Podcast
Questions and Answers
Which emerging technology specifically focuses on simulating human-like actions in computers?
Which emerging technology specifically focuses on simulating human-like actions in computers?
- Robotics
- Artificial Intelligence (correct)
- Quantum Cryptography
- 3D Imaging
What was the primary invention attributed to Samuel F.B. Morse in 1835?
What was the primary invention attributed to Samuel F.B. Morse in 1835?
- Wireless Network
- Telegraph (correct)
- Telephone
- Radio
What is the primary function of biometrics in technology?
What is the primary function of biometrics in technology?
- Transmitting data over networks
- Analyzing human body characteristics for authentication (correct)
- Decoding messages
- Creating virtual environments
Which of the following is NOT a type of wireless communication technology?
Which of the following is NOT a type of wireless communication technology?
What role does Quantum Cryptography play in information technology?
What role does Quantum Cryptography play in information technology?
Which online platform primarily focuses on enabling merchants to create internet storefronts?
Which online platform primarily focuses on enabling merchants to create internet storefronts?
What technology is primarily used in creating interactive computer-generated environments?
What technology is primarily used in creating interactive computer-generated environments?
Which type of data service primarily uses modems and telephone lines for connectivity?
Which type of data service primarily uses modems and telephone lines for connectivity?
Which of the following types of cyberattacks involves a perpetrator intercepting communication between two parties?
Which of the following types of cyberattacks involves a perpetrator intercepting communication between two parties?
What is the main purpose of a botnet in the context of cyber attacks?
What is the main purpose of a botnet in the context of cyber attacks?
Which of the following best describes DNS Spoofing?
Which of the following best describes DNS Spoofing?
What type of cyberattack attempts to extract sensitive information through deceptive messages?
What type of cyberattack attempts to extract sensitive information through deceptive messages?
In the context of online learning platforms, which of the following would not be considered a tool to support the education process?
In the context of online learning platforms, which of the following would not be considered a tool to support the education process?
Which attack is characterized by overwhelming a server with traffic to disrupt service?
Which attack is characterized by overwhelming a server with traffic to disrupt service?
What are insider threats primarily associated with?
What are insider threats primarily associated with?
Which of the following defines the feeling of being secured while using the Internet?
Which of the following defines the feeling of being secured while using the Internet?
Flashcards are hidden until you start studying
Study Notes
Information and Communications Technology (ICT)
- The Philippines is considered the ICT Hub of Asia.
- Manila and Quezon City ranked as the Selfie Capital of the World in 2013.
The Telegraph
- Developed by Samuel F.B. Morse in 1835.
- Transmits short and long bursts of electrical signals (dots and dashes) representing letters and numbers.
Types of ICT
- Wireless Fidelity (Wi-Fi): A local area network technology supporting wireless communication.
- Bluetooth: Enables packet-based transmission over short-range radio signals.
- Mobile Network Generations:
- 3G: Third generation of mobile communication.
- 4G: Fourth generation with faster data speeds.
- 5G: Fifth generation offering advanced capabilities.
- Data Services: Networking services catering to mobile devices.
- Dial-up Services: Data networking via modems and telephone lines.
- Virtual Private Networks (VPN): Ensure secure access to private networks.
Emerging Technologies
- Artificial Intelligence (AI): Focused on making computers perform tasks like humans.
- Robotics: Combines engineering and computer science to create responsive devices.
- Biometrics: Technology analyzing human physical traits (e.g., fingerprints) primarily for authentication.
- Quantum Cryptography: Encodes messages based on physics principles, enhancing privacy and security.
- Computer-assisted Translation (CAT): Facilitates the translation of languages using computers.
- 3D Imaging and Holography: Projects objects to create a three-dimensional appearance.
- Virtual Reality: Describes immersive computer-generated environments for user interaction.
Common Online Platforms
- Social Media Platforms: Technologies for creating and managing social media services.
- E-commerce Platforms: Software enabling merchants to establish online storefronts.
- Online Learning Platforms: Interactive services supporting education through a variety of tools and resources.
- Online Video Platforms: Platforms for creating, publishing, and managing videos online.
Common Types of Cyberattacks
- Malware: General term for malicious software including viruses, Trojans, and worms.
- Password Attacks: Methods for gaining unauthorized access through password breaches.
- Ransomware: Steals data and demands payment for its return.
- Man-in-the-Middle (MIM) Attack: An attacker intercepts communication between two parties.
- Phishing: Attempts to steal information via fraudulent messages.
- URL Interpretation / URL Poisoning: Mimics official websites to deceive users.
- SQL Injection Attack: Exploits vulnerabilities in applications to access sensitive data.
- DDoS Attack: Overwhelms a server with traffic to disrupt access to services.
- DNS Spoofing: Misleads users by redirecting them to malicious websites.
- Botnet: A network of infected computers controlled by a malicious actor.
- Watering Hole Attack: Targets specific user groups by compromising visited sites.
- Cross-site Scripting (XSS): Injects malicious code through web applications to target other users.
- Insider Threats: Risks posed by authorized users who misuse their access.
Online Safety and Security
- Safety: The state of feeling secure.
- Security: The measures taken to protect against threats.
- The advent of the Internet and World Wide Web has revolutionized communication but has raised concerns about user safety, security, and ethical behavior online.
Crimes and Issues on the Internet
- Cyberbullying: Online harassment or intimidation.
- Hacking: Unauthorized access to systems.
- Identity Theft: Stealing someone’s personal information for fraudulent use.
- Plagiarism: Taking someone else's work without permission.
- Intellectual Property Rights: Legal rights that protect creations of the mind.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.