IT & Security Fundamentals

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

A photographer needs to remove a small, unwanted object from an otherwise perfect landscape photo. Which image manipulation technique would be MOST suitable for this task?

  • Cropping
  • Applying Filters
  • Cloning (correct)
  • Color Balance

An organization implements a strategy to classify data and determine necessary safeguards. Which security method does this BEST describe?

  • Systems Advertising Platforms
  • End-User Education
  • Disaster Recovery and Business Continuity
  • Operational Security (OPSEC) (correct)

A marketing team wants to create an infographic to present their company's annual sales data. Which guideline is MOST critical for ensuring the infographic effectively communicates the information?

  • Maintaining a clear and concise message focused on the main point. (correct)
  • Employing complex chart types to showcase the sophistication of the data.
  • Prioritizing aesthetic appeal over data accuracy.
  • Using a wide variety of fonts to maintain visual interest.

Which of the following scenarios exemplifies the PRIMARY goal of disaster recovery and business continuity planning?

<p>Restoring normal operational capacity after a significant data loss incident. (D)</p> Signup and view all the answers

A web design company is tasked with creating a website for a client whose audience primarily uses mobile devices. Which web design approach would be MOST appropriate to ensure optimal user experience?

<p>Responsive Web Design (C)</p> Signup and view all the answers

A company wants to improve its overall cybersecurity posture. What initiative would MOST directly contribute to achieving this goal?

<p>Implementing a robust end-user education program. (D)</p> Signup and view all the answers

A designer is creating an infographic about climate change. They have a lot of data to present, including temperature trends, sea level rise, and changes in species distribution. Which of the following is the MOST important consideration for effectively visualizing this data?

<p>Choosing chart types that accurately represent the data and highlight key trends. (A)</p> Signup and view all the answers

A photographer wants to create a dramatic black and white portrait from a color photograph. Besides simply removing color, what other image manipulation techniques could enhance the final result?

<p>Adjusting brightness and contrast to create a wider tonal range. (B)</p> Signup and view all the answers

According to Andreessen's definition, which of the following would NOT be considered a platform?

<p>A closed source appliance with no user programmable features (D)</p> Signup and view all the answers

Which of the following BEST describes the overarching goal of cybersecurity?

<p>To protect data in all its forms from theft and damage. (A)</p> Signup and view all the answers

A company experiences a data breach. Besides restoring data, what else should the disaster recovery and business continuity plan address?

<p>Returning to the same operational capacity as before the incident. (A)</p> Signup and view all the answers

An employee receives an email asking for sensitive company data. Which aspect of cybersecurity education would MOST help them respond appropriately?

<p>Awareness of phishing techniques and reporting procedures. (D)</p> Signup and view all the answers

A small business wants to improve data protection without hiring new staff. What is the MOST effective initial step they should take?

<p>Implementing a comprehensive end-user education program. (A)</p> Signup and view all the answers

A server uses which mechanism to identify a returning user and provide them with personalized information?

<p>Unique Cookie ID (D)</p> Signup and view all the answers

Which of the following actions is most crucial for maintaining a respectful online environment?

<p>Being mindful of your language and tone in online communications. (D)</p> Signup and view all the answers

Which of the following is the MOST comprehensive security measure to protect your online accounts?

<p>Enabling multi-factor authentication on all accounts that offer it. (C)</p> Signup and view all the answers

What is the primary purpose of 'netiquette' in online communications?

<p>To promote polite and proper online behavior. (D)</p> Signup and view all the answers

Which cyber threat involves deceiving individuals into providing sensitive information through disguised communications?

<p>Phishing (A)</p> Signup and view all the answers

Why are internet cookies primarily used by web servers?

<p>To identify a computer as it uses a network and improve the browsing experience. (C)</p> Signup and view all the answers

In graphic design, what aspect does 'layout' primarily address?

<p>The arrangement of visual elements on a page. (D)</p> Signup and view all the answers

Which process is specifically aimed at correcting color imperfections to match real-world visual perception?

<p>Color Correction (C)</p> Signup and view all the answers

What type of cyber threat is characterized by encrypting a victim's data and demanding payment for its release?

<p>Ransomware (D)</p> Signup and view all the answers

What distinguishes Web 2.0 from its predecessor?

<p>Emphasizes user-generated content, usability, and interoperability. (A)</p> Signup and view all the answers

Which of the following scenarios exemplifies an insider threat?

<p>A disgruntled employee using their authorized access to steal company data. (A)</p> Signup and view all the answers

A photographer wants to evoke a feeling of nostalgia in their images. Which post-processing technique would be MOST suitable?

<p>Applying a color grade with warm tones and reduced contrast. (C)</p> Signup and view all the answers

In the context of essential productivity applications, which tool is best suited for creating and managing complex data sets and performing calculations?

<p>Google Sheets (B)</p> Signup and view all the answers

A graphic designer is creating a logo for a technology company. Which file format would be MOST suitable for ensuring scalability without loss of quality?

<p>Vector format (C)</p> Signup and view all the answers

Which of the following is a key feature of Web 2.0 that allows users to categorize and classify information using chosen keywords?

<p>Folksonomy (D)</p> Signup and view all the answers

How has the Internet most significantly transformed the way people conduct financial transactions?

<p>By enabling online banking and cashless transactions. (D)</p> Signup and view all the answers

To remove a telephone pole from the background of a photo, which image editing technique is MOST directly applicable?

<p>Image Background Removal (C)</p> Signup and view all the answers

Which of the following menu options would you use to access additional features and settings within an application?

<p>Menu Bar (A)</p> Signup and view all the answers

Which of the following is the MOST direct effect of 'user participation' as a key feature of Web 2.0?

<p>Users can contribute content through comments, reviews, and evaluations. (D)</p> Signup and view all the answers

In a 'Man-in-the-Middle' cyber attack, what is the primary activity of the attacker?

<p>Intercepting communication between two parties without their knowledge. (B)</p> Signup and view all the answers

What does the 'Long Tail' concept refer to in the context of Web 2.0 services?

<p>Services that are offered on demand rather than as a one-time purchase. (C)</p> Signup and view all the answers

What was one of the internet’s first significant uses?

<p>Electronic mail (D)</p> Signup and view all the answers

How did Web 1.0 primarily deliver content to users?

<p>By utilizing static pages served directly from the server's file system. (B)</p> Signup and view all the answers

A student is conducting research for a school project. How can the internet BEST assist in this process?

<p>By providing access to a vast amount of information and resources on various subjects. (A)</p> Signup and view all the answers

Which of the following technological advancements is most closely associated with the shift from Web 1.0 to Web 2.0?

<p>Enhanced capabilities for users to generate and share content. (C)</p> Signup and view all the answers

What design element was commonly employed in Web 1.0 to structure and align items on a webpage?

<p>Tables and frames (D)</p> Signup and view all the answers

How does the internet facilitate improved communication?

<p>By enabling faster electronic communication. (A)</p> Signup and view all the answers

What distinguishes Information Technology (IT) from Information and Communication Technologies (ICT)?

<p>IT primarily involves problem-solving through technology, while ICT emphasizes communication technologies. (B)</p> Signup and view all the answers

A company is developing a new website. They want users to be able to interact with each other, share content, and create profiles. Which web generation's principles should they follow?

<p>Web 2.0 (D)</p> Signup and view all the answers

What fundamental capability did the Internet introduce, transforming global communication?

<p>The capacity for people to communicate and share information across vast distances. (B)</p> Signup and view all the answers

A small business wants to establish an online presence. Given limited resources and technical expertise, which approach aligns with Web 1.0 principles?

<p>Developing a static website with basic information about the business. (A)</p> Signup and view all the answers

Which scenario illustrates the use of Information and Communication Technologies (ICT)?

<p>A group of researchers collaborating on a project using video conferencing. (D)</p> Signup and view all the answers

Flashcards

Information Technology

Using technology to solve problems.

Information and Communication Technologies

Communication using telecommunications (Internet, phones).

Internet

A global network connecting computers worldwide.

Entertainment (via ICT)

Experiment with movies, games, and music.

Signup and view all the flashcards

Web 1.0

Allowed information display on websites, good for static pages.

Signup and view all the flashcards

Web 1.0 Design Elements

Static pages, server file system, SSI/CGI, frames and tables.

Signup and view all the flashcards

Web 2.0

Share info and communicate from anywhere.

Signup and view all the flashcards

Web 1.0 Technologies

Suitable for personal websites

Signup and view all the flashcards

World Wide Web (WWW)

A global website that emphasizes user-generated content, usability, and interoperability

Signup and view all the flashcards

Participatory Web

A social network that encourages user participation and interaction.

Signup and view all the flashcards

Folksonomy

Allows users to categorize and classify information using chosen keywords.

Signup and view all the flashcards

Rich User Experience

Content is dynamic and changes based on user input.

Signup and view all the flashcards

User Participation

Users can contribute their own content through comments, reviews, and evaluations.

Signup and view all the flashcards

Long Tail

Services are offered on demand rather than as a one-time purchase.

Signup and view all the flashcards

Online Banking

Securely transfer funds, change ATM PINs, and apply for credit cards online

Signup and view all the flashcards

Online Research

Conducting investigations and studies on various topics through the internet.

Signup and view all the flashcards

What defines a Platform?

Anything programmable qualifies; otherwise, it does not.

Signup and view all the flashcards

Online Platform Examples

Social media, search engines, and communication services.

Signup and view all the flashcards

Operational Security (OPSEC)

A security strategy classifying data to protect it from unauthorized access.

Signup and view all the flashcards

Disaster Recovery/Business Continuity

Returning an organization to its pre-incident operational capacity.

Signup and view all the flashcards

End-User Education

Enhancing employee understanding to protect data from threats.

Signup and view all the flashcards

Cybersecurity Importance

Safeguarding data from theft and damage.

Signup and view all the flashcards

Netiquette

Guidelines for polite and respectful online behavior.

Signup and view all the flashcards

Image Manipulation

Altering an image through various techniques.

Signup and view all the flashcards

Image Resizing

Changing the number of pixels, width, and height of an image.

Signup and view all the flashcards

Responsive Web Design

Adapting website layout based on the user's device resolution.

Signup and view all the flashcards

Infographics

Visual representations of data, combining visuals, text, and data.

Signup and view all the flashcards

Visual Hierarchy

The order in which the eye perceives what it sees.

Signup and view all the flashcards

Malware

Malicious software that gains unauthorized access or damages computer systems.

Signup and view all the flashcards

Ransomware

Malware that locks files/systems and demands payment for their release.

Signup and view all the flashcards

Phishing

Deceptive emails/messages that appear legitimate but seek sensitive info.

Signup and view all the flashcards

Insider Threats

Current/former members abusing their access rights to information.

Signup and view all the flashcards

Man-in-the-Middle Attacks

An attack where a cybercriminal intercepts communication between two parties.

Signup and view all the flashcards

Internet Cookies

Small files used to identify your computer and improve browsing experience.

Signup and view all the flashcards

Respect Privacy

Treat others with respect, especially regarding their personal information.

Signup and view all the flashcards

Word Processing

Software used for creating and editing documents.

Signup and view all the flashcards

Cookie (Data)

Data stored on your computer, created by a server to identify you during connections.

Signup and view all the flashcards

Online Safety Tips

Ensuring a safe internet connection, strong passwords, multi-factor authentication, updated software, and verifying website reliability.

Signup and view all the flashcards

Image (Data)

A binary representation of visual information.

Signup and view all the flashcards

Layout (Graphics)

Design and arrangement of visual elements on a page.

Signup and view all the flashcards

Image Background Removal

Eliminating or changing the backdrop of an image or video.

Signup and view all the flashcards

Color Correction

Fixing the color properties to match real-world human vision accuracy.

Signup and view all the flashcards

Color Grading

Setting the mood or ambiance of a piece through color manipulation.

Signup and view all the flashcards

Study Notes

Information and Communication Technologies

  • Information technology uses technology to solve problems
  • Information and communication technologies allow communication with others using telecommunications like the Internet and cellular phones

Internet

  • The Internet is a vast network connecting computers worldwide
  • People can share information and communicate from anywhere with an Internet connection
  • The World Wide Web (WWW) is part of the Internet

Uses of the Internet

  • Securely transfer funds between accounts, change ATM pins, and apply for credit cards through online banking and cashless transactions
  • Research a subject in a few minutes
  • Internet's first significant use was electronic mail (email)
  • Email enables quick communication and easy sharing of information and data files
  • Social networking connects people worldwide
  • Individuals can share information, thoughts, and ideas

Entertainment

  • Entertainment options include watching movies, playing online games, and listening to music

Evolution of the Internet: WEB 1.0

  • WEB 1.0 allowed information to be displayed on websites
  • WEB 1.0 was suitable for personal websites
  • In WEB 1.0, users were charged based on the number of pages viewed
  • WEB 1.0 allowed users to search for information
  • WEB 1.0 design elements included static pages
  • WEB 1.0 design elements included the server file systems used to serve content
  • WEB 1.0 design elements included pages created with Server Side Includes (SSI) or Common Gateway Interface (CGI)
  • WEB 1.0 design elements included items on pages positioned and aligned using frames and tables

Evolution of the Internet: WEB 2.0

  • WEB 2.0 refers to global websites emphasizing user-generated content, usability, and interoperability
  • WEB 2.0 refers to a participatory social network
  • WEB 2.0 allows users to categorize and classify information using chosen keywords (folksonomy)
  • WEB 2.0 content is dynamic and responsive to user input, creating a rich user experience
  • WEB 2.0 allows user participation, enabling users to place content and offer comments, reviews, and evaluations
  • WEB 2.0 long tail services are offered on demand rather than as a one-time purchase
  • WEB 2.0 presents software as a service, where users subscribe only when needed rather than purchasing
  • WEB 2.0 promotes diverse information sharing through universal web access

Evolution of the Internet: WEB 3.0

  • WEB 3.0 evolves web use and transforms the Web into a database
  • WEB 3.0 refers to a number of distinct evolutions of web usage and interaction
  • In WEB 3.0, data is shared, not owned
  • WEB 3.0 is called the "Semantic Web," which aims to organize information logically
  • WEB 3.0 allows creation, sharing, and connection of content via search and analysis based on understanding the meaning of words (semantic web)
  • WEB 3.0 computers can distinguish data like humans, providing relevant and timely results (artificial intelligence)
  • WEB 3.0 uses 3-dimensional design in museum guides, computer games, ecommerce, etc (3D graphics)
  • WEB 3.0 connects information through semantic metadata, advancing user experience (connectivity)
  • WEB 3.0 allows multiple applications to access content, connecting every device and making services available anywhere (ubiquity)

Platform

  • Definition: "If you can program it, then it is a platform. If you cannot, then it is not." - Marc Andreessen
  • Online platform categories include:
    • Social Media
    • Search Engines
    • Communication Services
    • Service Payment
    • Systems Advertising Platforms
    • Creative Content Outlets

System

  • A system consist of principles of procedures according to which something is done in an organized scheme or method
  • Online system functions include storing, managing, using, and gathering data

Internet of Things (IoT)

  • IoT is the assemblage of physical objects with sensors and software enabling interaction with little human intervention by collecting and exchanging data via a network

Cybersecurity

  • Cybersecurity prevents harmful assaults on computers, servers, mobile devices, electronic systems, networks, and data

Categories of Cybersecurity:

  • Network security prevents unwanted access, abuse, and theft of the underlying networking infrastructure
  • Application security protects against data or code theft/manipulation at the application level, covering security before and after deployment
  • Information security (InfoSec) safeguards critical business data against unauthorized access, abuse, interruption, and destruction
  • Operational security (OPSEC) classifies data to safeguard it, keeping it out of the wrong hands
  • Disaster recovery and business continuity handles how an organization responds to a cyber-security incident or event that causes loss of operations or data, to return to the same operating capacity as before an incident
  • End-user education increases employee awareness, providing them with knowledge and abilities to safeguard their own data and the firm's data from any incident or harm

Importance of Cybersecurity

  • Protects all aspects of data from theft and damage
  • A cybersecurity program is essential for a firm or organization to survive
  • Safeguards organizations and individuals against potential disasters from security breaches

Common Cyber Threats:

  • Malware is malicious software that provides unauthorized access or causes damage to computers
  • Ransomware locks down files, data, and systems, and threatens to destroy data unless a ransom is paid
  • Phishing includes online scams, emails, or text messages that appear legitimate but ask for sensitive information
  • Insider threats come from current or former members of an organization who abuse their access rights
  • Man-in-the-middle attacks involve a cybercriminal intercepting communications

Cookies (Internet Cookies)

  • Cookies are small files of information a web server generates and sends to a web browser
  • Cookies identify your computer as you use a network
  • Used to identify specific users and improve their web browsing experience
  • Data in a cookie is created by the server upon connection and labeled with a unique ID for your computer
  • When data is exchanged between computers and the network server, the server reads the ID and knows what information to specifically give you

Basic Online Safety Tips

  • Use a secure internet connection
  • Choose strong passwords
  • Enable multi-factor authentication
  • Keep software and operating systems updated
  • Check the website's reliability

Netiquette (Etiquette for the Internet)

  • A new term made up from the combined terms "Net" and "Etiquette"
  • Netiquette sets standards of behavior for polite and proper online conversation
  • Netiquette are suggestions rather than laws

Netiquette's Golden Rules

  • Respect people's privacy
  • Be mindful of your language
  • Don't be sarcastic
  • Choose emojis carefully
  • Respect others views

Computer Navigations

  • Basic review includes:
    • Windows / Tabs
    • Menu Bar
    • Navigation Button
    • Function Buttons
    • Dropdown Menu / Options
    • Hover Options
    • Sidebar / Toolbar
    • Workspace
    • Clickable Data

Essential Productivity Applications

  • Word Processing (Google Docs / Microsoft Word)
  • Spreadsheet (Microsoft Excel / Google Sheets)
  • Google Forms
  • Schedule Management (Google Calendar)
  • Community Profiling (Google Earth)

Imaging and Design for Online Environment

  • An image is a binary representation of visual information, i.e., drawings, pictures, graphs
  • Graphics refer to a design or visual image displayed on various surfaces
  • Layout is a part of graphic design concerning the arrangement of visual elements on a page
  • Image is a binary representation of visual information, i.e., drawings, pictures, graphs
  • Image background removal eliminates/alters the backdrop of an image or video

Color Correction & Grading

  • Color correction fixes the color properties of an image, so it looks the same as in the real world
  • Color grading sets the piece's mood or ambiance

Nine Image Manipulation Techniques:

  • Cropping
  • Color Balance
  • Brightness and Contrast
  • Compression and Resizing
  • Filters
  • Cloning
  • Changing the Background
  • Removing the Color
  • Combining Text, Graphics, and Image

Web Design

  • Web design refers to the overall design of a website
  • Web design concerns user experience more than software development
  • Website Design:
    • Adaptability to device resolution (responsive web design)
    • Adaptive web design is similar but tailors the information differently

Infographics

  • Infographics are visual representations of information, designed to make complex data accessible and engaging
  • Infographics combine visuals, text, and data, effectively communicating complex ideas ideal for simplifying heavy information

Rules of Infographics

  • Clear and Concise Message
    • Identify the Main Point
    • Keep it Simple
  • Prioritize Information (visual hierarchy)
  • Effective Use of Color
    • Color Psychology
    • Color Palette
  • Typography
    • Font Choice
    • Font Size and Style
  • Data Visualization
    • Choose the Right Chart Type
    • Data Accuracy
  • Maintain Consistency

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

ICT102 Reviewer PDF
Use Quizgecko on...
Browser
Browser