Untitled
24 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which technology relies on principles of physics, rather than mathematics, for encoding and decoding information to ensure privacy and security?

  • Biometrics
  • Quantum cryptography (correct)
  • 3D imaging and holography
  • Computer-assisted translation

A company wants to enhance its online presence by creating interactive, three-dimensional models of its products. Which technology would be most suitable for this purpose?

  • E-commerce
  • Computer Assisted Translation
  • Virtual Reality (correct)
  • Social Media

A school aims to provide a comprehensive digital learning environment for teachers, students, and parents. This environment should include tools for delivering educational content, managing student progress, and facilitating communication. Which platform would best suit these needs?

  • Online video platform
  • E-commerce platform
  • Social Media platform
  • Online learning platform (correct)

Which of the following actions constitutes cyberstalking?

<p>Harassing an individual through electronic communication (A)</p> Signup and view all the answers

Which of the following scenarios best describes identity theft?

<p>Using someone's personal information to open a credit card. (A)</p> Signup and view all the answers

Which scenario is the clearest example of cyberbullying?

<p>Repeatedly harassing someone online via hateful messages. (A)</p> Signup and view all the answers

A user receives an email that appears to be from their bank, requesting them to update their personal information by clicking on a provided link. Upon closer inspection, the user notices that the email address is slightly different from the bank's official address and the link seems suspicious. What type of internet threat does this scenario likely represent?

<p>Phishing (C)</p> Signup and view all the answers

A person discovers that someone has created a fake social media profile using their name and photo, and is posting inappropriate content that damages their reputation. This situation is an example of:

<p>Identity Theft (B)</p> Signup and view all the answers

Which type of malware disguises itself as a legitimate program to gain access and control of a user's computer?

<p>Trojan (B)</p> Signup and view all the answers

A user's computer is displaying numerous unwanted advertisements that are difficult to close. This is most likely caused by which type of malware?

<p>Adware (A)</p> Signup and view all the answers

Which of the following best describes the primary function of ransomware?

<p>Block user access to files or systems and demand payment for their release. (A)</p> Signup and view all the answers

What is the main purpose of 'netiquette' guidelines?

<p>To establish standards for ethical and respectful online behavior. (A)</p> Signup and view all the answers

Which of the following activities is explicitly covered and prohibited by Republic Act 10627, also known as the Anti-Bullying Act of 2013?

<p>Bullying behavior directed towards students in schools. (C)</p> Signup and view all the answers

Which cyberattack method involves using deceptive emails and websites to acquire sensitive personal information?

<p>Phishing (D)</p> Signup and view all the answers

Which of the following scenarios best exemplifies the use of ICT in education?

<p>A teacher conducting a virtual class using video conferencing and online resources. (D)</p> Signup and view all the answers

A small business owner in the Philippines wants to expand their reach to international customers. Which ICT application would be MOST beneficial for achieving this?

<p>Creating an e-commerce website and utilizing social media marketing. (B)</p> Signup and view all the answers

How do worms primarily spread from one computer to another?

<p>By exploiting network vulnerabilities to self-replicate. (C)</p> Signup and view all the answers

How might Artificial Intelligence (AI) be integrated into the banking and finance sector to improve customer service?

<p>By using AI-powered chatbots to answer customer queries and provide personalized financial advice. (D)</p> Signup and view all the answers

Which of the following is an accurate description of Republic Act 10175, also known as the Cybercrime Prevention Act of 2012?

<p>A law that protects individuals from various unwanted online cyber acts. (C)</p> Signup and view all the answers

Considering the Philippines' status as the 'ICT Hub of Asia,' which of the following is the MOST likely reason for this designation?

<p>The significant growth of ICT-related jobs, especially in the BPO sector. (B)</p> Signup and view all the answers

A marketing company wants to understand how Filipinos spend their time online. Based on the provided data, which online activity should they prioritize when creating targeted advertisements?

<p>Social media engagement and online video consumption. (D)</p> Signup and view all the answers

A hospital wants to improve its patient care using ICT. Which of the following options would contribute MOST to achieving this goal?

<p>Implementing electronic health records and telemedicine services. (C)</p> Signup and view all the answers

A local government unit (LGU) aims to use ICT to improve transparency and citizen engagement. What is the MOST effective strategy to accomplish this?

<p>Developing a citizen portal for accessing government information and services, and using social media for announcements. (B)</p> Signup and view all the answers

In what way do robotics and artificial intelligence (AI) differ in their primary function?

<p>Robotics creates devices that react to sensory input, while AI aims to make computers think and act like humans. (D)</p> Signup and view all the answers

Flashcards

ICT (Information and Communication Technology)

Technologies (hardware and software) enabling communication.

ICT in Education

Using ICT for teaching and learning.

ICT in Business

Using ICT to facilitate trade, customer relations, and internal operations.

ICT in Government

Using computer systems in public administration, services

Signup and view all the flashcards

ICT in Medicine

Using ICT for diagnostics, treatment, patient records.

Signup and view all the flashcards

ICT Hub of Asia

Center for ICT-related Jobs

Signup and view all the flashcards

Artificial Intelligence (AI)

Computer science focused on making computers act like humans.

Signup and view all the flashcards

Robotics

Creating devices that move and react to sensory input.

Signup and view all the flashcards

Biometrics

Technology to measure and analyze body characteristics (DNA, fingerprints, etc.).

Signup and view all the flashcards

Quantum cryptography

Encoding/decoding information using physics, not mathematics, for privacy and security.

Signup and view all the flashcards

Computer assisted translation

Using computers to help translate languages.

Signup and view all the flashcards

3D imaging and holography

A technique using light to project objects in a 3D way.

Signup and view all the flashcards

Virtual Reality

A computer-generated environment that can be explored and interacted with.

Signup and view all the flashcards

Social Media

Applications/websites for communication, content sharing, and online communities.

Signup and view all the flashcards

E-commerce

Software that allows businesses to open stores on the internet.

Signup and view all the flashcards

Online safety

Practices to be safe on the internet and protect your information.

Signup and view all the flashcards

Virus

A malicious program that replicates itself and spreads to other computers through various means.

Signup and view all the flashcards

Worm

A malicious program that self-replicates and spreads to other computers, often automatically.

Signup and view all the flashcards

Trojan

A malicious program disguised as a legitimate application, but takes control of the user's computer.

Signup and view all the flashcards

Spyware

A program that secretly gathers information from a victim's computer and sends it to the attacker.

Signup and view all the flashcards

Adware

Unwanted advertisements that appear frequently on a user's computer.

Signup and view all the flashcards

Ransomware

Malware that blocks access to a user's files or system and demands payment for their release.

Signup and view all the flashcards

Spam

Unsolicited or junk email sent in bulk, often used for advertising or spreading malware.

Signup and view all the flashcards

Phishing

A cyber attack using deceptive emails and websites to steal personal information.

Signup and view all the flashcards

Study Notes

  • ICT stands for information and communication technology.

Introduction to ICT

  • This chapter covers the nuances of online platforms, sites, and content.
  • This chapter goes over online safety, security, ethics, and etiquette standards when using ICT.
  • This chapter covers using the internet for credible research and information.

What is ICT?

  • The term information and communication technology (ICT) refers to the technologies, both hardware and software, that enables humans to communicate with one another.
  • ICT includes the use of computers, radio, television, cellular or mobile phones, network hardware and software, internet connection, satellite systems, and application needed for video conferencing and distance learning in education.

Components of ICT

  • Cloud computing is a term generally used to describe data centers available to many users over the internet.
  • Software is a set of instructions, data, or programs used to operate computers and execute specific tasks.
  • Hardware refers to the physical elements that make up a computer or electronic system including the monitor, hard drive, memory, and the CPU.
  • Digital transactions are online or automated transactions that occur between people and organizations without the use of paper.
  • Communications technology, also known as information technology, refers to all equipment and programs that are used to process and communicate information.
  • Digital data represents other forms of data using specific machine language systems that can be interpreted by technologies.
  • Internet access involves connecting to the internet using personal computers, laptops, or mobile devices by users or enterprises, and is subject to data signaling rates.

Uses of ICT

  • ICT is used in Education
  • ICT is used in Business
  • ICT is used in Government
  • ICT is used in Medicine
  • ICT is used in Banking & Finance
  • ICT is used in Entertainment
  • ICT is used in Transportation

ICT in the Philippines

  • There are 119 million mobile phone subscriptions in the Philippines.
  • There are 47 million active Facebook accounts in the Philippines.
  • Filipinos spend 3.2 hours online on mobile and 5.2 hours online on desktop/tablet.
  • The Philippines is the fastest-growing app market in Southeast Asia and has the highest digital population in the world.
  • The top online activities are social media, videos, online mobile games, location-based search, and online shopping.
  • Filipinos have a fundamental need to stay connected with loved ones, friends, and relatives.
  • The Philippines is dubbed the "ICT Hub of Asia" because of the huge growth of ICT-related jobs.
  • One ICT-related job is Business Process Outsourcing, or call centers.

Emerging Technologies

  • Artificial Intelligence (AI) makes computers work and act like humans.
  • Robotics computer science and engineering creates devices that move and react to sensory input.
  • Biometrics is a technology used to measure and analyze human body characteristics such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns, etc.
  • Quantum cryptography is the science of encoding and decoding information or messages which depends on physics, not mathematics and is used for information privacy and security.
  • Computer Assisted Translation uses computers to assist in the translations of one or more natural languages into another or others, and vice versa.
  • 3D imaging and holography is a photographic technique that uses light to project objects in a way that appears three dimensional.
  • Virtual reality describes a three-dimensional computer-generated environment that can be explored and interacted with by a person.

Common Online Platforms

  • Social media is an application and website where users can communicate, create and share content, and participate in online communities.
  • E-commerce is a collection of software technologies that allows merchants to create a storefront on the internet.
  • An online learning platform is an incorporated set of interactive online services that provides the teachers, learners, parents, and others involved in the education sector with tools and resources to support and enhance the delivery management of education through the internet.
  • An online video platform is a service providing end-to-end tools used to create, customize, publish, and manage videos online.

Online Safety

  • Online safety refers to the practices and precautions that should be observed when using the internet to ensure that users, their computers, and personal information are safe from crimes associated with using the internet.
  • Internet safety refers to the online security or safety of people and their information when using the internet.

Internet Risk

  • Cyber bullying happens when someone is intentionally abused, harassed, and mistreated by another person using electronic communication.
  • Sexting is the act of sending sexually explicit text messages, images, and videos.
  • Cyber stalking is a criminal practice where electronic communication is used to stalk or harass an individual or group.
  • Identity theft is a crime of stealing personal information to assume a person's name or identity in order to make any form of transactions.

Internet Threats

  • Malware is any malicious software, program, or file that is harmful to a computer user.
  • A virus is a malicious program designed to replicate itself and transfer from one computer to another via the internet, local networks, FDs, CDs, etc.
  • Worms are a malicious program that copy itself and spreads to computers; an Example is the I Love You virus.
    • Onel de Guzman, 24 years old, studied at AMA computer college in Manila and created the "I LOVE YOU" virus/worms.
  • A trojan is a malicious program accepted by the user as it disguises itself as a legitimate program but takes control of the user's computer.
  • Spyware is a malicious program that gathers information from the victim's computer and sends it back to the hacker.
  • Adware is an unwanted advertisement that pop ups several times on the victim's computer, then behave abnormally and becomes tedious to close.
  • Ransomware is a ransom virus that blocks the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus.
  • Spam, also known as junk email, is an unwanted email sent by an advertiser or bot and can be used to spread malware.
  • Phishing is a cyberattack method using deceptive emails and websites to acquire sensitive personal information.
  • Cybercrime is a crime in which a computer is used as an object and tool in hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief, and others.

Cyber Laws

  • Republic Act 10627, or the Anti-Bullying Act of 2013, aims to protect children enrolled in kindergarten, elementary, and secondary schools and learning centers (collectively, "Schools") from being bullied.
  • Republic Act 10175 OR Cybercrime Prevention Act of 2012, protects individuals from unwanted online cyber acts that may harm or evade one's privacy or integrity.

Netiquette

  • Netiquette are the guidelines of acceptable behavior while using internet resources.
  • Ten Rules of Netiquette:
    • Remember the human.
    • Adhere to the same standards of behavior online that you follow in real life.
    • Know where you are in cyberspace.
    • Respect other people's time and bandwidth.
    • Make yourself look good online.
    • Share expert knowledge.
    • Help keep flame wars under control.
    • Respect other people's privacy.
    • Don't abuse your power.
    • Be forgiving of other people's mistakes.
  • Online search is the process of interactively searching for and retrieving requested information via a computer from databases that are online.
  • Interactive searches became possible in the 1980s with the advent of faster databases and smart terminals.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Untitled Quiz
6 questions

Untitled Quiz

AdoredHealing avatar
AdoredHealing
Untitled
44 questions

Untitled

ExaltingAndradite avatar
ExaltingAndradite
Untitled Quiz
18 questions

Untitled Quiz

RighteousIguana avatar
RighteousIguana
Untitled Quiz
50 questions

Untitled Quiz

JoyousSulfur avatar
JoyousSulfur
Use Quizgecko on...
Browser
Browser