🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Eng_TIC_L2.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

INFORMATION AND COMMUNICATION TECHNOLOGY LABORATORY STAGE 2 “INDUSTRY 4.0 TECHNOLOGIES” Name: Student ID: Group: Select the correct answer for each question. 1.-It i...

INFORMATION AND COMMUNICATION TECHNOLOGY LABORATORY STAGE 2 “INDUSTRY 4.0 TECHNOLOGIES” Name: Student ID: Group: Select the correct answer for each question. 1.-It is a new transformation of the Industry that is aimed at the automation, digitalization and integration of all its processes. A. Industry 4.0 B. 3D Printing C. Internet of things D. Autonomous Robots 2.- They are those that have the ability to execute activities and tasks without the need for some type of command or control given by the human being. A. Industry 4.0 B. 3D Printing C. Internet of things D. Autonomous Robots 3.-________________________________ is an example of an autonomous robot that has managed to automate dynamic tasks such as warehouse routes or the transportation of raw materials. A. Industry 4.0 B. 3D Printing C. Internet of things D. Autonomous Robots 4.- They are Autonomous robots that fulfill the functions of personal assistants and social services, they act as humanoids by being able to distinguish actions as direct as tickling. A. Service robots B. Rescue and Emergency Robots C. Spacial Exploration Robots D. Robots for people with disabilities 5.- Autonomous Robots that carry out exploration, repair and experimentation activities both on land and in space. A. Service robots B. Rescue and Emergency Robots C. Spacial Exploration Robots D. Robots for people with disabilities 6.- Robots that allow them to adapt to the environments of a house and allow people with reduced mobility to be able to move around the rooms. A. Industrial Autonomous Robots B. Rescue and Emergency Robots C. Spacial Exploration Robots D. Robots for people with disabilities 7.- Robots that allow help through a human operator, allowing large objects to be lifted in order to rescue people in trouble after an emergency. A. Industrial Autonomous Robots B. Rescue and Emergency Robots C. Spacial Exploration Robots D. Robots for people with disabilities 8.- Autonomous Robots that carry out specific activities such as those dedicated to carrying out work in some automotive assembly industries. A. Industrial Autonomous Robots B. Rescue and Emergency Robots C. Spacial Exploration Robots D. Robots for people with disabilities 9.- It allows printing three-dimensional solid objects, one of its great applications is in the area of medicine, where robotic prostheses, tissues similar to human skin, bones, etc. are manufactured. A. 3D Printer B. 3D Printing C. Internet of things D. Autonomous Robots 10.- Device that has the ability to create three-dimensional solid physical bodies by adding layer by layer of some specific material. A. 3D Printer B. 3D Printing C. Internet of things D. Autonomous Robots 11.- It is a digital interconnection network between devices where the exchange of data flows between each of them. A. 3D Printer B. 3D Printing C. Internet of things D. Artificial Intelligence 12.- It is defined as the ability of machines to imitate human intelligence. A. Augmented Reality B. Big Data C. Cibersecurity D. Artificial Intelligence 13.- It consists of mounting digital images on real images, allowing the user to obtain more relevant knowledge about their environment. A. Augmented Reality B. Big Data C. Cibersecurity D. Artificial Intelligence 14.- It is about taking care of the information, especially that which is used in projects with large and changing volumes of data, such as big data or artificial intelligence. A. Cloud Computing B. Big Data C. Cibersecurity D. Simulation 15.- It is the representation of something or some action where what can happen in reality is imitated. A. Cloud Computing B. Big Data C. Cibersecurity D. Simulation 16. It is made up of larger and more complex data sets that come from new data sources. A. Cloud Computing B. Big Data C. Cibersecurity D. Simulation 17. They are known as “The three Vs” A. Velocity, volume and variety B. Volume, velocity and variety C. Variant, velocity and volume D. Versions, velocity and variety 18. It refers to the amount of data. A. Variety B. Versions C. Volume D. Velocity 19. It is the rate at which data is received and (possibly) used. A. Variety B. Versions C. Volume D. Velocity 20. It refers to the various types of data available. A. Variety B. Versions C. Volume D. Velocity 21. It is a cloud computing service. This means that the computer no longer needs to have all the programs, software and data installed or saved, the network of computers that are part of the cloud take care of it. A. Cloud Computing B. Big Data C. Cibersecurity D. Systems of Integration 22. It allows the various platforms and company systems to connect to each other, sharing information and functioning as a single platform. A. Cloud Computing B. Big Data C. Cibersecurity D. Systems of Integration Help Laura to back up her information safely in the cloud. 23. Apart from OneDrive, what other application could be useful for Laura to store her information in a simple way in the cloud? A. Sway B. Excel C. Google Drive D. Office 365 24. How could she access the application? A. With the registration B. With the Google account C. With the university email D. With the Outlook account 25. Laura wants to create folders to organize her files. Which button should she go to? A. Upload File B. Upload Folder C. My Unit D. New 26. Which of the options on the “New” button would be useful for Laura to upload her individual files? A. Upload File B. Upload Folder C. My Unit D. New 27. It’s a quick way for Laura to upload files from her computer directly to Google Drive. A. Erase and paste B. Select and Drag C. Drag and Drop D. Copy, Paste Match each statement with its answer. 28.(_____) It is designed to spread from one host to another A. Spam and has the ability to replicate itself. 29.(_____) It is a computer term that distinguishes a set of B. Hacking techniques that seek to deceive a victim by generating trust. 30. (_____) They are characterized as illegal activity by C. Malware cybercriminals, motivated by obtaining profit, gathering information and even just for “fun”. 31.(_____) It refers to activities that seek to compromise D. Rootkit and APT digital devices. (Advance Persistent Threats) 32.(_____) It consists of harmful computer programming A. Spyware scripts, designed to create or exploit vulnerabilities in a system. 33.(_____) It hides malicious software inside a file that seems B. Virus normal, its objective is to control the computer, steal data and introduce more malicious software. 34.(_____) It is a broad term that describes any malicious C. Malicious code program or code that is harmful to systems. 35.(_____) It is the electronic equivalent of spam. D. Phishing 36.(_____) Can monitor usage and browsing habits. A. Hackers 37.(_____) These are among the most serious cyberattacks B. Trojan that can result in a total and unconscious loss of control of the system. Complete the statements with the words from the box. Protection mechanisms Data protection Antivirus and antimalware software Software updates and Web content filtering Backups security patches Personal data Firewalls Access control Multi-factor User education and Network security authentication (MFA) awareness 38. _______________________ are all information that is related to our person and that identifies us or makes us identifiable. 39. ________________________ refers to the practices, safeguards and fundamental principles put in place to protect your personal information and ensure that you remain in control of it. 40. These _________________________ not only seek to prevent and detect attacks, but also mitigate their impact and facilitate recovery in the event of a security breach. 41. _______________________ act as barriers between an organization's internal network and the Internet. 42. _________________________ these programs scan and detect viruses, Trojans and other types of malware on computer systems. 43.____________________________________________ are crucial to closing known vulnerabilities that could be exploited by cybercriminals. 44. ___________________________ are a type of tool that blocks access to known malicious websites and can prevent the unintentional download of malware. 45. ____________________________ requires more than one form of authentication to verify the user's identity. 46. Conducting periodic backups of important data and having a disaster recovery plan can help restore information in the event of a successful attack. 47._______________________________________ is training employees on best practices in computer security. 48. ________________________________ is implementing security measures such as data encryption, VPNs, and network segmentation to protect communication integrity and data privacy. 49. Having a ________________________________ limits access to sensitive systems and data to authorized users only. Answer true or false as appropriate. 50. Digital citizenship is about groups of citizens who are using the Internet and ICTs to take ownership of reality, exercise their rights, or participate in social movements. __________________________________ 51. Digital rights are those that do not allow people to access, use, create, and publish digital media, as well as access and use computers, other electronic devices, and communications networks. ____________________________ 52.Each country develops its own Digital Rights Charter, but there are some general guidelines that all of them follow, such as: universal and equal access, freedom of expression, information and communication, privacy and data protection, right to anonymity and protection of minors. ______________________________ 53. Digital responsibility refers to the way in which we use digital technologies in a safe, ethical and responsible manner. _______________________________________________ 54. Education and awareness, respect and tolerance, protection of personal data, verification of information and active participation are not other factors of digital citizenship. __________________________________________ 55. Netiquette is the label used to communicate on the Internet. ____________________________________________ 56.Some of the rules that Netiquette contains are: remember what is human, follow the same standards of behavior on the Internet that you use in real life, know where you are in cyberspace, respect the time of others and respect the privacy of others. _______________________________________

Use Quizgecko on...
Browser
Browser