問題一覧
1
•Individuals or organizations that engage in harmful or illegal activities, such as hacking, identity theft, or online scams.
Malicious Actors
2
•Having or showing doubt or questioning attitude towards something.
Skeptical
3
the act of being alone or separated from others, often due to social, emotional, or physical barriers.
isolation
4
any visible sign capable of distinguishing the origin, common characteristic, quality of goods or services of different enterprises under the control of the registered owner
Collective mark
5
is the data collected from individuals without their knowledge,
Passive digital footprint
6
•The desire for intense, novel, and thrilling experiences, often at the expense of personal safety or responsibility.
sensation seeking
7
Identify a good as originating in territory, region or locality, where given quality, reputation or other characteristic of the good is essentially attributable to its geographical origin.
Geographical Identification
8
In July of that year, the Microsoft Corporation, in its first significant software acquisition, purchased the rights to PowerPoint for latest version of PPT?
14 million dollars 2021
9
This feature allows the user to adjust the size of the slide in the editing window.
zoom
10
is best defined as the unacknowledged use of another person’s work. It is an ethical issue involving a claim of credit for work that the claimant did not create.
plagiarism
11
is when you feel compelled to do something repeatedly to ease anxiety or a specific fear, even if it doesn't make logical sense. • Example: constantly washing your hands, even when they are not dirty, because you're worried about germs, which is a common behavior in obsessive-compulsive disorder (ocd).
Compulsivity
12
Urges with little or no forethought or consideration of the consequences. It involves making hasty decisions or engaging in behaviors without planning or reflection
Impulsivity
13
Any form of digital content that has value, such as personal data, intellectual property, or online accounts. Factual: Concerned with what is actually the case
Digital Assets
14
also known as the Intellectual Property Code of the Philippines, is comprehensive law that provides legal protection for intellectual property rights in the Philippines. The law covers a wide range of intellectual property rights, including patents, trademarks, copyrights, and trade secrets.
Republic Act No. 8293
15
images, videos, and audio clips can make a PowerPoint presentation more engaging and memorable
Inserting Multimedia
16
is the information that individuals intentionally share about themselves through social media or other websites.
active digital footprint
17
refers to the information that is created and left behind by individuals while using the internet.
Digital footprint
18
Concerned with what is actually the case rather than interpretations or reactions to it
Factual
19
The aspect of a person's character or reputation that is presented or perceived by others, often referring to their online presence
Persona
20
• This is a type of cyberattack that involves tricking users into divulging sensitive information, such as passwords or credit card numbers,
Phishing
21
the never ending stream of notifications and information
constant Stimulation
22
refer to those that are hosted and accessed over the internet
cloud base
23
is the safeguarding of electronic devices, networks, and sensitive data against theft, damage, or unwanted access.
cybersecurity
24
Creating the Intellectual Property Office of the Philippines as the government agency charged with the implementation of the law protecting intellectual property rights in the Philippines.
Intellectual Property Code (R.A. 8293)
25
A state of physical, emotional, and mental exhaustion caused by prolonged stress or excessive workload.
Burnout
26
This is a type of malware that encrypts a victim's files and demands payment in exchange for the decryption key
Ransomware
27
the name that replaces Facebook Company to encompass the conglomerate of brands or companies whose president is Mark Zuckerberg
Meta
28
What protects the Confidential business information, formulas, recipes
Trade Secret law
29
This feature allows the user to automate repetitive tasks by recording and playing back a sequence of commands.
Macros
30
A behavior or action that an individual uses to manage or reduce stress or emotional discomfort.
Coping Mechanism
31
defined as an inability to control, regulate, or limit one's behavior over time.
Behavioral Addiction
32
Understand the psychological impact of technology on individuals, including the ways in which it affects our thoughts, emotions, and behavior.
Digital Mind
33
allow users to quickly change the appearance of their presentations.
Templates and themes
34
is a computer scientist and entrepreneur In 1983, he co-founded Forethought Inc Microsoft purchased Forethought in 1987, and PowerPoint became part of the Microsoft Office suite of tools. he remained with Microsoft until 1993
Robert Gaskins
35
is the term that describes the “creations of the mind”: inventions, literary and artistic works, and symbols, names, images, and designs that are intangible when first created, but become valuable in tangible form as products.”
Intellectual Property (IP)
36
is the unauthorized use of another’s work. This is a legal issue that depends on whether or not the work is protected by copyright in the first place, as well as on specifics like how much is used and the purpose of the use. If one copies too much of a protected work, or copies for an unauthorized purpose, simply acknowledging the original source will not solve the problem.
copyright infringement
37
refers to the unauthorized use, reproduction, or distribution of protected works, including patents, trademarks, copyrights, and trade secrets. Infringement can take many forms, including piracy, counterfeiting, and infringement by competitors.
Intellectual Property Infringement
38
What protects the Machines, devices, processes, chemicals
Patents
39
this refers to the established norms and expectations for appropriate behavior in a given professional context.
professional standards
40
worthy of attention or ___mention due to being particularly remarkable or significant.
notable
41
This option allows the user to start the slideshow from the beginning or from the current slide.
Show
42
is the legal protection extended to the owner of the rights in an original work.
copyright and related rights
43
To make a problem or situation worse or more severe.
Exacerbate
44
This option allows the user to preview the presentation in full-screen mode with speaker notes and a timer.
Presentation View
45
is a technology that creates immersive,computer-generated environments, allowing users to feel like they are physically present in a different world.
Virtual Reality
46
refers to a network of physical devices, vehicles, home appliances, and other objects that are embedded with sensors, software, and connectivity to enable the exchange of data over the internet
IOT
47
This feature enables users to modify the slide master and slide layouts, which affects the design and formatting of all the slides in the presentation.
Master View
48
legal right granted by a government to an inventor or assignee for a limited period of time in exchange for the public disclosure of their invention. It give inventors exclusive rights to prevent others from making, using, selling, or importing their invention without their permission.
Patent
49
Plays, scripts, screenplays
Dramatic works
50
steals another person's personal information and uses it for fraudulent purposes
Identity Theft
51
It is a feature in PowerPoint that enables users to create various types of diagrams and other visual aids quickly and easily.
Smartart feature
52
images, charts, and tables to enhance the presentation.
Adding and Formatting Elements
53
Any technical solution of a problem in any field of human activity which is new and industrially applicable.
Utility Model
54
the accumulation of digital possessions and difficulty deleting them
Digital Hoarding
55
This relates to the security of Internet of Things (IoT) devices, such as smart home devices, that are connected to the internet
Iot security
56
Referring to a growth or increase that is rapid and accelerating, often described as an ____curve or function.
Exponential
57
This feature enables users to arrange multiple open presentations on the screen, switch between them, and compare them side by side.
Window
58
distinctive sign, such as a word, phrase, symbol, or design, that identifies and distinguishes the goods or services of one party from those of others. Itcan help businesses build brand recognition, establish trust with consumers, and protect their brand identity from infringement by competitors.
trademark
59
Any technical solution of a problem in any field of human activity.
invention
60
consists of the creation of a shape, configuration or composition of pattern or color, or combination of pattern and color in three dimensional form containing aesthetic value. It can be a two- or three-dimensional pattern used to produce a product, industrial commodity or handicraft.
Industrial Design
61
refers to the process of selecting, organizing, and presenting content or information in a thoughtful and deliberate manner to meet specific objectives or user preferences. Ex: The app curates news articles from various sources, delivering them to users based on their preferences and interests.
Curated
62
In 1984, Gaskins created the first presentation software tool on the Macintosh version first that is called
Presenter
63
the anxiety of not being updated on social media or online
Fear of Missing out (FOMO)
64
• To reduce or lessen the severity, intensity, or impact of something.
mitigate
65
is defined as an inability to control, regulate, or limit one's behavior over time. Technology addiction is comparable to obsessive-compulsive disorders.
Behavior Addictions
66
false or misleading information that is deliberately to deceive or manipulate people, often with the intention of achieving a particular political or social agenda
Disinformation
67
• To prevent the audience from feeling overloaded with information, it is important to keep the text on each slide concise and straightforward.
5/5/5 rule
68
Data that provides information about other data, such as the time and date of online activity.
Metadata
69
is a legal right that grants creators of original works, such as literary, musical, or artistic works, exclusive rights to control how their works are used and distributed. it gives creators the ability to prevent others from reproducing, distributing, or displaying their works without permission
Copyright
70
This refers to any type of software that is designed to cause harm to a computer or network, such as viruses, Trojans, or spyware.
Malware
71
Movies, documentaries, TV shows
Film works
72
This relates to the protection of personal information such as name, address and financial information from unauthorized access or use
Privacy
73
•The configurable options in online accounts and apps that allow users to control the visibility of their personal information and content to other users or the public.
Privacy Settings
74
refers to the psychological and emotional strain caused by the constant use of technology. It is one of the negative effects of technology addiction.
techno-stress
75
The primary difference between impulsive and compulsive behavior • While impulsive people focus more on instant gratification, compulsive people are driven by urges to do things that ultimately serve no logical purpose.
read
76
the act of understanding or perceiving something incorrectly. It occurs when an individual or group of people misunderstand information, communication, or signals in a way that leads to an inaccurate or mistaken interpretation
misinterpretation
77
A fundamental and significant change brought about by the introduction and widespread adoption of new technologies, leading to a transformation in various aspects of society and culture.
Digital Revolution
78
The ease of access to technology devices and the internet
Accessibility
79
1. Patent Law 2. Trademark Law 3. Copyright Law 4. Intellectual Property Decree
(Commonwealth Act No. 165) (Republic Act No. 166) (Presidential Decree No. 49) (Presidential Decree No. 49-A)
80
Works are protected by the sole fact of their creation, irrespective of the mode or form of expression, as well as their content, quality and purpose.
Accrual Right
81
assist users in creating, editing, and delivering visual presentations. Such applications are used in many different contexts, including business, education, and entertainment
Presentation Software
82
What protects the Logos, slogans, product names
trademarks
83
This refers to any type of illegal activity that is carried out through the use of computers or the internet
Cybercrime
84
This refers to the use of technology, such as social media, to harass, intimidate, or threaten another person.
Cyberstalking
85
The process of creating the illusion of motion and change by rapidly displaying a sequence of static images
Animation