暗記メーカー
ログイン
IT MIDTERM
  • Leah Jean Better

  • 問題数 85 • 4/8/2024

    記憶度

    完璧

    12

    覚えた

    31

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    The process of creating the illusion of motion and change by rapidly displaying a sequence of static images

    Animation

  • 2

    refer to those that are hosted and accessed over the internet

    cloud base

  • 3

    assist users in creating, editing, and delivering visual presentations. Such applications are used in many different contexts, including business, education, and entertainment

    Presentation Software

  • 4

    is a computer scientist and entrepreneur In 1983, he co-founded Forethought Inc Microsoft purchased Forethought in 1987, and PowerPoint became part of the Microsoft Office suite of tools. he remained with Microsoft until 1993

    Robert Gaskins

  • 5

    In July of that year, the Microsoft Corporation, in its first significant software acquisition, purchased the rights to PowerPoint for latest version of PPT?

    14 million dollars 2021

  • 6

    This option allows the user to preview the presentation in full-screen mode with speaker notes and a timer.

    Presentation View

  • 7

    This feature enables users to modify the slide master and slide layouts, which affects the design and formatting of all the slides in the presentation.

    Master View

  • 8

    This option allows the user to start the slideshow from the beginning or from the current slide.

    Show

  • 9

    This feature allows the user to adjust the size of the slide in the editing window.

    zoom

  • 10

    images, videos, and audio clips can make a PowerPoint presentation more engaging and memorable

    Inserting Multimedia

  • 11

    allow users to quickly change the appearance of their presentations.

    Templates and themes

  • 12

    images, charts, and tables to enhance the presentation.

    Adding and Formatting Elements

  • 13

    • To prevent the audience from feeling overloaded with information, it is important to keep the text on each slide concise and straightforward.

    5/5/5 rule

  • 14

    A fundamental and significant change brought about by the introduction and widespread adoption of new technologies, leading to a transformation in various aspects of society and culture.

    Digital Revolution

  • 15

    Referring to a growth or increase that is rapid and accelerating, often described as an ____curve or function.

    Exponential

  • 16

    the name that replaces Facebook Company to encompass the conglomerate of brands or companies whose president is Mark Zuckerberg

    Meta

  • 17

    is a technology that creates immersive,computer-generated environments, allowing users to feel like they are physically present in a different world.

    Virtual Reality

  • 18

    •Having or showing doubt or questioning attitude towards something.

    Skeptical

  • 19

    • To reduce or lessen the severity, intensity, or impact of something.

    mitigate

  • 20

    refers to a network of physical devices, vehicles, home appliances, and other objects that are embedded with sensors, software, and connectivity to enable the exchange of data over the internet

    IOT

  • 21

    worthy of attention or ___mention due to being particularly remarkable or significant.

    notable

  • 22

    false or misleading information that is deliberately to deceive or manipulate people, often with the intention of achieving a particular political or social agenda

    Disinformation

  • 23

    the act of understanding or perceiving something incorrectly. It occurs when an individual or group of people misunderstand information, communication, or signals in a way that leads to an inaccurate or mistaken interpretation

    misinterpretation

  • 24

    steals another person's personal information and uses it for fraudulent purposes

    Identity Theft

  • 25

    This refers to any type of software that is designed to cause harm to a computer or network, such as viruses, Trojans, or spyware.

    Malware

  • 26

    • This is a type of cyberattack that involves tricking users into divulging sensitive information, such as passwords or credit card numbers,

    Phishing

  • 27

    This refers to the use of technology, such as social media, to harass, intimidate, or threaten another person.

    Cyberstalking

  • 28

    This is a type of malware that encrypts a victim's files and demands payment in exchange for the decryption key

    Ransomware

  • 29

    This relates to the security of Internet of Things (IoT) devices, such as smart home devices, that are connected to the internet

    Iot security

  • 30

    Understand the psychological impact of technology on individuals, including the ways in which it affects our thoughts, emotions, and behavior.

    Digital Mind

  • 31

    Urges with little or no forethought or consideration of the consequences. It involves making hasty decisions or engaging in behaviors without planning or reflection

    Impulsivity

  • 32

    is when you feel compelled to do something repeatedly to ease anxiety or a specific fear, even if it doesn't make logical sense. • Example: constantly washing your hands, even when they are not dirty, because you're worried about germs, which is a common behavior in obsessive-compulsive disorder (ocd).

    Compulsivity

  • 33

    The primary difference between impulsive and compulsive behavior • While impulsive people focus more on instant gratification, compulsive people are driven by urges to do things that ultimately serve no logical purpose.

    read

  • 34

    •The desire for intense, novel, and thrilling experiences, often at the expense of personal safety or responsibility.

    sensation seeking

  • 35

    the act of being alone or separated from others, often due to social, emotional, or physical barriers.

    isolation

  • 36

    To make a problem or situation worse or more severe.

    Exacerbate

  • 37

    A behavior or action that an individual uses to manage or reduce stress or emotional discomfort.

    Coping Mechanism

  • 38

    A state of physical, emotional, and mental exhaustion caused by prolonged stress or excessive workload.

    Burnout

  • 39

    refers to the process of selecting, organizing, and presenting content or information in a thoughtful and deliberate manner to meet specific objectives or user preferences. Ex: The app curates news articles from various sources, delivering them to users based on their preferences and interests.

    Curated

  • 40

    •The configurable options in online accounts and apps that allow users to control the visibility of their personal information and content to other users or the public.

    Privacy Settings

  • 41

    •Individuals or organizations that engage in harmful or illegal activities, such as hacking, identity theft, or online scams.

    Malicious Actors

  • 42

    refers to the psychological and emotional strain caused by the constant use of technology. It is one of the negative effects of technology addiction.

    techno-stress

  • 43

    is defined as an inability to control, regulate, or limit one's behavior over time. Technology addiction is comparable to obsessive-compulsive disorders.

    Behavior Addictions

  • 44

    defined as an inability to control, regulate, or limit one's behavior over time.


    Behavioral Addiction

  • 45

    The ease of access to technology devices and the internet

    Accessibility

  • 46

    the anxiety of not being updated on social media or online

    Fear of Missing out (FOMO)

  • 47

    the never ending stream of notifications and information

    constant Stimulation

  • 48

    the accumulation of digital possessions and difficulty deleting them

    Digital Hoarding

  • 49

    is the data collected from individuals without their knowledge,

    Passive digital footprint

  • 50

    is the information that individuals intentionally share about themselves through social media or other websites.

    active digital footprint

  • 51

    refers to the information that is created and left behind by individuals while using the internet.

    Digital footprint

  • 52

    is best defined as the unacknowledged use of another person’s work. It is an ethical issue involving a claim of credit for work that the claimant did not create.

    plagiarism

  • 53

    is the unauthorized use of another’s work. This is a legal issue that depends on whether or not the work is protected by copyright in the first place, as well as on specifics like how much is used and the purpose of the use. If one copies too much of a protected work, or copies for an unauthorized purpose, simply acknowledging the original source will not solve the problem.

    copyright infringement

  • 54

    Creating the Intellectual Property Office of the Philippines as the government agency charged with the implementation of the law protecting intellectual property rights in the Philippines.

    Intellectual Property Code (R.A. 8293)

  • 55

    is the term that describes the “creations of the mind”: inventions, literary and artistic works, and symbols, names, images, and designs that are intangible when first created, but become valuable in tangible form as products.”

    Intellectual Property (IP)

  • 56

    any visible sign capable of distinguishing the origin, common characteristic, quality of goods or services of different enterprises under the control of the registered owner

    Collective mark

  • 57

    Identify a good as originating in territory, region or locality, where given quality, reputation or other characteristic of the good is essentially attributable to its geographical origin.

    Geographical Identification

  • 58

    Any technical solution of a problem in any field of human activity.

    invention

  • 59

    Any technical solution of a problem in any field of human activity which is new and industrially applicable.

    Utility Model

  • 60

    consists of the creation of a shape, configuration or composition of pattern or color, or combination of pattern and color in three dimensional form containing aesthetic value. It can be a two- or three-dimensional pattern used to produce a product, industrial commodity or handicraft.

    Industrial Design

  • 61

    is the legal protection extended to the owner of the rights in an original work.

    copyright and related rights

  • 62

    Works are protected by the sole fact of their creation, irrespective of the mode or form of expression, as well as their content, quality and purpose.

    Accrual Right

  • 63

    In 1984, Gaskins created the first presentation software tool on the Macintosh version first that is called

    Presenter

  • 64

    This feature enables users to arrange multiple open presentations on the screen, switch between them, and compare them side by side.

    Window

  • 65

    This feature allows the user to automate repetitive tasks by recording and playing back a sequence of commands.

    Macros

  • 66

    It is a feature in PowerPoint that enables users to create various types of diagrams and other visual aids quickly and easily.

    Smartart feature

  • 67

    is the safeguarding of electronic devices, networks, and sensitive data against theft, damage, or unwanted access.

    cybersecurity

  • 68

    This refers to any type of illegal activity that is carried out through the use of computers or the internet

    Cybercrime

  • 69

    This relates to the protection of personal information such as name, address and financial information from unauthorized access or use

    Privacy

  • 70

    Any form of digital content that has value, such as personal data, intellectual property, or online accounts. Factual: Concerned with what is actually the case

    Digital Assets

  • 71

    Concerned with what is actually the case rather than interpretations or reactions to it

    Factual

  • 72

    Data that provides information about other data, such as the time and date of online activity.

    Metadata

  • 73

    The aspect of a person's character or reputation that is presented or perceived by others, often referring to their online presence

    Persona

  • 74

    this refers to the established norms and expectations for appropriate behavior in a given professional context.

    professional standards

  • 75

    refers to the unauthorized use, reproduction, or distribution of protected works, including patents, trademarks, copyrights, and trade secrets. Infringement can take many forms, including piracy, counterfeiting, and infringement by competitors.

    Intellectual Property Infringement

  • 76

    legal right granted by a government to an inventor or assignee for a limited period of time in exchange for the public disclosure of their invention. It give inventors exclusive rights to prevent others from making, using, selling, or importing their invention without their permission.

    Patent

  • 77

    distinctive sign, such as a word, phrase, symbol, or design, that identifies and distinguishes the goods or services of one party from those of others. Itcan help businesses build brand recognition, establish trust with consumers, and protect their brand identity from infringement by competitors.

    trademark

  • 78

    is a legal right that grants creators of original works, such as literary, musical, or artistic works, exclusive rights to control how their works are used and distributed. it gives creators the ability to prevent others from reproducing, distributing, or displaying their works without permission

    Copyright

  • 79

    also known as the Intellectual Property Code of the Philippines, is comprehensive law that provides legal protection for intellectual property rights in the Philippines. The law covers a wide range of intellectual property rights, including patents, trademarks, copyrights, and trade secrets.

    Republic Act No. 8293

  • 80

    1. Patent Law 2. Trademark Law 3. Copyright Law 4. Intellectual Property Decree

    (Commonwealth Act No. 165) (Republic Act No. 166) (Presidential Decree No. 49) (Presidential Decree No. 49-A)

  • 81

    Plays, scripts, screenplays

    Dramatic works

  • 82

    Movies, documentaries, TV shows

    Film works

  • 83

    What protects the Confidential business information, formulas, recipes

    Trade Secret law

  • 84

    What protects the Logos, slogans, product names

    trademarks

  • 85

    What protects the Machines, devices, processes, chemicals

    Patents