暗記メーカー
ログイン
IT MIDTERM
  • Leah Jean Better

  • 問題数 85 • 4/8/2024

    記憶度

    完璧

    12

    覚えた

    31

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    •Individuals or organizations that engage in harmful or illegal activities, such as hacking, identity theft, or online scams.

    Malicious Actors

  • 2

    •Having or showing doubt or questioning attitude towards something.

    Skeptical

  • 3

    the act of being alone or separated from others, often due to social, emotional, or physical barriers.

    isolation

  • 4

    any visible sign capable of distinguishing the origin, common characteristic, quality of goods or services of different enterprises under the control of the registered owner

    Collective mark

  • 5

    is the data collected from individuals without their knowledge,

    Passive digital footprint

  • 6

    •The desire for intense, novel, and thrilling experiences, often at the expense of personal safety or responsibility.

    sensation seeking

  • 7

    Identify a good as originating in territory, region or locality, where given quality, reputation or other characteristic of the good is essentially attributable to its geographical origin.

    Geographical Identification

  • 8

    In July of that year, the Microsoft Corporation, in its first significant software acquisition, purchased the rights to PowerPoint for latest version of PPT?

    14 million dollars 2021

  • 9

    This feature allows the user to adjust the size of the slide in the editing window.

    zoom

  • 10

    is best defined as the unacknowledged use of another person’s work. It is an ethical issue involving a claim of credit for work that the claimant did not create.

    plagiarism

  • 11

    is when you feel compelled to do something repeatedly to ease anxiety or a specific fear, even if it doesn't make logical sense. • Example: constantly washing your hands, even when they are not dirty, because you're worried about germs, which is a common behavior in obsessive-compulsive disorder (ocd).

    Compulsivity

  • 12

    Urges with little or no forethought or consideration of the consequences. It involves making hasty decisions or engaging in behaviors without planning or reflection

    Impulsivity

  • 13

    Any form of digital content that has value, such as personal data, intellectual property, or online accounts. Factual: Concerned with what is actually the case

    Digital Assets

  • 14

    also known as the Intellectual Property Code of the Philippines, is comprehensive law that provides legal protection for intellectual property rights in the Philippines. The law covers a wide range of intellectual property rights, including patents, trademarks, copyrights, and trade secrets.

    Republic Act No. 8293

  • 15

    images, videos, and audio clips can make a PowerPoint presentation more engaging and memorable

    Inserting Multimedia

  • 16

    is the information that individuals intentionally share about themselves through social media or other websites.

    active digital footprint

  • 17

    refers to the information that is created and left behind by individuals while using the internet.

    Digital footprint

  • 18

    Concerned with what is actually the case rather than interpretations or reactions to it

    Factual

  • 19

    The aspect of a person's character or reputation that is presented or perceived by others, often referring to their online presence

    Persona

  • 20

    • This is a type of cyberattack that involves tricking users into divulging sensitive information, such as passwords or credit card numbers,

    Phishing

  • 21

    the never ending stream of notifications and information

    constant Stimulation

  • 22

    refer to those that are hosted and accessed over the internet

    cloud base

  • 23

    is the safeguarding of electronic devices, networks, and sensitive data against theft, damage, or unwanted access.

    cybersecurity

  • 24

    Creating the Intellectual Property Office of the Philippines as the government agency charged with the implementation of the law protecting intellectual property rights in the Philippines.

    Intellectual Property Code (R.A. 8293)

  • 25

    A state of physical, emotional, and mental exhaustion caused by prolonged stress or excessive workload.

    Burnout

  • 26

    This is a type of malware that encrypts a victim's files and demands payment in exchange for the decryption key

    Ransomware

  • 27

    the name that replaces Facebook Company to encompass the conglomerate of brands or companies whose president is Mark Zuckerberg

    Meta

  • 28

    What protects the Confidential business information, formulas, recipes

    Trade Secret law

  • 29

    This feature allows the user to automate repetitive tasks by recording and playing back a sequence of commands.

    Macros

  • 30

    A behavior or action that an individual uses to manage or reduce stress or emotional discomfort.

    Coping Mechanism

  • 31

    defined as an inability to control, regulate, or limit one's behavior over time.


    Behavioral Addiction

  • 32

    Understand the psychological impact of technology on individuals, including the ways in which it affects our thoughts, emotions, and behavior.

    Digital Mind

  • 33

    allow users to quickly change the appearance of their presentations.

    Templates and themes

  • 34

    is a computer scientist and entrepreneur In 1983, he co-founded Forethought Inc Microsoft purchased Forethought in 1987, and PowerPoint became part of the Microsoft Office suite of tools. he remained with Microsoft until 1993

    Robert Gaskins

  • 35

    is the term that describes the “creations of the mind”: inventions, literary and artistic works, and symbols, names, images, and designs that are intangible when first created, but become valuable in tangible form as products.”

    Intellectual Property (IP)

  • 36

    is the unauthorized use of another’s work. This is a legal issue that depends on whether or not the work is protected by copyright in the first place, as well as on specifics like how much is used and the purpose of the use. If one copies too much of a protected work, or copies for an unauthorized purpose, simply acknowledging the original source will not solve the problem.

    copyright infringement

  • 37

    refers to the unauthorized use, reproduction, or distribution of protected works, including patents, trademarks, copyrights, and trade secrets. Infringement can take many forms, including piracy, counterfeiting, and infringement by competitors.

    Intellectual Property Infringement

  • 38

    What protects the Machines, devices, processes, chemicals

    Patents

  • 39

    this refers to the established norms and expectations for appropriate behavior in a given professional context.

    professional standards

  • 40

    worthy of attention or ___mention due to being particularly remarkable or significant.

    notable

  • 41

    This option allows the user to start the slideshow from the beginning or from the current slide.

    Show

  • 42

    is the legal protection extended to the owner of the rights in an original work.

    copyright and related rights

  • 43

    To make a problem or situation worse or more severe.

    Exacerbate

  • 44

    This option allows the user to preview the presentation in full-screen mode with speaker notes and a timer.

    Presentation View

  • 45

    is a technology that creates immersive,computer-generated environments, allowing users to feel like they are physically present in a different world.

    Virtual Reality

  • 46

    refers to a network of physical devices, vehicles, home appliances, and other objects that are embedded with sensors, software, and connectivity to enable the exchange of data over the internet

    IOT

  • 47

    This feature enables users to modify the slide master and slide layouts, which affects the design and formatting of all the slides in the presentation.

    Master View

  • 48

    legal right granted by a government to an inventor or assignee for a limited period of time in exchange for the public disclosure of their invention. It give inventors exclusive rights to prevent others from making, using, selling, or importing their invention without their permission.

    Patent

  • 49

    Plays, scripts, screenplays

    Dramatic works

  • 50

    steals another person's personal information and uses it for fraudulent purposes

    Identity Theft

  • 51

    It is a feature in PowerPoint that enables users to create various types of diagrams and other visual aids quickly and easily.

    Smartart feature

  • 52

    images, charts, and tables to enhance the presentation.

    Adding and Formatting Elements

  • 53

    Any technical solution of a problem in any field of human activity which is new and industrially applicable.

    Utility Model

  • 54

    the accumulation of digital possessions and difficulty deleting them

    Digital Hoarding

  • 55

    This relates to the security of Internet of Things (IoT) devices, such as smart home devices, that are connected to the internet

    Iot security

  • 56

    Referring to a growth or increase that is rapid and accelerating, often described as an ____curve or function.

    Exponential

  • 57

    This feature enables users to arrange multiple open presentations on the screen, switch between them, and compare them side by side.

    Window

  • 58

    distinctive sign, such as a word, phrase, symbol, or design, that identifies and distinguishes the goods or services of one party from those of others. Itcan help businesses build brand recognition, establish trust with consumers, and protect their brand identity from infringement by competitors.

    trademark

  • 59

    Any technical solution of a problem in any field of human activity.

    invention

  • 60

    consists of the creation of a shape, configuration or composition of pattern or color, or combination of pattern and color in three dimensional form containing aesthetic value. It can be a two- or three-dimensional pattern used to produce a product, industrial commodity or handicraft.

    Industrial Design

  • 61

    refers to the process of selecting, organizing, and presenting content or information in a thoughtful and deliberate manner to meet specific objectives or user preferences. Ex: The app curates news articles from various sources, delivering them to users based on their preferences and interests.

    Curated

  • 62

    In 1984, Gaskins created the first presentation software tool on the Macintosh version first that is called

    Presenter

  • 63

    the anxiety of not being updated on social media or online

    Fear of Missing out (FOMO)

  • 64

    • To reduce or lessen the severity, intensity, or impact of something.

    mitigate

  • 65

    is defined as an inability to control, regulate, or limit one's behavior over time. Technology addiction is comparable to obsessive-compulsive disorders.

    Behavior Addictions

  • 66

    false or misleading information that is deliberately to deceive or manipulate people, often with the intention of achieving a particular political or social agenda

    Disinformation

  • 67

    • To prevent the audience from feeling overloaded with information, it is important to keep the text on each slide concise and straightforward.

    5/5/5 rule

  • 68

    Data that provides information about other data, such as the time and date of online activity.

    Metadata

  • 69

    is a legal right that grants creators of original works, such as literary, musical, or artistic works, exclusive rights to control how their works are used and distributed. it gives creators the ability to prevent others from reproducing, distributing, or displaying their works without permission

    Copyright

  • 70

    This refers to any type of software that is designed to cause harm to a computer or network, such as viruses, Trojans, or spyware.

    Malware

  • 71

    Movies, documentaries, TV shows

    Film works

  • 72

    This relates to the protection of personal information such as name, address and financial information from unauthorized access or use

    Privacy

  • 73

    •The configurable options in online accounts and apps that allow users to control the visibility of their personal information and content to other users or the public.

    Privacy Settings

  • 74

    refers to the psychological and emotional strain caused by the constant use of technology. It is one of the negative effects of technology addiction.

    techno-stress

  • 75

    The primary difference between impulsive and compulsive behavior • While impulsive people focus more on instant gratification, compulsive people are driven by urges to do things that ultimately serve no logical purpose.

    read

  • 76

    the act of understanding or perceiving something incorrectly. It occurs when an individual or group of people misunderstand information, communication, or signals in a way that leads to an inaccurate or mistaken interpretation

    misinterpretation

  • 77

    A fundamental and significant change brought about by the introduction and widespread adoption of new technologies, leading to a transformation in various aspects of society and culture.

    Digital Revolution

  • 78

    The ease of access to technology devices and the internet

    Accessibility

  • 79

    1. Patent Law 2. Trademark Law 3. Copyright Law 4. Intellectual Property Decree

    (Commonwealth Act No. 165) (Republic Act No. 166) (Presidential Decree No. 49) (Presidential Decree No. 49-A)

  • 80

    Works are protected by the sole fact of their creation, irrespective of the mode or form of expression, as well as their content, quality and purpose.

    Accrual Right

  • 81

    assist users in creating, editing, and delivering visual presentations. Such applications are used in many different contexts, including business, education, and entertainment

    Presentation Software

  • 82

    What protects the Logos, slogans, product names

    trademarks

  • 83

    This refers to any type of illegal activity that is carried out through the use of computers or the internet

    Cybercrime

  • 84

    This refers to the use of technology, such as social media, to harass, intimidate, or threaten another person.

    Cyberstalking

  • 85

    The process of creating the illusion of motion and change by rapidly displaying a sequence of static images

    Animation