Save
...
12 | STEM
2nd Semester
Empowerment Technology
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Froggosaurus
Visit profile
Subdecks (1)
WQ2 Preparation
PISD - STEM SHS > 12 | STEM > 2nd Semester > Empowerment Technology
49 cards
Cards (107)
What does Information and Communication Technology deal with?
Use of different
technological
inventions
View source
Why is the Philippines dubbed "The ICT Hub of Asia"?
Due to its
huge
growth in ICT jobs
View source
What is the goal of Information and Communication Technology?
Having a
unified
way of communication
View source
What is the Internet?
Global system of
interconnected
networks
View source
What protocol does the Internet use to communicate?
Internet Protocol Suite
(
TCP/IP
)
View source
Who invented the World Wide Web?
Tim Berners-Lee
View source
What is the first stage of the World Wide Web called?
The Web or
Web 1.0
View source
Why is Web 1.0 referred to as the "Read-only web"?
It lacks
interactivity
and user manipulation
View source
What characterizes Web 2.0?
More
interactive
and user-centric web
View source
What does the Semantic Web (Web 3.0) provide?
Framework
for sharing and reusing data
View source
What are the features of Web 2.0?
Folksonomy
: Collective classification using
keywords
Rich User Experience
:
Dynamic content
responsive to input
User Participation: Engagement and content contribution
Long Tail
: On-demand offerings instead of one-time purchases
Software as a Service
: Subscription-based software usage
View source
What is a Trojan in terms of malware?
Malware hiding in
legitimate
programs
View source
What is the purpose of spyware?
To gather
information
and violate
privacy
View source
What does a virus do?
Infects and
replicates
on devices
View source
How do worms differ from viruses?
Worms
replicate
and spread without intervention
View source
What is a rootkit?
Malware
used to control a computer
View source
What is a botnet?
Network of
infected
computers for attacks
View source
What is a keylogger?
Records
keystrokes
on a keyboard
View source
What is phishing?
Tricking people to reveal
confidential
information
View source
What is spam?
Unwanted
bulk communication
View source
How to identify malware/scams?
Check spelling, grammar, and punctuation
Analyze the
URL
for legitimacy
Look for inconsistencies in the message
View source
What are tips to stay safe online?
Read
privacy policies
Be mindful of shared information
Know
security features
of social networks
Avoid sharing
passwords
Don't log into
public WiFi
Don't talk to
strangers
online
Avoid posting future
vacation plans
Add known
friends
only
Secure home WiFi with a password
Install
antivirus software
Avoid downloading from
untrusted sites
Purchase software legally
Don't click
suspicious links
View source
What does online safety refer to?
Practices to protect
users
online
View source
What types of information do we usually share online?
First
name
Last
name
Middle
name
Schools
attended
Cellphone number
Parent's
name
Sibling's
name
Address
Home phone number
Birthday
View source
What is netiquette?
Rules for
behaving properly online
View source
What are the 10 core rules of netiquette?
Remember the
human
Adhere to real-life behavior standards
Know your location in
cyberspace
Respect others' time and bandwidth
Make yourself look good online
Share
expert
knowledge
Control
flame wars
Respect others'
privacy
Don't abuse
power
10. Be forgiving of mistakes
View source
What is malware?
Harmful
software
that damages devices
View source
What are the types of malware?
Ransomware
: Blocks access to data for ransom
Files Malware
: Uses legitimate tools for attacks
Mobile Malware
: Targets mobile devices
Wiper Malware
: Erases data from devices
Adware
: Generates revenue through ads
View source
What is Canva used for?
Designing
graphics
and
presentations
View source
What does the Magic Edit feature in Canva do?
It uses
AI
to
modify
photos
View source
What is the purpose of Magic Expand in Canva?
To
extend
images
in
any
direction
View source
How does Magic Animation enhance designs in Canva?
It
automatically
adds
animations
and
transitions
View source
What does Magic Media allow users to create?
Images
,
graphics
, and
videos
from
descriptions
View source
What is the function of Magic Design in Canva?
Generates
designs
based
on
text prompts
View source
What does Magic Switch do in Canva?
Transforms
a
project
into
something
new
View source
What are Trojans in the context of malware?
Malware that hides in
legitimate
programs
View source
What is the purpose of spyware?
To gather
information
and violate
privacy
View source
How do viruses operate on a computer?
They
infect
and
replicate
themselves
View source
What distinguishes worms from other malware?
They
replicate
and spread without intervention
View source
What are rootkits used for?
To gain
control
over a computer or network
View source
See all 107 cards