問題一覧
1
The process of creating the illusion of motion and change by rapidly displaying a sequence of static images
Animation
2
refer to those that are hosted and accessed over the internet
cloud base
3
assist users in creating, editing, and delivering visual presentations. Such applications are used in many different contexts, including business, education, and entertainment
Presentation Software
4
is a computer scientist and entrepreneur In 1983, he co-founded Forethought Inc Microsoft purchased Forethought in 1987, and PowerPoint became part of the Microsoft Office suite of tools. he remained with Microsoft until 1993
Robert Gaskins
5
In July of that year, the Microsoft Corporation, in its first significant software acquisition, purchased the rights to PowerPoint for latest version of PPT?
14 million dollars 2021
6
This option allows the user to preview the presentation in full-screen mode with speaker notes and a timer.
Presentation View
7
This feature enables users to modify the slide master and slide layouts, which affects the design and formatting of all the slides in the presentation.
Master View
8
This option allows the user to start the slideshow from the beginning or from the current slide.
Show
9
This feature allows the user to adjust the size of the slide in the editing window.
zoom
10
images, videos, and audio clips can make a PowerPoint presentation more engaging and memorable
Inserting Multimedia
11
allow users to quickly change the appearance of their presentations.
Templates and themes
12
images, charts, and tables to enhance the presentation.
Adding and Formatting Elements
13
• To prevent the audience from feeling overloaded with information, it is important to keep the text on each slide concise and straightforward.
5/5/5 rule
14
A fundamental and significant change brought about by the introduction and widespread adoption of new technologies, leading to a transformation in various aspects of society and culture.
Digital Revolution
15
Referring to a growth or increase that is rapid and accelerating, often described as an ____curve or function.
Exponential
16
the name that replaces Facebook Company to encompass the conglomerate of brands or companies whose president is Mark Zuckerberg
Meta
17
is a technology that creates immersive,computer-generated environments, allowing users to feel like they are physically present in a different world.
Virtual Reality
18
•Having or showing doubt or questioning attitude towards something.
Skeptical
19
• To reduce or lessen the severity, intensity, or impact of something.
mitigate
20
refers to a network of physical devices, vehicles, home appliances, and other objects that are embedded with sensors, software, and connectivity to enable the exchange of data over the internet
IOT
21
worthy of attention or ___mention due to being particularly remarkable or significant.
notable
22
false or misleading information that is deliberately to deceive or manipulate people, often with the intention of achieving a particular political or social agenda
Disinformation
23
the act of understanding or perceiving something incorrectly. It occurs when an individual or group of people misunderstand information, communication, or signals in a way that leads to an inaccurate or mistaken interpretation
misinterpretation
24
steals another person's personal information and uses it for fraudulent purposes
Identity Theft
25
This refers to any type of software that is designed to cause harm to a computer or network, such as viruses, Trojans, or spyware.
Malware
26
• This is a type of cyberattack that involves tricking users into divulging sensitive information, such as passwords or credit card numbers,
Phishing
27
This refers to the use of technology, such as social media, to harass, intimidate, or threaten another person.
Cyberstalking
28
This is a type of malware that encrypts a victim's files and demands payment in exchange for the decryption key
Ransomware
29
This relates to the security of Internet of Things (IoT) devices, such as smart home devices, that are connected to the internet
Iot security
30
Understand the psychological impact of technology on individuals, including the ways in which it affects our thoughts, emotions, and behavior.
Digital Mind
31
Urges with little or no forethought or consideration of the consequences. It involves making hasty decisions or engaging in behaviors without planning or reflection
Impulsivity
32
is when you feel compelled to do something repeatedly to ease anxiety or a specific fear, even if it doesn't make logical sense. • Example: constantly washing your hands, even when they are not dirty, because you're worried about germs, which is a common behavior in obsessive-compulsive disorder (ocd).
Compulsivity
33
The primary difference between impulsive and compulsive behavior • While impulsive people focus more on instant gratification, compulsive people are driven by urges to do things that ultimately serve no logical purpose.
read
34
•The desire for intense, novel, and thrilling experiences, often at the expense of personal safety or responsibility.
sensation seeking
35
the act of being alone or separated from others, often due to social, emotional, or physical barriers.
isolation
36
To make a problem or situation worse or more severe.
Exacerbate
37
A behavior or action that an individual uses to manage or reduce stress or emotional discomfort.
Coping Mechanism
38
A state of physical, emotional, and mental exhaustion caused by prolonged stress or excessive workload.
Burnout
39
refers to the process of selecting, organizing, and presenting content or information in a thoughtful and deliberate manner to meet specific objectives or user preferences. Ex: The app curates news articles from various sources, delivering them to users based on their preferences and interests.
Curated
40
•The configurable options in online accounts and apps that allow users to control the visibility of their personal information and content to other users or the public.
Privacy Settings
41
•Individuals or organizations that engage in harmful or illegal activities, such as hacking, identity theft, or online scams.
Malicious Actors
42
refers to the psychological and emotional strain caused by the constant use of technology. It is one of the negative effects of technology addiction.
techno-stress
43
is defined as an inability to control, regulate, or limit one's behavior over time. Technology addiction is comparable to obsessive-compulsive disorders.
Behavior Addictions
44
defined as an inability to control, regulate, or limit one's behavior over time.
Behavioral Addiction
45
The ease of access to technology devices and the internet
Accessibility
46
the anxiety of not being updated on social media or online
Fear of Missing out (FOMO)
47
the never ending stream of notifications and information
constant Stimulation
48
the accumulation of digital possessions and difficulty deleting them
Digital Hoarding
49
is the data collected from individuals without their knowledge,
Passive digital footprint
50
is the information that individuals intentionally share about themselves through social media or other websites.
active digital footprint
51
refers to the information that is created and left behind by individuals while using the internet.
Digital footprint
52
is best defined as the unacknowledged use of another person’s work. It is an ethical issue involving a claim of credit for work that the claimant did not create.
plagiarism
53
is the unauthorized use of another’s work. This is a legal issue that depends on whether or not the work is protected by copyright in the first place, as well as on specifics like how much is used and the purpose of the use. If one copies too much of a protected work, or copies for an unauthorized purpose, simply acknowledging the original source will not solve the problem.
copyright infringement
54
Creating the Intellectual Property Office of the Philippines as the government agency charged with the implementation of the law protecting intellectual property rights in the Philippines.
Intellectual Property Code (R.A. 8293)
55
is the term that describes the “creations of the mind”: inventions, literary and artistic works, and symbols, names, images, and designs that are intangible when first created, but become valuable in tangible form as products.”
Intellectual Property (IP)
56
any visible sign capable of distinguishing the origin, common characteristic, quality of goods or services of different enterprises under the control of the registered owner
Collective mark
57
Identify a good as originating in territory, region or locality, where given quality, reputation or other characteristic of the good is essentially attributable to its geographical origin.
Geographical Identification
58
Any technical solution of a problem in any field of human activity.
invention
59
Any technical solution of a problem in any field of human activity which is new and industrially applicable.
Utility Model
60
consists of the creation of a shape, configuration or composition of pattern or color, or combination of pattern and color in three dimensional form containing aesthetic value. It can be a two- or three-dimensional pattern used to produce a product, industrial commodity or handicraft.
Industrial Design
61
is the legal protection extended to the owner of the rights in an original work.
copyright and related rights
62
Works are protected by the sole fact of their creation, irrespective of the mode or form of expression, as well as their content, quality and purpose.
Accrual Right
63
In 1984, Gaskins created the first presentation software tool on the Macintosh version first that is called
Presenter
64
This feature enables users to arrange multiple open presentations on the screen, switch between them, and compare them side by side.
Window
65
This feature allows the user to automate repetitive tasks by recording and playing back a sequence of commands.
Macros
66
It is a feature in PowerPoint that enables users to create various types of diagrams and other visual aids quickly and easily.
Smartart feature
67
is the safeguarding of electronic devices, networks, and sensitive data against theft, damage, or unwanted access.
cybersecurity
68
This refers to any type of illegal activity that is carried out through the use of computers or the internet
Cybercrime
69
This relates to the protection of personal information such as name, address and financial information from unauthorized access or use
Privacy
70
Any form of digital content that has value, such as personal data, intellectual property, or online accounts. Factual: Concerned with what is actually the case
Digital Assets
71
Concerned with what is actually the case rather than interpretations or reactions to it
Factual
72
Data that provides information about other data, such as the time and date of online activity.
Metadata
73
The aspect of a person's character or reputation that is presented or perceived by others, often referring to their online presence
Persona
74
this refers to the established norms and expectations for appropriate behavior in a given professional context.
professional standards
75
refers to the unauthorized use, reproduction, or distribution of protected works, including patents, trademarks, copyrights, and trade secrets. Infringement can take many forms, including piracy, counterfeiting, and infringement by competitors.
Intellectual Property Infringement
76
legal right granted by a government to an inventor or assignee for a limited period of time in exchange for the public disclosure of their invention. It give inventors exclusive rights to prevent others from making, using, selling, or importing their invention without their permission.
Patent
77
distinctive sign, such as a word, phrase, symbol, or design, that identifies and distinguishes the goods or services of one party from those of others. Itcan help businesses build brand recognition, establish trust with consumers, and protect their brand identity from infringement by competitors.
trademark
78
is a legal right that grants creators of original works, such as literary, musical, or artistic works, exclusive rights to control how their works are used and distributed. it gives creators the ability to prevent others from reproducing, distributing, or displaying their works without permission
Copyright
79
also known as the Intellectual Property Code of the Philippines, is comprehensive law that provides legal protection for intellectual property rights in the Philippines. The law covers a wide range of intellectual property rights, including patents, trademarks, copyrights, and trade secrets.
Republic Act No. 8293
80
1. Patent Law 2. Trademark Law 3. Copyright Law 4. Intellectual Property Decree
(Commonwealth Act No. 165) (Republic Act No. 166) (Presidential Decree No. 49) (Presidential Decree No. 49-A)
81
Plays, scripts, screenplays
Dramatic works
82
Movies, documentaries, TV shows
Film works
83
What protects the Confidential business information, formulas, recipes
Trade Secret law
84
What protects the Logos, slogans, product names
trademarks
85
What protects the Machines, devices, processes, chemicals
Patents