Gec 10
Gec 10
BSME-1A
GEC 10- Living I.T. New Era
Activities/Assessments (Midterms)
Chapter 4 Assessment
IDENTIFICATION: Read the questions carefully. Write your answer before the number.
Malicious Software 1. Malware is a short term used for _________.
Ransomware 2. It displays an image that prevents you from accessing your computer.
Pharming 3. _______ is a common type of online fraud.
Network etiquette 4. Netiquette is a short term used for _______.
Spam 5. The mass distribution of unsolicited messages, advertising or pornography to addresses
which can be easily found on the internet.
Spyware, adware 6. ______ and ______ are often used by third parties to infiltrate your
computer.
Trojan Horses 7. It is an executable file that will install itself and run automatically once it’s
downloaded.
Viruses 8. Malicious computer programs that are often sent as an email attachment or a
download with the intent of infecting your computer.
Spam 9. It is one of the more common methods of both sending information out and collecting it
from unsuspecting people.
Computer Ethics 10. It is a set of rules for behaving properly online.
Ransomware11. A type of malware that restricts access to your computer or your files
and displays a message that demands payment for the restriction to be removed.
Pharming 12. A means to point you to a malicious and illegitimate website by
redirecting the legitimate URL.
Cybercrimes 13. _______ are common threat to computer and the internet as a whole.
Hacking 14. Action taken by someone to gain unauthorized access to a computer.
Encryption Ransomware 15. It encrypts files on your system’s hard drive and sometimes on
shared network, drives, USB drives, and external hard drives and even some cloud storage drives
preventing you from opening them.
Spyware 16. They often come in the form of a free download and are installed automatically
with or without your consent.
Trojan Horses 17. A malicious program that is disguised as or embedded within legitimate
software.
Wi-Fi Eavesdropping 18. Virtual listening in on your information that’s shared over an
unsecured or not encrypted network.
Netiquette 19. It is the proper way to communicate in an online environment.
Spyware 20. Software that collects personal information about you without you
knowing.
Chapter 5 Activities/Assessment
Essay: Read the statement/s carefully. Answer the given statement/s concisely.
3. Describe the process of technological change. How technological evolution takes place?
Technological change refers to the process of formulating ideas, innovation of these ideas
and distribution of ideas. To describe the process of technological evolution, the process starts in
the development of ideas. In this stage the main producer starts to brainstorm ideas that might
contain new services that the markets doesn’t have. After the development of ideas, the idea
starts to undergo the process of innovation. In these stage the developed ideas starts to undergo
trials to make the idea more marketable. Then at last after trials the idea will finally undergo the
process of distribution where the final product starts to be spread across the market.
Chapter 6 Assessment/Exercises
1. Enumerate 5 IoT devices and discuss what smart abilities they have.
a. Activity Trackers
It is consists of sensors which monitors and help to manage blood pressure, appetite,
physical movement and oxygen levels of the user.
b. Home Security
It is consists of variety of sensors, lights, alarms and cameras controlled by a smartphone
which ensures the safety of the establishments.
c. Industrial Security and Safety
It is consists of sensors that detects tresspassers and inside the establishments problems or
complications.
d. Augmented Reality Glasses
It allows the user to view animations in 3 dimensional setting.
e. Motion Detection
It detects vibrations that might help to identify anomalies and disturbances that might
result to catastrophic events.
2. Differentiate virtual reality technology and augmented technology from one another.
Virtual Reality technology is a world that uses virtual world and enhances a fictional
reality. In the other hand augmented reality is the world that uses real-world setting and enhances
both virtual and real world. To be more precise the difference between the two is that in virtual
reality you can explore underwater even though you’re not under the sea, while in augmented
reality you see tons of fish swimming through the world around you.
3. What are the positive and negative implications of these emerging trends to our culture and
society.
In a positive way, these emerging trends may help to improve and promote a society’s
culture and might enhance the interaction of individuals through various media. But in some
sense, these emerging trends might also cause to the destruction of the society and culture of a
particular place. It may destroy in the way that it either cause toxicities in the users verbal
vocabulary and prevents the promotion of the culture in that particular place.