ログイン

LIE

LIE
88問 • 2年前
  • Althea Fiona Amadeo
  • 通報

    問題一覧

  • 1

    The evolution in IT began in what year?

    1970

  • 2

    It combines the complementary strengths of a person and Information Technology

    Cognition Enhancers

  • 3

    It is more normal English language like and hence easier for the programmers to understand

    3GL

  • 4

    Thebfirst generation software application including compliers, device drivers and etc.

    Command line Programs

  • 5

    Were developed keeping in mind that they can be accessed from any location over internet

    Web application

  • 6

    It is closer to natural language than 3GL

    4GL

  • 7

    First generation program language

    Machine language

  • 8

    Mainly usef for artificial intelligence research

    4GL

  • 9

    A framework for creating interconnected web-like presentation of symbols

    Hypermedia

  • 10

    Enhanced human accomplishment by a division of labor the machine handles the routine mechanics of a task

    Empowering Environments

  • 11

    These are computers designed to placed on a desk

    Desktop

  • 12

    Hand-held telephones that can do things that computers do

    Smartphones

  • 13

    These include fitness trackers and smartwatches that can be worn throughout the day

    Wearables

  • 14

    These are latest television sets

    Smart TVs

  • 15

    It is single user computer but has more powerful microprocessor and a higher-quality monitor than a personal computer

    Workstation

  • 16

    A single- user computer based on microprocessor

    Personal Computer

  • 17

    An extremely fast computer that can perform millions of instructions per second

    Supercomputer

  • 18

    Powerful multi-user computer capable of supporting hundreds or thousands of users simultaneously

    Mainframe

  • 19

    A special computer designed for technical or scientific applications intended primarily to be used by one person at a time, they are commonly connected to a local area network and run multi-user operating systems

    Workstation

  • 20

    The genration of computer that started using vacuum tubes

    1st

  • 21

    ENIAC stands for?

    Electric Numerical Integrator and Calculator

  • 22

    The fourth generation of computers was based on integrated circuits

    False

  • 23

    The following technologies are invented during electromechanical age except:

    ENIAC

  • 24

    It was created by Alexander Graham Bell in 1876

    Telephone

  • 25

    Invented the slide rule

    William Oughtred

  • 26

    A writing system invented by Summerians

    Cuneiform

  • 27

    Amiga 1000 was the first portable computer to be marketed as laptop in year 1983

    False

  • 28

    The first IBM personal computer, code-named "Acorn" usef Windows unix operating system

    False

  • 29

    Intel unveils first Dynamic Access Memory Chip in 1970

    False

  • 30

    Inventors of Transistor

    John Shockley, John Bardeen, Walter Brattain

  • 31

    Central Concept of Computer was based on Charles Babbage ideas

    False

  • 32

    Punched wooden cards to automatically waved fabrics was invented in italy in ,1801

    False

  • 33

    Im year 1977 non geeks could write programs and make a computer do they wished

    True

  • 34

    Ethwrnet for connecting multiple computers and other hardware was established in 1963 by Robert Xerox

    False

  • 35

    First computer language

    COBOL

  • 36

    First major invention to use electricity for communication purposes and made it possible yo transmit information over great distances with great speed

    Telegraph

  • 37

    In 2017, the Defense Advanced Research Projects Agency (DARPA) created the first programmable quantum computer

    False

  • 38

    Religious leaders in Mesopotamia kept the earliest "books" a collection of rectangular clay tablets, inscribed with cuneiform and packaged in labeled containers

    True

  • 39

    Ladu Augusta Byron helped Babbage design the instructions that would be given to the machines on punch cards and to drscribe, analyze and publicized his idea

    True

  • 40

    Refers to any and all illegal activities carried out using technology

    Cybercrime

  • 41

    occurs when an unauthorized party uses your personally identifying information, such as your name, address, Social Security Number (SSN), or credit card or bank account information to assume your identity in order to commit fraud or other criminal acts

    Identity Theft

  • 42

    Ethical issues arising out of the use and development of electronic activities

    Information Technology Ethics

  • 43

    Formulate answers to questions about moral basis of individual opportunities and actions as well as the moral underpinnings of public policy

    Information Technology Ethics

  • 44

    Was approved on September 12,2012

    Cybercrime Prevention Act of 2012

  • 45

    Aims to address legal issues concerning online interactions and the internet in the Philippines

    Cybercrime Prevention Act of 2012

  • 46

    the cybercrime offences included in the bill are:

    Child Pornography, Identity Theft, Cybersex, Cybersquatting, and Illegal Access to data and libel

  • 47

    includes false and damaging statements made about another person through e-mail, message boards, blogs, chatrooms, on Web sites, or any other Internet-based communication medium.

    Cyber Libel

  • 48

    DIFFERENT TYPES OF CYBERCRIME

    Cybersquatting, Cybersex, Child Pornography, Identity Theft, Cyber Libel

  • 49

    carries a higher penalty of fine from the old rate of P200 to P6,000 to the new rate of P40,000 to P1.2 million. Four years and one day imprsionment to a maximum of eight years, per offense.

    Cyber Libel

  • 50

    Laws related to computer crimes, internet crimes, information crimes, communication crimes, and technology crimes

    Cybercrime Law

  • 51

    who range from rogue individuals to organized crime groups to state sponsored factions — use techniques like phishing, social engineering, and all kinds of malware to pursue their nefarious plans.

    Cybercriminals

  • 52

    defined as a subcategory of online sexual activity where Internet is used for sexually gratifying activities.

    Cybersex

  • 53

    A Cybercrime which individuals possesed this crime will be jailed a term prison mayor (6 years and one day to 12 years) or a fine at least 200,000 not exceeding 1M

    Cybersex

  • 54

    Those who possesed this kind of crime will be fined from 50,000 to P5 Million and a jail termed Reclision Perpetua (20-40 yrs)

    Child Pornography

  • 55

    includes false and damaging statements made about another person through e-mail, message boards, blogs, chatrooms, on Web sites, or any other Internet-based communication medium.

    Cyber Libel

  • 56

    4 types of Intellectual Property

    Patent, Trademark, Trade Secret, Copyright

  • 57

    Refers to the creations of mind.

    Patent

  • 58

    It can be an invention (patent or utility model), a design ( industrial design) a brand name (trademark or a literary) and artistic work (copyright)

    Intellectual Property

  • 59

    Is any special mark which differentiates goods and services of one entity from its competitors

    Trademark

  • 60

    Is a formula, process, device, or other business information that companies keep Private to give business advantage over the business comoetitors

    Trade Secret

  • 61

    protects intellectual property of a creative or artistic nature

    Copyright

  • 62

    Are laws that create the offenses and penalties for cybercrime

    Cybercrime Law

  • 63

    The acquisition of domain name on the internet withbthe intent to profit, mislead, destroy onw's reputation or deprive others from registering the same domain name

    Cybersquatting

  • 64

    Carries high penalty from old rate of 200 - 6, 000 and new rate of 40,000 - 1.2 Million.

    Cyber Libel

  • 65

    Refers to any and all illegal activities carried out using technology

    Cybercrime

  • 66

    This is where Intellectual Property is used or appropriated without the owner's permission by another

    Infringement

  • 67

    Means that someone has sold or used patented invention without the permission of the patent owner

    Patent Infringement

  • 68

    Is when someone else uses a trademark that is confusingly similar to someone else's registered trademark

    Trademark Infringement

  • 69

    Often lasts 50-70 years after creator's death

    Copyright

  • 70

    When aokeone else displays, produce or distrubutes your work without approval

    Copyright Infringement

  • 71

    Involves copying or selling music

    Piracy

  • 72

    Also known as Identity Fraud

    Identity Theft

  • 73

    is a crime in which an imposter obtains key pieces of personally identifiable information

    Identity Theft

  • 74

    when someone uses your personal information without your permission, to commit fraud or crime

    Identity Theft

  • 75

    Is a cybercrime, lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details and passwords

    Phishing

  • 76

    An act providing individual personal information in information and communication systems in the government and private sector, creating for this purpose, a national privacy commission and for other purposes

    RA 10173 - DATA PRIVACY ACT OF 2012

  • 77

    Negative Impact of IT is

    Poor Language Proficiency

  • 78

    Is the ability of an individual to speak or perform in an acquired language

    Language Proficiency

  • 79

    The use of software to create repeatable instructions and processes to replace or rduce human interaction with IT systems

    Infrastructure Automation

  • 80

    allows people to travel virtually

    Virtual reality

  • 81

    Is all about heavy lifting, whether a bare metal or ina private, hybrid, or public cloud

    Provisioning

  • 82

    lets developers simply define the infrastructure in a way that can be eassily understood by everyone in your IT team

    Configuration Management

  • 83

    The need to combine multiple automated tasks and their configurations across group of systems or machines increases

    Orchestration

  • 84

    Advantages of Automation

    Higher Production Rates, Increased Productivity, Better product quality, improved safety,

  • 85

    Two big advantages of Automation

    Higher output, increased productivity

  • 86

    IT Trends:

    Artificial Intelligence, Virtual Reality, Augmented Reality, Chatbot, Cybersecurity,Internet of Things,5G Network, Chatbot, Blockchain

  • 87

    Advantages of AI

    Efficient, Less Prone to Errors, Able to work 24/7, Can be deployed in risky situations

  • 88

    Challenges of AI

    Expensive, Machine Dependency, Restricted

  • INTRODUCTION TO PSYCHOLOGY

    INTRODUCTION TO PSYCHOLOGY

    Althea Fiona Amadeo · 100問 · 2年前

    INTRODUCTION TO PSYCHOLOGY

    INTRODUCTION TO PSYCHOLOGY

    100問 • 2年前
    Althea Fiona Amadeo

    ITP PART 2

    ITP PART 2

    Althea Fiona Amadeo · 100問 · 2年前

    ITP PART 2

    ITP PART 2

    100問 • 2年前
    Althea Fiona Amadeo

    UTS

    UTS

    Althea Fiona Amadeo · 94問 · 2年前

    UTS

    UTS

    94問 • 2年前
    Althea Fiona Amadeo

    Part III ITP

    Part III ITP

    Althea Fiona Amadeo · 11問 · 2年前

    Part III ITP

    Part III ITP

    11問 • 2年前
    Althea Fiona Amadeo

    GEN ZOO LAB

    GEN ZOO LAB

    Althea Fiona Amadeo · 8問 · 2年前

    GEN ZOO LAB

    GEN ZOO LAB

    8問 • 2年前
    Althea Fiona Amadeo

    UTS REVIEWER FINALS

    UTS REVIEWER FINALS

    Althea Fiona Amadeo · 99問 · 2年前

    UTS REVIEWER FINALS

    UTS REVIEWER FINALS

    99問 • 2年前
    Althea Fiona Amadeo

    ITP FINALS REVIEWER

    ITP FINALS REVIEWER

    Althea Fiona Amadeo · 100問 · 2年前

    ITP FINALS REVIEWER

    ITP FINALS REVIEWER

    100問 • 2年前
    Althea Fiona Amadeo

    ITP FINALS PART 2

    ITP FINALS PART 2

    Althea Fiona Amadeo · 100問 · 2年前

    ITP FINALS PART 2

    ITP FINALS PART 2

    100問 • 2年前
    Althea Fiona Amadeo

    ITP FINALS PART 3

    ITP FINALS PART 3

    Althea Fiona Amadeo · 17問 · 2年前

    ITP FINALS PART 3

    ITP FINALS PART 3

    17問 • 2年前
    Althea Fiona Amadeo

    UTS FINALS PART 2

    UTS FINALS PART 2

    Althea Fiona Amadeo · 62問 · 2年前

    UTS FINALS PART 2

    UTS FINALS PART 2

    62問 • 2年前
    Althea Fiona Amadeo

    STS REVIEWER FINALS

    STS REVIEWER FINALS

    Althea Fiona Amadeo · 33問 · 2年前

    STS REVIEWER FINALS

    STS REVIEWER FINALS

    33問 • 2年前
    Althea Fiona Amadeo

    ZOO LAB FINAL REVIEWER: COCKROACH

    ZOO LAB FINAL REVIEWER: COCKROACH

    Althea Fiona Amadeo · 15問 · 2年前

    ZOO LAB FINAL REVIEWER: COCKROACH

    ZOO LAB FINAL REVIEWER: COCKROACH

    15問 • 2年前
    Althea Fiona Amadeo

    BOTANY LEC

    BOTANY LEC

    Althea Fiona Amadeo · 56問 · 1年前

    BOTANY LEC

    BOTANY LEC

    56問 • 1年前
    Althea Fiona Amadeo

    THEORIES OF PERSONALITY

    THEORIES OF PERSONALITY

    Althea Fiona Amadeo · 13問 · 1年前

    THEORIES OF PERSONALITY

    THEORIES OF PERSONALITY

    13問 • 1年前
    Althea Fiona Amadeo

    問題一覧

  • 1

    The evolution in IT began in what year?

    1970

  • 2

    It combines the complementary strengths of a person and Information Technology

    Cognition Enhancers

  • 3

    It is more normal English language like and hence easier for the programmers to understand

    3GL

  • 4

    Thebfirst generation software application including compliers, device drivers and etc.

    Command line Programs

  • 5

    Were developed keeping in mind that they can be accessed from any location over internet

    Web application

  • 6

    It is closer to natural language than 3GL

    4GL

  • 7

    First generation program language

    Machine language

  • 8

    Mainly usef for artificial intelligence research

    4GL

  • 9

    A framework for creating interconnected web-like presentation of symbols

    Hypermedia

  • 10

    Enhanced human accomplishment by a division of labor the machine handles the routine mechanics of a task

    Empowering Environments

  • 11

    These are computers designed to placed on a desk

    Desktop

  • 12

    Hand-held telephones that can do things that computers do

    Smartphones

  • 13

    These include fitness trackers and smartwatches that can be worn throughout the day

    Wearables

  • 14

    These are latest television sets

    Smart TVs

  • 15

    It is single user computer but has more powerful microprocessor and a higher-quality monitor than a personal computer

    Workstation

  • 16

    A single- user computer based on microprocessor

    Personal Computer

  • 17

    An extremely fast computer that can perform millions of instructions per second

    Supercomputer

  • 18

    Powerful multi-user computer capable of supporting hundreds or thousands of users simultaneously

    Mainframe

  • 19

    A special computer designed for technical or scientific applications intended primarily to be used by one person at a time, they are commonly connected to a local area network and run multi-user operating systems

    Workstation

  • 20

    The genration of computer that started using vacuum tubes

    1st

  • 21

    ENIAC stands for?

    Electric Numerical Integrator and Calculator

  • 22

    The fourth generation of computers was based on integrated circuits

    False

  • 23

    The following technologies are invented during electromechanical age except:

    ENIAC

  • 24

    It was created by Alexander Graham Bell in 1876

    Telephone

  • 25

    Invented the slide rule

    William Oughtred

  • 26

    A writing system invented by Summerians

    Cuneiform

  • 27

    Amiga 1000 was the first portable computer to be marketed as laptop in year 1983

    False

  • 28

    The first IBM personal computer, code-named "Acorn" usef Windows unix operating system

    False

  • 29

    Intel unveils first Dynamic Access Memory Chip in 1970

    False

  • 30

    Inventors of Transistor

    John Shockley, John Bardeen, Walter Brattain

  • 31

    Central Concept of Computer was based on Charles Babbage ideas

    False

  • 32

    Punched wooden cards to automatically waved fabrics was invented in italy in ,1801

    False

  • 33

    Im year 1977 non geeks could write programs and make a computer do they wished

    True

  • 34

    Ethwrnet for connecting multiple computers and other hardware was established in 1963 by Robert Xerox

    False

  • 35

    First computer language

    COBOL

  • 36

    First major invention to use electricity for communication purposes and made it possible yo transmit information over great distances with great speed

    Telegraph

  • 37

    In 2017, the Defense Advanced Research Projects Agency (DARPA) created the first programmable quantum computer

    False

  • 38

    Religious leaders in Mesopotamia kept the earliest "books" a collection of rectangular clay tablets, inscribed with cuneiform and packaged in labeled containers

    True

  • 39

    Ladu Augusta Byron helped Babbage design the instructions that would be given to the machines on punch cards and to drscribe, analyze and publicized his idea

    True

  • 40

    Refers to any and all illegal activities carried out using technology

    Cybercrime

  • 41

    occurs when an unauthorized party uses your personally identifying information, such as your name, address, Social Security Number (SSN), or credit card or bank account information to assume your identity in order to commit fraud or other criminal acts

    Identity Theft

  • 42

    Ethical issues arising out of the use and development of electronic activities

    Information Technology Ethics

  • 43

    Formulate answers to questions about moral basis of individual opportunities and actions as well as the moral underpinnings of public policy

    Information Technology Ethics

  • 44

    Was approved on September 12,2012

    Cybercrime Prevention Act of 2012

  • 45

    Aims to address legal issues concerning online interactions and the internet in the Philippines

    Cybercrime Prevention Act of 2012

  • 46

    the cybercrime offences included in the bill are:

    Child Pornography, Identity Theft, Cybersex, Cybersquatting, and Illegal Access to data and libel

  • 47

    includes false and damaging statements made about another person through e-mail, message boards, blogs, chatrooms, on Web sites, or any other Internet-based communication medium.

    Cyber Libel

  • 48

    DIFFERENT TYPES OF CYBERCRIME

    Cybersquatting, Cybersex, Child Pornography, Identity Theft, Cyber Libel

  • 49

    carries a higher penalty of fine from the old rate of P200 to P6,000 to the new rate of P40,000 to P1.2 million. Four years and one day imprsionment to a maximum of eight years, per offense.

    Cyber Libel

  • 50

    Laws related to computer crimes, internet crimes, information crimes, communication crimes, and technology crimes

    Cybercrime Law

  • 51

    who range from rogue individuals to organized crime groups to state sponsored factions — use techniques like phishing, social engineering, and all kinds of malware to pursue their nefarious plans.

    Cybercriminals

  • 52

    defined as a subcategory of online sexual activity where Internet is used for sexually gratifying activities.

    Cybersex

  • 53

    A Cybercrime which individuals possesed this crime will be jailed a term prison mayor (6 years and one day to 12 years) or a fine at least 200,000 not exceeding 1M

    Cybersex

  • 54

    Those who possesed this kind of crime will be fined from 50,000 to P5 Million and a jail termed Reclision Perpetua (20-40 yrs)

    Child Pornography

  • 55

    includes false and damaging statements made about another person through e-mail, message boards, blogs, chatrooms, on Web sites, or any other Internet-based communication medium.

    Cyber Libel

  • 56

    4 types of Intellectual Property

    Patent, Trademark, Trade Secret, Copyright

  • 57

    Refers to the creations of mind.

    Patent

  • 58

    It can be an invention (patent or utility model), a design ( industrial design) a brand name (trademark or a literary) and artistic work (copyright)

    Intellectual Property

  • 59

    Is any special mark which differentiates goods and services of one entity from its competitors

    Trademark

  • 60

    Is a formula, process, device, or other business information that companies keep Private to give business advantage over the business comoetitors

    Trade Secret

  • 61

    protects intellectual property of a creative or artistic nature

    Copyright

  • 62

    Are laws that create the offenses and penalties for cybercrime

    Cybercrime Law

  • 63

    The acquisition of domain name on the internet withbthe intent to profit, mislead, destroy onw's reputation or deprive others from registering the same domain name

    Cybersquatting

  • 64

    Carries high penalty from old rate of 200 - 6, 000 and new rate of 40,000 - 1.2 Million.

    Cyber Libel

  • 65

    Refers to any and all illegal activities carried out using technology

    Cybercrime

  • 66

    This is where Intellectual Property is used or appropriated without the owner's permission by another

    Infringement

  • 67

    Means that someone has sold or used patented invention without the permission of the patent owner

    Patent Infringement

  • 68

    Is when someone else uses a trademark that is confusingly similar to someone else's registered trademark

    Trademark Infringement

  • 69

    Often lasts 50-70 years after creator's death

    Copyright

  • 70

    When aokeone else displays, produce or distrubutes your work without approval

    Copyright Infringement

  • 71

    Involves copying or selling music

    Piracy

  • 72

    Also known as Identity Fraud

    Identity Theft

  • 73

    is a crime in which an imposter obtains key pieces of personally identifiable information

    Identity Theft

  • 74

    when someone uses your personal information without your permission, to commit fraud or crime

    Identity Theft

  • 75

    Is a cybercrime, lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details and passwords

    Phishing

  • 76

    An act providing individual personal information in information and communication systems in the government and private sector, creating for this purpose, a national privacy commission and for other purposes

    RA 10173 - DATA PRIVACY ACT OF 2012

  • 77

    Negative Impact of IT is

    Poor Language Proficiency

  • 78

    Is the ability of an individual to speak or perform in an acquired language

    Language Proficiency

  • 79

    The use of software to create repeatable instructions and processes to replace or rduce human interaction with IT systems

    Infrastructure Automation

  • 80

    allows people to travel virtually

    Virtual reality

  • 81

    Is all about heavy lifting, whether a bare metal or ina private, hybrid, or public cloud

    Provisioning

  • 82

    lets developers simply define the infrastructure in a way that can be eassily understood by everyone in your IT team

    Configuration Management

  • 83

    The need to combine multiple automated tasks and their configurations across group of systems or machines increases

    Orchestration

  • 84

    Advantages of Automation

    Higher Production Rates, Increased Productivity, Better product quality, improved safety,

  • 85

    Two big advantages of Automation

    Higher output, increased productivity

  • 86

    IT Trends:

    Artificial Intelligence, Virtual Reality, Augmented Reality, Chatbot, Cybersecurity,Internet of Things,5G Network, Chatbot, Blockchain

  • 87

    Advantages of AI

    Efficient, Less Prone to Errors, Able to work 24/7, Can be deployed in risky situations

  • 88

    Challenges of AI

    Expensive, Machine Dependency, Restricted