0% found this document useful (0 votes)
5 views7 pages

ICT Reviewers

The document contains a comprehensive list of terms and concepts related to computer science, cybersecurity, and networking, along with their definitions. It includes easy, moderate, and hard questions covering topics such as malware, encryption, and various networking protocols. Additionally, it highlights notable figures in ICT and relevant legislation in the field.

Uploaded by

magi.raine.20
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views7 pages

ICT Reviewers

The document contains a comprehensive list of terms and concepts related to computer science, cybersecurity, and networking, along with their definitions. It includes easy, moderate, and hard questions covering topics such as malware, encryption, and various networking protocols. Additionally, it highlights notable figures in ICT and relevant legislation in the field.

Uploaded by

magi.raine.20
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

From: Andrea Amante 18.

The type of software designed to harm


computers. *(Malware)*
Easy Questions 19. The cyberattack where hackers trick users
into giving sensitive information. *(Phishing)*
1. The brain of the computer. (CPU - Central 20. The computing model that allows users to
Processing Unit) store and access data online. *(Cloud
2. The memory that temporarily stores data for Computing)*
quick access by the CPU. *(RAM - Random
Access Memory)* ---
3. The physical parts of a computer system. Moderate Questions
*(Hardware)* 21. The term for a set of rules that define data
4. The software that manages computer hardware transmission over a network. *(Protocol)*
and software. *(Operating System - OS)* 22. The process of finding and fixing errors in a
5. The storage device that retains data even computer program. *(Debugging)*
when the computer is turned off. *(HDD / SSD)* 23. The key used to delete characters to the left
6. The Microsoft Office application is used to of the cursor. *(Backspace key)*
create text documents. *(Microsoft Word)* 24. The security system that monitors and
7. The software used to create slide-based controls incoming and outgoing network traffic.
presentations. *(Microsoft PowerPoint)* *(Firewall)*
8. The protocol used to send emails over the 25. The most commonly used database
internet. *(SMTP - Simple Mail Transfer language. *(SQL - Structured Query
Protocol)* Language)*
9. The most widely used wired networking cable. 26. The unique field that identifies each record in
*(Ethernet cable - RJ45)* a database table. *(Primary Key)*
10. The unique number assigned to every device 27. The language used to style and format
on a network. *(IP Address - Internet Protocol webpages. *(CSS - Cascading Style Sheets)*
Address)* 28. The HTML tag used to insert images into a
11. The wireless technology used for internet webpage. *(<img> tag)*
connections. *(Wi-Fi)* 29. The service that translates domain names into
12. The structured collection of related data in a IP addresses. *(DNS - Domain Name System)*
system. *(Database)* 30. The company that invented the World Wide
13. The primary language used to create the Web. *(CERN - European Organization for
structure of webpages. *(HTML - Hypertext Nuclear Research)*
Markup Language)* 31. The act of using digital technology
14. The full form of URL. *(Uniform Resource responsibly. *(Digital Citizenship)*
Locator)* 32. The method of securing personal data from
15. The most commonly used web browser today. unauthorized access. *(Encryption)*
*(Google Chrome)* 33. The technology that enables everyday objects
16. The proper etiquette when communicating to connect to the internet. *(Internet of Things -
online. *(Netiquette)* IoT)*
17. The unethical act of illegally downloading or
copying software. *(Piracy)*
34. The branch of technology focused on 49. The technology that overlays digital elements
machines learning from data. *(Artificial onto the real world. *(Augmented Reality - AR)*
Intelligence - AI)* 50. The principle that states computing power
35. The decentralized system that securely doubles approximately every two years.
records transactions. *(Blockchain Technology)* *(Moore’s Law)*
36. The computing model that allows businesses
to access computing resources over the internet.
*(Cloud Computing)* From: Daniela Aponesto
37. The cyberattack where attackers flood a
system with traffic to make it unavailable. *(DDoS 1.​ Republic Act No. 10175, also known as
- Distributed Denial of Service Attack)* the Cybercrime Prevention Act of 2012.
38. The full form of VPN. *(Virtual Private 2.​ Republic Act No. 10173 – Data Privacy
Network)* Act of 2012
39. The method used to prevent unauthorized 3.​ Republic Act No. 10844 – Department of
access by filtering network traffic. *(Firewall)* Information and Communications
40. The unique identifier assigned to a network Technology (DICT) Act of 2015
interface for communication. *(MAC Address - 4.​ Republic Act No. 11292 – National
Media Access Control Address)* Cybersecurity Plan Act
5.​ Republic Act No. 11930 – Anti-Online
--- Sexual Abuse and Exploitation of Children
Hardest Questions (OSAEC) Law (2022)
41. The process of breaking data into smaller
packets for transmission over a network. *(Packet Notable People in ICT
Switching)* 1. Who was the first person to propose the
42. The programming paradigm that uses objects concept of a *stored-program computer*,
and classes. *(Object-Oriented Programming - leading to the development of modern
OOP)* computers? John von Neumann
43. The process of converting high-level code into
machine code. *(Compilation)* 2. Who developed the *first compiler*, which
44. The type of malware that disguises itself as translates programming languages into machine
legitimate software. *(Trojan Horse)* code? Grace Hopper
45. The full form of ASCII. *(American Standard
Code for Information Interchange)* 3. Who co-created the *RSA encryption
46. The step-by-step procedure for solving a algorithm*, one of the most widely used
problem in programming. *(Algorithm)* cryptographic systems today? Ron Rivest, Adi
47. The principle of making websites accessible Shamir, and Leonard Adleman
and visually appealing across different devices.
*(Responsive Web Design)* 4. Which mathematician and writer is considered
48. The system that assigns IP addresses the *first computer programmer* for her work
globally. *(ICANN - Internet Corporation for on Charles Babbage’s Analytical Engine?
Assigned Names and Numbers)* Ada Lovelace
5. Who developed the *Shannon Theory*, which 14. Which cryptographer invented the
laid the foundation for modern digital *Diffie-Hellman key exchange*, a fundamental
communication and information theory? concept in cybersecurity?
Claude Shannon Whitfield Diffie and Martin Hellman

6. Who designed the *first graphical web 15. Who developed the *Deep Learning
browser, Mosaic*, which later influenced framework* that led to advancements in AI and
Netscape? neural networks?
Marc Andreessen Geoffrey Hinton

7. Who co-founded *Intel* and formulated Networking Concepts - Quiz Bee Questions
*Moore’s Law*, predicting the exponential growth
of computing power? Gordon Moore Easy Round
1. What does *LAN* stand for? Local Area
8. Who created *Python*, one of the most widely Network
used programming languages in AI and web
development? Guido van Rossum 2. What does *WAN* stand for? Wide Area
Network
9. Who is the co-founder of *Google* and was
instrumental in developing the PageRank 3. What device connects multiple computers
algorithm? Larry Page (co-founder: Sergey within a local network? Switch
Brin)
4. What networking device directs data between
10. Who developed the *first working prototype different networks? Router
of a personal computer*, called the Alto, at
Xerox PARC? Alan Kay 5. What does *IP* stand for in networking?
Internet Protocol
11. Who introduced the concept of *Hypertext*,
which later influenced the development of the 6. What is the primary purpose of a *firewall* in
World Wide Web? Ted Nelson networking? To protect networks by filtering
incoming and outgoing traffic
12. Who co-founded *Sun Microsystems* and
contributed to the development of the Java 7. What is the *default gateway* in networking?
programming language? The router or device that connects a local
James Gosling network to the internet

13. Who was the scientist behind the creation of Average Round
the *first transistor*, which led to modern 8. What is the difference between *IPv4 and
computing devices? IPv6*? IPv4 uses *32-bit addresses*, while
William Shockley (with John Bardeen and IPv6 uses *128-bit addresses*, allowing more
Walter Brattain) unique IP addresses
9. What does *MAC address* stand for, and what devices in a local network to share a single
is its purpose? *Media Access Control public IP address
address*; it uniquely identifies a device on a
network 18. What does *OSI* stand for, and how many
layers does it have?
10. What protocol is used to *send emails*? *Open Systems Interconnection* model; it has
SMTP (Simple Mail Transfer Protocol) *7 layers*

11. What protocol is used to *receive emails*? 19. What OSI layer is responsible for *routing
IMAP (Internet Message Access Protocol) or packets across networks*? Network Layer
POP3 (Post Office Protocol 3) (Layer 3)

12. What does *DNS* stand for, and what is its 20. What is a *subnet mask*, and why is it used?
function? Domain Name System*; it translates It determines which portion of an IP address
domain names (e.g., google.com) into IP represents the network and which part
addresses represents the host

13. What does *DHCP* stand for, and what is its 21. What is the *loopback IP address* used for
role in networking? *Dynamic Host testing network connectivity on a local device?
Configuration Protocol*; it automatically *127.0.0.1*
assigns IP addresses to devices in a network
22. What is the term for a network topology where
14. What is *bandwidth* in networking? The all devices are connected to a central hub? Star
maximum amount of data that can be Topology
transmitted over a network in a given time
23. What is the *main advantage of fiber optic
15. What type of *cable* is commonly used for cables over copper cables*? Higher bandwidth
Ethernet connections? Twisted-pair cable (e.g., and longer transmission distances with minimal
*Cat5e, Cat6*) interference

Difficult Round 24. What is a VPN (Virtual Private Network)


16. What is the primary difference between *TCP used for? To create a secure, encrypted
and UDP*? connection over a public network (like the
*TCP (Transmission Control Protocol)* is internet)
*connection-oriented*, ensuring reliable data
transfer, while *UDP (User Datagram 25. What does *SSID* stand for in wireless
Protocol)* is *connectionless*, making it faster networking? *Service Set Identifier*; it is the
but less reliable name of a Wi-Fi network

17. What is *NAT (Network Address


Translation)* used for? To allow multiple
sensitive information from unauthorized
From: Marga M. access.
8.​ Artificial Intelligence (AI) is an emerging
1.​ Web browser is a software application technology that simulates human
that enables users to access and navigate intelligence to perform tasks. Its potential
the World Wide Web, displaying web impact includes improved efficiencies in
pages and allowing for interaction with various sectors, personalized user
online content. experiences, and advancements in
2.​ Digital literacy refers to the ability to automation.
effectively use digital tools and 9.​ Copyright is important in the digital age
technologies, including understanding how as it protects the rights of creators and
to find, evaluate, and communicate their intellectual property, preventing
information online responsibly and unauthorized use or reproduction of their
ethically. work while promoting innovation.
3.​ Malware is malicious software designed to 10.​Effective online behavior in a digital
harm or exploit any programmable device, environment:
service, or network. It can lead to data ●​ practising good netiquette
theft, system damage, or unauthorized ●​ respecting copyright and
access to personal information. intellectual property
4.​ The Internet of Things (IoT) refers to the ●​ ensuring online privacy
network of interconnected devices that ●​ engaging in responsible
communicate and exchange data with communication to maintain a
each other via the internet, allowing for positive digital footprint.
automation and remote monitoring. 11.​Main components of a computer
5.​ Key considerations for online safety system:
and privacy: ●​ the CPU, RAM, storage devices,
●​ using strong passwords input devices, output devices, and
●​ being cautious about sharing the operating system.
personal information 12.​Word processor is used for creating and
●​ understanding privacy settings on editing text documents.
social media and other platforms 13.​Spreadsheet application is designed for
organizing, analyzing, and storing data in
6.​ Netiquette refers to the set of rules and tabular form.
guidelines for respectful and appropriate 14.​A database is an organized collection of
behavior while communicating online. It is structured information, and a basic SQL
important as it fosters positive interactions query is used to retrieve or manipulate
and reduces misunderstandings in digital data stored in the database.
communication. 15.​Wired networking uses physical cables
7.​ Encryption enhances cybersecurity by to connect devices, providing stable,
converting data into a coded format that high-speed connections.
can only be accessed or decrypted by
authorized users, thereby protecting
16.​Wireless networking uses radio waves, 23.​A file management system in an
allowing for mobility and easier operating system is responsible for
installation, but it may experience organizing, storing, and retrieving files on
interference and lower speeds. a storage device, ensuring efficient access
17.​CSS, or Cascading Style Sheets, is used and management of data.
to control the layout and appearance of 24.​Graphic design tools are used to create
web pages, allowing developers to apply visual content, allowing users to design
styles such as colors, fonts, and spacing graphics, layouts, and illustrations that
to HTML elements. enhance communication and branding
18.​World Wide Web is a system of efforts in various digital platforms.
interlinked hypertext documents accessed 25.​The CPU, or Central Processing Unit,
via the Internet using web browsers. acts as the brain of the computer,
Unlike the Internet, which is the underlying executing instructions and processing
network infrastructure, the Web is a data to perform tasks and run applications.
collection of information that is formatted 26.​Synchronous communication occurs in
and linked for easy navigation. real-time, requiring all participants to be
19.​File management system organizes and present simultaneously, such as in a video
manages files on a computer, enabling call. In contrast, asynchronous
users to create, store, retrieve, and communication allows participants to
manipulate data efficiently. It provides a engage at their convenience, like in email
structured way to access files and or forum discussions.
directories, ensuring data is easily 27.​Presentation software typically includes
accessible and manageable. features such as slide creation, transition
20.​Network protocol is a set of rules and effects, text formatting, multimedia
conventions that determine how data is integration, and presentation sharing
transmitted and received over a network. It options. These tools help users effectively
ensures reliable communication between communicate their ideas visually.
devices by defining the format, timing, and 28.​The primary function of a computer's
error handling for data exchange. RAM (Random Access Memory) are to
21.​Network security involves measures and temporarily store data and instructions that
protocols to protect data during the CPU needs while performing tasks,
transmission over networks from allowing for quick access and efficient
unauthorized access, breaches, and processing. It enhances the overall speed
attacks. It ensures confidentiality, integrity, and performance of the computer.
and availability of data. 29.​Internet Protocol (IP) is responsible for
22.​Cloud storage offers advantages such as addressing and routing packets of data
accessibility from any device with internet between devices on a network, ensuring
connectivity, automatic backups, and that information is sent to the correct
enhanced collaboration features, allowing destination.
multiple users to access and work on files 30.​Database administrator (DBA) is
simultaneously. responsible for managing and maintaining
database systems, ensuring data integrity,
security, and availability, as well as records, and managing database
performing regular backups and recovery structures.
tasks. 38.​Web developer is responsible for
31.​Public networks are open to anyone and designing, coding, and maintaining
are often less secure, such as public websites
Wi-Fi, while private networks require 39.​Net neutrality ensures that all internet
authentication and are typically more traffic is treated equally, preventing
secure, used within organizations. internet service providers from prioritizing
32.​Network switch connects devices within certain websites or services over others.
a local area network (LAN), allowing them This principle is crucial for maintaining a
to communicate with each other by free and open internet, promoting
forwarding data packets to the correct competition and innovation.
destination based on their MAC 40.​Cyber security refers to the protection of
addresses. computer systems and networks from
33.​Relational databases use structured theft, damage, or unauthorized access.
tables to store data and enforce
relationships through foreign keys, while
non-relational databases are more
flexible, storing data in various formats like
documents or key-value pairs, often
without predefined schemas.
34.​Network administrator is responsible for
managing, maintaining, and
troubleshooting a computer network. This
includes monitoring network performance,
ensuring network security, configuring
network devices, and providing technical
support to users.
35.​JavaScript is a programming language
used to create interactive and dynamic
content on websites, allowing developers
to enhance user experience through
features like animations, form validation,
and real-time updates.
36.​Internet is the global network of
interconnected computers that
communicate using standardized
protocols
37.​SQL, or Structured Query Language, is
used to communicate with and manipulate
databases. It allows users to perform
tasks such as querying data, updating

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy