Empowerment Technology

Subdecks (1)

Cards (107)

  • What does Information and Communication Technology deal with?
    Use of different technological inventions
  • Why is the Philippines dubbed "The ICT Hub of Asia"?
    Due to its huge growth in ICT jobs
  • What is the goal of Information and Communication Technology?
    Having a unified way of communication
  • What is the Internet?
    Global system of interconnected networks
  • What protocol does the Internet use to communicate?
    Internet Protocol Suite (TCP/IP)
  • Who invented the World Wide Web?
    Tim Berners-Lee
  • What is the first stage of the World Wide Web called?
    The Web or Web 1.0
  • Why is Web 1.0 referred to as the "Read-only web"?
    It lacks interactivity and user manipulation
  • What characterizes Web 2.0?
    More interactive and user-centric web
  • What does the Semantic Web (Web 3.0) provide?
    Framework for sharing and reusing data
  • What are the features of Web 2.0?
    • Folksonomy: Collective classification using keywords
    • Rich User Experience: Dynamic content responsive to input
    • User Participation: Engagement and content contribution
    • Long Tail: On-demand offerings instead of one-time purchases
    • Software as a Service: Subscription-based software usage
  • What is a Trojan in terms of malware?
    Malware hiding in legitimate programs
  • What is the purpose of spyware?
    To gather information and violate privacy
  • What does a virus do?
    Infects and replicates on devices
  • How do worms differ from viruses?
    Worms replicate and spread without intervention
  • What is a rootkit?
    Malware used to control a computer
  • What is a botnet?
    Network of infected computers for attacks
  • What is a keylogger?
    Records keystrokes on a keyboard
  • What is phishing?
    Tricking people to reveal confidential information
  • What is spam?
    Unwanted bulk communication
  • How to identify malware/scams?
    • Check spelling, grammar, and punctuation
    • Analyze the URL for legitimacy
    • Look for inconsistencies in the message
  • What are tips to stay safe online?
    • Read privacy policies
    • Be mindful of shared information
    • Know security features of social networks
    • Avoid sharing passwords
    • Don't log into public WiFi
    • Don't talk to strangers online
    • Avoid posting future vacation plans
    • Add known friends only
    • Secure home WiFi with a password
    • Install antivirus software
    • Avoid downloading from untrusted sites
    • Purchase software legally
    • Don't click suspicious links
  • What does online safety refer to?
    Practices to protect users online
  • What types of information do we usually share online?
    • First name
    • Last name
    • Middle name
    • Schools attended
    • Cellphone number
    • Parent's name
    • Sibling's name
    • Address
    • Home phone number
    • Birthday
  • What is netiquette?
    Rules for behaving properly online
  • What are the 10 core rules of netiquette?
    1. Remember the human
    2. Adhere to real-life behavior standards
    3. Know your location in cyberspace
    4. Respect others' time and bandwidth
    5. Make yourself look good online
    6. Share expert knowledge
    7. Control flame wars
    8. Respect others' privacy
    9. Don't abuse power
    10. Be forgiving of mistakes
  • What is malware?
    Harmful software that damages devices
  • What are the types of malware?
    • Ransomware: Blocks access to data for ransom
    • Files Malware: Uses legitimate tools for attacks
    • Mobile Malware: Targets mobile devices
    • Wiper Malware: Erases data from devices
    • Adware: Generates revenue through ads
  • What is Canva used for?
    Designing graphics and presentations
  • What does the Magic Edit feature in Canva do?
    It uses AI to modify photos
  • What is the purpose of Magic Expand in Canva?
    To extend images in any direction
  • How does Magic Animation enhance designs in Canva?
    It automatically adds animations and transitions
  • What does Magic Media allow users to create?
    Images, graphics, and videos from descriptions
  • What is the function of Magic Design in Canva?
    Generates designs based on text prompts
  • What does Magic Switch do in Canva?
    Transforms a project into something new
  • What are Trojans in the context of malware?
    Malware that hides in legitimate programs
  • What is the purpose of spyware?
    To gather information and violate privacy
  • How do viruses operate on a computer?
    They infect and replicate themselves
  • What distinguishes worms from other malware?
    They replicate and spread without intervention
  • What are rootkits used for?
    To gain control over a computer or network