Introduction to ICT Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does the term 'Netiquette' refer to?

  • The technical aspects of internet browsing.
  • The ethical guidelines for online behavior. (correct)
  • The security measures for protecting personal data.
  • The laws governing internet use.

Which of the following is considered a bookmarking site?

  • Pinterest (correct)
  • Reddit
  • Twitter
  • Flickr

According to netiquette, what should you consider when sending an email?

  • If you would say the same thing in person. (correct)
  • If the email is visually appealing.
  • How quickly you can send multiple emails.
  • Whether the recipient will respond immediately.

Which social media platform is primarily used for microblogging?

<p>Twitter (D)</p> Signup and view all the answers

What does the first rule of netiquette emphasize?

<p>Be aware of the impact of your words on others. (A)</p> Signup and view all the answers

Which one of the following is NOT a feature of media sharing sites?

<p>Storing bookmarks for websites. (C)</p> Signup and view all the answers

Why should users respect other people's time and bandwidth according to netiquette?

<p>It reduces the amount of unnecessary data transfer. (C)</p> Signup and view all the answers

What is one key characteristic of blogs and forums?

<p>They allow users to post and comment on topics. (D)</p> Signup and view all the answers

What is a key principle of netiquette regarding online discussions?

<p>Be polite and pleasant to everyone. (A)</p> Signup and view all the answers

What should you do to ensure clear communication in your posts and emails?

<p>Express your message directly. (A)</p> Signup and view all the answers

Which of the following is NOT considered a violation of netiquette?

<p>Sharing your knowledge in a respectful manner. (D)</p> Signup and view all the answers

What defines a 'masquerader' in terms of cybersecurity?

<p>A hacker posing as someone else. (C)</p> Signup and view all the answers

During which stage does a virus copy itself into other programs?

<p>Propagation phase. (B)</p> Signup and view all the answers

How is 'cybercrime' defined?

<p>A crime committed using the Internet. (B)</p> Signup and view all the answers

What does 'malware' stand for?

<p>Malicious software. (D)</p> Signup and view all the answers

What is the primary purpose of a Privacy Policy or Terms of Service?

<p>To inform users about data handling practices. (B)</p> Signup and view all the answers

What distinguishes Web 2.0 from Web 1.0?

<p>It enables user participation and dynamic content. (D)</p> Signup and view all the answers

Which of the following best describes the term 'folksonomy' in Web 2.0?

<p>The categorization of information using freely chosen keywords. (D)</p> Signup and view all the answers

What does the term 'Long Tail' refer to in the context of Web 2.0?

<p>Services offered on demand rather than for a single purchase. (C)</p> Signup and view all the answers

How do dynamic web pages in Web 2.0 enhance user experience compared to static web pages?

<p>They allow users to interact and see personalized content. (B)</p> Signup and view all the answers

What is a defining feature of Software as a Service (SaaS)?

<p>Users subscribe to software only when needed. (C)</p> Signup and view all the answers

Which of the following best exemplifies the concept of 'Mass Participation' in Web 2.0?

<p>Active engagement from diverse users sharing information. (C)</p> Signup and view all the answers

Which type of social media allows users to connect based on shared interests?

<p>Social Networks (C)</p> Signup and view all the answers

What is the main focus of Web 3.0 compared to Web 2.0?

<p>Semantic web and understanding user preferences. (C)</p> Signup and view all the answers

Flashcards

Hacking

A type of cybercrime where an individual or group uses the internet to gain unauthorized access to a computer system or network.

Virus

A malicious program designed to spread from one computer to another, often by attaching itself to other files.

Malware

A category of software designed to harm or steal data from computer systems, including viruses, worms, and Trojans.

Hacker

A person who gains unauthorized access to a computer system or network with the intention of harming or stealing data.

Signup and view all the flashcards

Privacy Policy

A document that outlines how a website collects, uses, and protects user data.

Signup and view all the flashcards

Worm

A malicious program that replicates itself and spreads to other computers on a network.

Signup and view all the flashcards

Trojan Horse

A type of malware that disguises itself as a legitimate program to gain access to a computer system.

Signup and view all the flashcards

Dormant Phase

A stage in the virus lifecycle where the virus is inactive or dormant.

Signup and view all the flashcards

Bookmarking Sites

Websites designed for users to store and manage links to various online resources, often allowing for categorization with tags.

Signup and view all the flashcards

Social News Sites

Platforms where users can submit news articles or links, allowing for comments and voting to rank the content.

Signup and view all the flashcards

Media Sharing Sites

Websites that enable users to upload and share various media content like images, music, and videos.

Signup and view all the flashcards

Microblogging Sites

Platforms emphasizing short, frequent updates from users, often with a limited character count, allowing subscribers to follow these updates.

Signup and view all the flashcards

Blogs and Forums

Sites that enable users to create and publish content, often in the form of blog posts, articles, or forum discussions, with a focus on user-generated content.

Signup and view all the flashcards

Internet Safety

Refers to the safety and security of personal information while using the internet.

Signup and view all the flashcards

Netiquette

A set of guidelines for appropriate behavior and communication within online communities.

Signup and view all the flashcards

Remember the Human

The first rule of netiquette emphasizes remembering that you are communicating with real people, even though you might not see or hear them directly.

Signup and view all the flashcards

Social Media

A website, application, or online channel that enables users to create, co-create, discuss, modify, and exchange user-generated content.

Signup and view all the flashcards

Social Networks

A website that allows users to connect with others with similar interests or backgrounds. It enables profile creation, adding friends, and sharing content.

Signup and view all the flashcards

Web 2.0

The evolution of Web 1.0, featuring dynamic pages that allow users to interact and contribute content. This web version allows commenting, creating user accounts, and personalized experiences.

Signup and view all the flashcards

Folksonomy

A website that allows users to categorize and classify information using freely chosen keywords. This is common in social media, where users add tags to content.

Signup and view all the flashcards

Semantic Web

The concept of machines or servers understanding user preferences to deliver personalized web content.

Signup and view all the flashcards

Convergence

The combination of different technologies working together to achieve a common goal.

Signup and view all the flashcards

Software as a Service (SaaS)

A type of website or online service where users access software and applications online via subscription rather than purchasing them. This allows for easier access and updates.

Signup and view all the flashcards

Static Web Pages

Websites with fixed, static content that doesn't change based on user interactions.

Signup and view all the flashcards

Study Notes

Introduction to ICT

  • Information and communication technology (ICT) involves using various communication technologies like phones, the internet, etc., to process and share information.
  • ICT studies computers as tools for processing data and fundamental computer system use in internet environments.
  • The Philippines is an ICT hub of Asia due to the growth of ICT-related jobs like Business Process Outsourcing (BPO).
  • The ICT department in the Philippines plans, develops, and promotes ICT for national development.

Computers and the Internet

  • Computers are electronic devices that process data in binary form using variable programs.
  • The Internet is a global network connecting billions of devices using TCP/IP.
  • The internet allows connecting computers across the world via routers and servers.

World Wide Web

  • The World Wide Web is an information system on the internet.
  • Hypertext links connect documents enabling users to navigate information.

Web Pages

  • Web pages are hypertext documents connected to the World Wide Web.
  • Various versions of webpages exist, including Web 1.0 (static pages), Web 2.0 (dynamic pages with user interaction), and Web 3.0 (semantic web).
  • Convergence involves combining different technologies for similar tasks (e.g., using smartphones for word processing).
  • Social media platforms facilitate user-generated content creation, modification, and exchange.

Types of Social Media

  • Social Networks: Sites for connecting people with common interests (e.g., Facebook).
  • Bookmarking Sites: Allowing users to store and manage links to websites (e.g., Pinterest).
  • Social News: Sites allowing users to post and comment on news items (e.g., Reddit).
  • Media Sharing: Sites for uploading and sharing media content (e.g., YouTube).
  • Microblogging: Focuses on short updates (e.g., Twitter).
  • Blogs and Forums: Platforms for posting and discussing content.

Mobile Technologies

  • Smartphones and tablets are increasingly popular, replacing some tasks previously performed on computers.

Online Safety and Netiquette

  • Internet safety involves protecting personal information online.
  • Netiquette encompasses online communication etiquette (e.g., respectful communication, avoiding flaming).

Internet Security

  • Cybercrime refers to crimes committed using the internet.
  • Malware includes malicious software like viruses, worms, Trojans, spyware, adware, and spam.
  • Phishing involves acquiring personal information through fraudulent means.
  • Security measures like strong passwords and updated software are crucial.

Virus stages

  • A virus's life cycle includes dormant, propagation, triggering, and execution phases.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Module: E-Tech Week 1 & 2 PDF

More Like This

History of the Internet
8 questions

History of the Internet

AmusingGyrolite1402 avatar
AmusingGyrolite1402
La navegación por Internet
16 questions
Internet de las Cosas (IoT) Básico
8 questions
Use Quizgecko on...
Browser
Browser