging
  • What was the primary invention attributed to Samuel F.B. Morse in 1835?

  • Wireless Network
  • Telegraph (correct)
  • Telephone
  • Radio
  • What is the primary function of biometrics in technology?

  • Transmitting data over networks
  • Analyzing human body characteristics for authentication (correct)
  • Decoding messages
  • Creating virtual environments
  • Which of the following is NOT a type of wireless communication technology?

    <p>Telegraph</p> Signup and view all the answers

    What role does Quantum Cryptography play in information technology?

    <p>Encrypts information based on physics</p> Signup and view all the answers

    Which online platform primarily focuses on enabling merchants to create internet storefronts?

    <p>E-commerce Platform</p> Signup and view all the answers

    What technology is primarily used in creating interactive computer-generated environments?

    <p>Virtual Reality</p> Signup and view all the answers

    Which type of data service primarily uses modems and telephone lines for connectivity?

    <p>Dial-up services</p> Signup and view all the answers

    Which of the following types of cyberattacks involves a perpetrator intercepting communication between two parties?

    <p>Man-in-the-Middle Attack</p> Signup and view all the answers

    What is the main purpose of a botnet in the context of cyber attacks?

    <p>To execute commands using multiple infected computers</p> Signup and view all the answers

    Which of the following best describes DNS Spoofing?

    <p>Redirecting users to malicious websites by poisoning DNS entries</p> Signup and view all the answers

    What type of cyberattack attempts to extract sensitive information through deceptive messages?

    <p>Phishing</p> Signup and view all the answers

    In the context of online learning platforms, which of the following would not be considered a tool to support the education process?

    <p>Password attacks</p> Signup and view all the answers

    Which attack is characterized by overwhelming a server with traffic to disrupt service?

    <p>Denial of Service (DoS) Attack</p> Signup and view all the answers

    What are insider threats primarily associated with?

    <p>Authorized users misusing their access</p> Signup and view all the answers

    Which of the following defines the feeling of being secured while using the Internet?

    <p>Safety</p> Signup and view all the answers

    Study Notes

    Information and Communications Technology (ICT)

    • The Philippines is considered the ICT Hub of Asia.
    • Manila and Quezon City ranked as the Selfie Capital of the World in 2013.

    The Telegraph

    • Developed by Samuel F.B. Morse in 1835.
    • Transmits short and long bursts of electrical signals (dots and dashes) representing letters and numbers.

    Types of ICT

    • Wireless Fidelity (Wi-Fi): A local area network technology supporting wireless communication.
    • Bluetooth: Enables packet-based transmission over short-range radio signals.
    • Mobile Network Generations:
      • 3G: Third generation of mobile communication.
      • 4G: Fourth generation with faster data speeds.
      • 5G: Fifth generation offering advanced capabilities.
    • Data Services: Networking services catering to mobile devices.
    • Dial-up Services: Data networking via modems and telephone lines.
    • Virtual Private Networks (VPN): Ensure secure access to private networks.

    Emerging Technologies

    • Artificial Intelligence (AI): Focused on making computers perform tasks like humans.
    • Robotics: Combines engineering and computer science to create responsive devices.
    • Biometrics: Technology analyzing human physical traits (e.g., fingerprints) primarily for authentication.
    • Quantum Cryptography: Encodes messages based on physics principles, enhancing privacy and security.
    • Computer-assisted Translation (CAT): Facilitates the translation of languages using computers.
    • 3D Imaging and Holography: Projects objects to create a three-dimensional appearance.
    • Virtual Reality: Describes immersive computer-generated environments for user interaction.

    Common Online Platforms

    • Social Media Platforms: Technologies for creating and managing social media services.
    • E-commerce Platforms: Software enabling merchants to establish online storefronts.
    • Online Learning Platforms: Interactive services supporting education through a variety of tools and resources.
    • Online Video Platforms: Platforms for creating, publishing, and managing videos online.

    Common Types of Cyberattacks

    • Malware: General term for malicious software including viruses, Trojans, and worms.
    • Password Attacks: Methods for gaining unauthorized access through password breaches.
    • Ransomware: Steals data and demands payment for its return.
    • Man-in-the-Middle (MIM) Attack: An attacker intercepts communication between two parties.
    • Phishing: Attempts to steal information via fraudulent messages.
    • URL Interpretation / URL Poisoning: Mimics official websites to deceive users.
    • SQL Injection Attack: Exploits vulnerabilities in applications to access sensitive data.
    • DDoS Attack: Overwhelms a server with traffic to disrupt access to services.
    • DNS Spoofing: Misleads users by redirecting them to malicious websites.
    • Botnet: A network of infected computers controlled by a malicious actor.
    • Watering Hole Attack: Targets specific user groups by compromising visited sites.
    • Cross-site Scripting (XSS): Injects malicious code through web applications to target other users.
    • Insider Threats: Risks posed by authorized users who misuse their access.

    Online Safety and Security

    • Safety: The state of feeling secure.
    • Security: The measures taken to protect against threats.
    • The advent of the Internet and World Wide Web has revolutionized communication but has raised concerns about user safety, security, and ethical behavior online.

    Crimes and Issues on the Internet

    • Cyberbullying: Online harassment or intimidation.
    • Hacking: Unauthorized access to systems.
    • Identity Theft: Stealing someone’s personal information for fraudulent use.
    • Plagiarism: Taking someone else's work without permission.
    • Intellectual Property Rights: Legal rights that protect creations of the mind.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on Information and Communications Technology (ICT), including its evolution, types, and emerging technologies. The quiz covers key concepts such as Wi-Fi, Bluetooth, and the development of the telegraph. Explore the advancements in mobile networks and the Philippines' role as an ICT hub.

    More Like This

    Use Quizgecko on...
    Browser
    Browser