Batch 3 Flashcards

(200 cards)

1
Q

Why is “Sanitization” a critical step in backend languages like PHP or Python?

A

To clean user input before it reaches the database, preventing “Injection” attacks where a hacker tries to run malicious commands through a web form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are the risks of using a public WiFi for bank transactions even when the site uses https?

A

Someone setting up a fake public WiFi could engange in DNS spoofing, install malware or downgrade the site to http without you noticing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a key regulatory difference between traditional medicine and many digital health apps?

A

Traditional medicine undergoes years of clinical trials and EMA licensing, whereas many apps are classified as “wellness” tools and do not undergo the same rigorous licensing procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can smartphone apps positively influence physical and emotional health?

A

By monitoring vital signs like heart rate, providing hydration reminders, and offering guided meditation to support healthy behavioral adoption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a potential negative psychological impact of consuming idealized body images on social media or health apps?

A

It can lead to serious conditions such as body dysmorphia, anxiety, and eating disorders due to unrealistic comparisons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do digital tools like voice-to-text and video calls support vulnerable groups?

A

They create new opportunities for social participation and independence for older people and those with special needs who might otherwise face barriers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a major risk for individuals who do not use digital tools as services become “digital by default”?

A

They may face social isolation and exclusion from essential services, such as banking and government assistance, that no longer offer non-digital alternatives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why should users be cautious when relying on a “wellness” app for medical advice?

A

Because these apps are not legally classified as medical devices, they may not have been scientifically validated to the same standard as licensed clinical treatments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the term “digital exclusion” refer to in the context of modern government services?

A

The loss of access to rights and services for people who lack the skills, hardware, or desire to use digital platforms for official tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some strategies to monitor and limit the use of smarphones?

A

Rules, agreements and technical limits on screen-free times, delayed availability of devices for children, installing time limitation and filter software, using focus modes to silence notifications during work or sleep, using greyscale mode to make apps less rewarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

For which tasks is a desktop computer typically superior to a smartphone or tablet?

A

Tasks requiring high processing power or precision, such as complex spreadsheet management, professional coding, 3D content creation, and high-end gaming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the primary use cases where a smartphone is the most essential tool compared to a PC?

A

Instant communication on the go, GPS navigation, mobile banking, and the use of digital identity (eID) for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a DNS issue and how does it prevent you from accessing a website?

A

A Domain Name System (DNS) issue means the ‘translator’ that turns a URL (like google.com) into an IP address is failing, so the browser cannot find the destination server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Aside from a wrong password, what are two common reasons a device might fail to connect to the internet?

A

The device might be in Airplane Mode, or there may be network congestion where too many devices are competing for the same bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can a user with an older laptop still run high-end video games or complex software?

A

By using ‘Cloud Computing’ or ‘Cloud Gaming’ services (like Amazon AWS or Xbox Cloud), where the heavy processing is done on a powerful remote server instead of the local hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the main benefit of using ‘Storage as a Service’ (e.g., iCloud, OneDrive) when your device’s physical memory is full?

A

It allows you to offload files to a secure online server, freeing up local space while keeping the data accessible across all your devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the recommended ‘first step’ for troubleshooting a smart home IoT device that has stopped responding?

A

Restarting the device by temporarily unplugging it (power cycling) and checking if the device is actually shown as online in its management app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In a typical IoT setup, what is the connection chain that allows a smart thermostat to be controlled by a phone?

A

The device connects to a local router or hub, which connects to a cloud service, which then communicates with the app on the user’s smartphone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What makes a tablet uniquely suited for digital artists compared to a standard laptop?

A

The combination of a high-resolution touchscreen and stylus support, which facilitates direct digital drawing and natural media manipulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

If your internet is working on your phone but not your laptop, and the Wi-Fi password is correct, what should you check first?

A

Check if Airplane Mode is accidentally enabled or if the laptop’s specific Wi-Fi adapter has been disabled in the software settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a key difference in consumer protection between buying from a professional e-commerce site versus a private individual on a sharing platform?

A

Professional e-commerce sites are subject to strict legal protections like the ‘14-day right of return,’ whereas consumer-to-consumer (C2C) transactions often have much more limited legal withdrawal rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In the EU, what does the ‘one-click’ withdrawal or 14-day return policy allow a consumer to do?

A

It allows a consumer to cancel an online purchase and return the goods within 14 days for any reason, ensuring a high level of protection in digital markets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which type of AI system is responsible for suggesting products you might like based on your previous browsing history?

A

Product recommenders, which analyze behavioral data to predict and display relevant items to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How is image recognition AI used in the field of healthcare?

A

It is used to analyze medical scans, such as X-rays or MRIs, to assist doctors in detecting tumors or other abnormalities with high precision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
How can a 3D printer be used to support sustainability and the 'Right to Repair' at home?
By allowing users to find or create digital designs to print spare parts for broken domestic appliances, extending the life of the product.
26
What are two common digital tools used to improve accessibility for users with visual impairments?
Screen zoom functions (to enlarge content) and text-to-voice (to read digital text aloud).
27
How does AI-driven speech technology specifically benefit users with limited mobility?
It enables the use of spoken commands to control devices and access information, removing the need for physical interaction with a keyboard or mouse.
28
Why might speech-based AI technology perform poorly for speakers of minority or 'smaller' languages?
Because AI development is often commercially prioritized for major world languages, leading to smaller datasets and less accurate recognition for less common languages.
29
What is the purpose of using machine translation tools like DeepL or Google Translate in a professional setting?
To get a 'rough understanding' of a foreign-language document or conversation quickly, though they may not be suitable for high-precision tasks.
30
In which scenarios should a user avoid relying solely on automated machine translation?
In high-stakes situations that require extreme precision and cultural nuance, such as healthcare, legal commerce, or international diplomacy.
31
What is an 'assistive voice output' tool and who is it intended for?
A tool that converts typed text into synthetic speech, intended for individuals who have limited or no means to communicate orally.
32
What is a primary benefit of managing finances through digital banking apps?
Increased speed, real-time control over transactions, and the ability to access and manage financial services globally at any time.
33
What is a critical risk associated with exclusively managing high-stakes financial data through digital platforms?
The risk of hacking or data breaches, which can lead to unauthorized access to financial services and the theft of sensitive personal information.
34
How can modern hearing aids benefit from 'Auracast' or similar pairing technologies?
They can be wirelessly paired with smartphones, TVs, and even public smoke alarms to stream audio directly to the wearer, enhancing safety and participation.
35
What does it mean to have a 'digital emergency plan' in the context of a smart home or digital finance?
It involves maintaining non-digital backups, such as keeping physical cash on hand or spare batteries, to remain resilient if digital systems fail or power is lost.
36
Why is collaborative problem-solving in environments like Massive Open Online Courses (MOOCs) beneficial?
It allows participants to leverage a wide variety of knowledge, perspectives, and experiences to improve learning outcomes and create better solutions than one could alone.
37
Give an example of a conflict between different types of 'value' created by digital innovation.
The economic benefit of using AI for fast recruitment might conflict with the social value of ensuring fair, unbiased, and transparent decision-making.
38
How can IoT sensors be used in the agricultural sector to create value?
By placing sensors in fields to monitor soil moisture and nutrient levels, allowing farmers to optimize water use and crop health through data.
39
What is a 'Digital Twin' in the context of industrial IoT?
A virtual model of a physical object or system used for preventive maintenance, allowing engineers to predict and fix problems before they occur in the real world.
40
Which 'No-Code' platforms can be used to turn an idea into a functional mobile app without writing complex code?
Platforms like Adalo, Glide, or Bubble allow users to build and launch mobile applications through visual interfaces.
41
Name two online platforms used specifically to design and test IoT codes and hardware simulations.
Tinkercad and Wokwi (or Arduino Cloud).
42
How can a user creatively combine IoT and mobile devices to improve home energy efficiency?
By using a smartphone app to set a strategy where the intensity of smart lights is automatically adjusted based on the time of day and available ambient light.
43
What is a 'FixMyStreet' style platform and how does it address social problems?
It is a public reporting system that allows citizens to digitally report local issues like potholes or broken streetlights to their local government for repair.
44
What is an 'Online Time Bank' and what social value does it create?
A resource-sharing platform where 'time' spent helping others is used as currency, fostering community support and the exchange of services without traditional money.
45
What is a 'Hackathon' and what is its primary goal?
A time-bound collaborative event where people with different skills build a prototype solution to a specific intellectual, social, or practical problem.
46
What happens in a 'Makerspace' regarding co-creation?
Users engage in 'end-user development,' using shared digital tools (like 3D printers or laser cutters) to co-design and co-create products that provide value to the community.
47
What does 'alignment' mean when co-creating new AI products for society?
Ensuring that the AI's goals and behaviors are designed to match human values, ethics, and the specific needs of the citizens the service is meant to support.
48
How can 'Citizen Science' activities utilize IoT sensors for the public good?
By using air or water quality sensors managed by community members to collect and share data about their local environment for research and advocacy.
49
What is 'Ideation' in the context of a digital contest or challenge?
The process of generating, developing, and communicating new ideas to solve a problem before moving into the prototyping or building phase.
50
How does 'Vehicle-to-Everything' (V2X) communication represent a creative use of IoT?
It allows automobiles to communicate with other cars, traffic lights, and infrastructure to improve road safety, reduce traffic, and optimize fuel consumption.
51
What is the main physical difference between USB-A and USB-C connectors?
USB-A is the traditional rectangular connector that only fits one way; USB-C is smaller, oval-shaped, and reversible (fits both ways).
52
Which USB standard supports 'Power Delivery' (PD) to charge high-wattage devices like laptops?
USB-C.
53
What is the difference between HDMI and VGA cables?
HDMI is a digital connection that carries both high-definition video and audio; VGA is an older analog connection that carries video only.
54
What is the function of a 'DisplayPort' compared to HDMI?
Both carry digital video and audio, but DisplayPort is often preferred in professional and gaming settings for higher refresh rates and multi-monitor daisy-chaining.
55
How can you identify a USB 3.0 port on a computer?
It is typically colored blue inside or marked with an 'SS' (SuperSpeed) icon.
56
What is 'Lossy Compression' in digital files?
A method that reduces file size by permanently removing some data (e.g., JPEG, MP3); the quality decreases but the file is much smaller.
57
What is 'Lossless Compression'?
A method that reduces file size without losing any original data; the file can be perfectly reconstructed (e.g., ZIP, PNG, FLAC).
58
Why is the SVG file format unique for web graphics?
It is a 'Vector' format, meaning it uses mathematical paths instead of pixels; it can be scaled to any size without losing quality or becoming blurry.
59
What is the advantage of the PNG format over JPEG?
PNG supports 'Transparency' (alpha channels) and lossless compression, making it ideal for logos and web icons.
60
What is the HEIC/HEIF format often found on modern smartphones?
A high-efficiency image format that provides better quality than JPEG at roughly half the file size.
61
What is the difference between 'CC' and 'BCC' in an email?
CC (Carbon Copy) makes all recipients visible to each other; BCC (Blind Carbon Copy) hides the recipients' email addresses from others.
62
What is the 'IMAP' protocol used for in email?
It synchronizes email across multiple devices; messages remain on the server so you see the same 'Sent' and 'Inbox' folders everywhere.
63
What is the 'POP3' protocol and why is it considered legacy?
It downloads emails to a single device and usually deletes them from the server, making it difficult to access the same emails from other devices.
64
Which protocol is responsible for 'sending' emails from a client to a server?
SMTP (Simple Mail Transfer Protocol).
65
What is the typical file size limit for email attachments across major providers like Gmail or Outlook?
Approximately 20 to 25 Megabytes (MB).
66
What is an 'IP Address'?
A unique numerical label (like a digital home address) assigned to each device connected to a computer network that uses the Internet Protocol for communication.
67
What is the difference between IPv4 and IPv6?
IPv4 uses a 32-bit format (e.g., 192.168.1.1) and has a limited number of addresses; IPv6 uses a 128-bit alphanumeric format to provide a nearly infinite supply of addresses.
68
What is the difference between a 'Static' and a 'Dynamic' IP address?
A Static IP remains the same permanently (used for servers); a Dynamic IP is temporarily assigned by the ISP and can change over time.
69
What is a VPN (Virtual Private Network) 'tunnel'?
An encrypted connection that masks your IP address and data traffic from your ISP and hackers, making it appear as if you are browsing from a different location.
70
What is the main technical improvement of 5G over 4G?
Significantly higher bandwidth (speed) and much lower latency (reduced delay/ping).
71
In networking, what is the difference between 'Bandwidth' and 'Latency'?
Bandwidth is the total capacity to transfer data (the width of the pipe); Latency is the time it takes for a single piece of data to travel (the speed of the flow).
72
What is 'Ransomware'?
A type of malware that encrypts a user's files, making them inaccessible, and demands a payment (usually in cryptocurrency) to unlock them.
73
What is a 'Trojan Horse' in computing?
Malicious software that disguises itself as a legitimate program to trick users into installing it.
74
What is a 'Keylogger'?
A type of spyware that records every keystroke made on a keyboard to steal passwords, credit card numbers, and private messages.
75
What is a 'Man-in-the-Middle' (MitM) attack?
A cyberattack where the attacker secretly intercepts and relays communication between two parties who believe they are communicating directly (common on public Wi-Fi).
76
What is 'Zero-Day' vulnerability?
A software security flaw that is unknown to the developer and has no available patch, leaving it open to immediate exploitation by hackers.
77
Why might a USB drive formatted in 'FAT32' fail to copy a 5GB movie file?
FAT32 has a maximum individual file size limit of 4 Gigabytes (GB).
78
What is the standard file system for modern Windows computers?
NTFS (New Technology File System).
79
Which file system is used by modern Apple computers (macOS)?
APFS (Apple File System).
80
What is a 'Device Driver'?
A piece of software that tells the Operating System how to communicate with and control a specific piece of hardware (like a printer or graphics card).
81
How do you force-quit a non-responsive application in Windows?
By opening the 'Task Manager' (Ctrl+Alt+Delete or Ctrl+Shift+Esc) and selecting 'End Task'.
82
What is 'Safe Mode' in an Operating System?
A diagnostic mode that starts the computer with only the most essential drivers and services to help troubleshoot software conflicts.
83
What does '1080p' resolution mean in terms of pixels?
It means the screen has 1920 horizontal pixels and 1080 vertical pixels (Full HD).
84
What is the difference between 4K and 1080p resolution?
4K (Ultra HD) has four times the total number of pixels as 1080p, resulting in a much sharper and more detailed image.
85
What is 'Refresh Rate' (measured in Hertz/Hz)?
The number of times per second the screen updates the image; a higher rate (e.g., 120Hz) results in smoother motion.
86
What does 'PPI' (Pixels Per Inch) measure?
The pixel density of a screen; a higher PPI means pixels are packed closer together, making the image look sharper to the human eye.
87
What is the 'Ping' command used for?
To test the reachability of a host on a network and measure the round-trip time it takes for messages to be sent and received.
88
What is a '.CSV' file?
A 'Comma-Separated Values' file; a plain text file that stores tabular data (numbers and text) in a format that can be easily opened by spreadsheet software.
89
What is the primary use of a '.TIFF' file?
A high-quality, uncompressed (or lossless) image format used primarily in professional photography and high-quality printing.
90
What is the difference between an 'Archive' (ZIP) and a 'Backup'?
An archive moves data to long-term storage to save space; a backup creates a 'copy' of active data to prevent loss in case of a disaster.
91
What is a 'Firewall'?
A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
92
What is 'Packet Loss' and how does it affect a video call?
When small units of data (packets) fail to reach their destination; it results in 'stuttering' audio, frozen video, or dropped calls.
93
What is an 'SSD' (Solid State Drive) and why is it faster than an 'HDD' (Hard Disk Drive)?
An SSD uses flash memory (no moving parts) to access data instantly; an HDD uses spinning magnetic platters, which are much slower to read and write.
94
What is a 'MAC Address'?
A unique physical identifier permanently assigned to a network interface card (NIC) by the manufacturer; unlike an IP address, it usually never changes.
95
What is 'Encryption at Rest'?
A security measure where data is encrypted while it is stored on a disk or server, protecting it if the physical hardware is stolen.
96
What is 'End-to-End Encryption' (E2EE)?
A system of communication where only the communicating users can read the messages; no third party (including the service provider) can access the keys to decrypt the data.
97
What is 'Bloatware'?
Unwanted software that comes pre-installed on a new computer or phone by the manufacturer, which often slows down the device.
98
What does it mean to 'Clear the Browser Cache'?
Deleting temporary files (like images and scripts) stored by the browser to speed up loading; doing this can fix display issues or outdated content on websites.
99
What is 'Metadata' in a file?
'Data about data'; hidden information within a file such as the author, date created, file size, or GPS coordinates of a photo.
100
What is the 'HTTP' vs 'HTTPS' protocol?
HTTP is the standard protocol for transferring web data; HTTPS adds an SSL/TLS encryption layer to ensure the connection between the browser and server is secure.
101
Why is "Sanitization" a critical step in backend languages like PHP or Python?
To clean user input before it reaches the database, preventing "Injection" attacks where a hacker tries to run malicious commands through a web form.
102
Why are the risks of using a public WiFi for bank transactions even when the site uses https?
Someone setting up a fake punlic WiFi could engange in DNS spoofing, install malware or downgrade the site to http without you noticing.
103
What is a key regulatory difference between traditional medicine and many digital health apps?
Traditional medicine undergoes years of clinical trials and EMA licensing, whereas many apps are classified as "wellness" tools and do not undergo the same rigorous licensing procedures.
104
How can smartphone apps positively influence physical and emotional health?
By monitoring vital signs like heart rate, providing hydration reminders, and offering guided meditation to support healthy behavioral adoption.
105
What is a potential negative psychological impact of consuming idealized body images on social media or health apps?
It can lead to serious conditions such as body dysmorphia, anxiety, and eating disorders due to unrealistic comparisons.
106
How do digital tools like voice-to-text and video calls support vulnerable groups?
They create new opportunities for social participation and independence for older people and those with special needs who might otherwise face barriers.
107
What is a major risk for individuals who do not use digital tools as services become "digital by default"?
They may face social isolation and exclusion from essential services, such as banking and government assistance, that no longer offer non-digital alternatives.
108
Why should users be cautious when relying on a "wellness" app for medical advice?
Because these apps are not legally classified as medical devices, they may not have been scientifically validated to the same standard as licensed clinical treatments.
109
What does the term "digital exclusion" refer to in the context of modern government services?
The loss of access to rights and services for people who lack the skills, hardware, or desire to use digital platforms for official tasks.
110
What are some strategies to monitor and limit the use of smarphones?
Rules, agreements and technical limits on screen-free times, delayed availability of devices for children, installing time limitation and filter software, using focus modes to silence notifications during work or sleep, using greyscale mode to make apps less rewarding
111
For which tasks is a desktop computer typically superior to a smartphone or tablet?
Tasks requiring high processing power or precision, such as complex spreadsheet management, professional coding, 3D content creation, and high-end gaming.
112
What are the primary use cases where a smartphone is the most essential tool compared to a PC?
Instant communication on the go, GPS navigation, mobile banking, and the use of digital identity (eID) for authentication.
113
What is a DNS issue and how does it prevent you from accessing a website?
A Domain Name System (DNS) issue means the 'translator' that turns a URL (like google.com) into an IP address is failing, so the browser cannot find the destination server.
114
Aside from a wrong password, what are two common reasons a device might fail to connect to the internet?
The device might be in Airplane Mode, or there may be network congestion where too many devices are competing for the same bandwidth.
115
How can a user with an older laptop still run high-end video games or complex software?
By using 'Cloud Computing' or 'Cloud Gaming' services (like Amazon AWS or Xbox Cloud), where the heavy processing is done on a powerful remote server instead of the local hardware.
116
What is the main benefit of using 'Storage as a Service' (e.g., iCloud, OneDrive) when your device's physical memory is full?
It allows you to offload files to a secure online server, freeing up local space while keeping the data accessible across all your devices.
117
What is the recommended 'first step' for troubleshooting a smart home IoT device that has stopped responding?
Restarting the device by temporarily unplugging it (power cycling) and checking if the device is actually shown as online in its management app.
118
In a typical IoT setup, what is the connection chain that allows a smart thermostat to be controlled by a phone?
The device connects to a local router or hub, which connects to a cloud service, which then communicates with the app on the user's smartphone.
119
What makes a tablet uniquely suited for digital artists compared to a standard laptop?
The combination of a high-resolution touchscreen and stylus support, which facilitates direct digital drawing and natural media manipulation.
120
If your internet is working on your phone but not your laptop, and the Wi-Fi password is correct, what should you check first?
Check if Airplane Mode is accidentally enabled or if the laptop's specific Wi-Fi adapter has been disabled in the software settings.
121
What is a key difference in consumer protection between buying from a professional e-commerce site versus a private individual on a sharing platform?
Professional e-commerce sites are subject to strict legal protections like the '14-day right of return,' whereas consumer-to-consumer (C2C) transactions often have much more limited legal withdrawal rights.
122
In the EU, what does the 'one-click' withdrawal or 14-day return policy allow a consumer to do?
It allows a consumer to cancel an online purchase and return the goods within 14 days for any reason, ensuring a high level of protection in digital markets.
123
Which type of AI system is responsible for suggesting products you might like based on your previous browsing history?
Product recommenders, which analyze behavioral data to predict and display relevant items to the user.
124
How is image recognition AI used in the field of healthcare?
It is used to analyze medical scans, such as X-rays or MRIs, to assist doctors in detecting tumors or other abnormalities with high precision.
125
How can a 3D printer be used to support sustainability and the 'Right to Repair' at home?
By allowing users to find or create digital designs to print spare parts for broken domestic appliances, extending the life of the product.
126
What are two common digital tools used to improve accessibility for users with visual impairments?
Screen zoom functions (to enlarge content) and text-to-voice (to read digital text aloud).
127
How does AI-driven speech technology specifically benefit users with limited mobility?
It enables the use of spoken commands to control devices and access information, removing the need for physical interaction with a keyboard or mouse.
128
Why might speech-based AI technology perform poorly for speakers of minority or 'smaller' languages?
Because AI development is often commercially prioritized for major world languages, leading to smaller datasets and less accurate recognition for less common languages.
129
What is the purpose of using machine translation tools like DeepL or Google Translate in a professional setting?
To get a 'rough understanding' of a foreign-language document or conversation quickly, though they may not be suitable for high-precision tasks.
130
In which scenarios should a user avoid relying solely on automated machine translation?
In high-stakes situations that require extreme precision and cultural nuance, such as healthcare, legal commerce, or international diplomacy.
131
What is an 'assistive voice output' tool and who is it intended for?
A tool that converts typed text into synthetic speech, intended for individuals who have limited or no means to communicate orally.
132
What is a primary benefit of managing finances through digital banking apps?
Increased speed, real-time control over transactions, and the ability to access and manage financial services globally at any time.
133
What is a critical risk associated with exclusively managing high-stakes financial data through digital platforms?
The risk of hacking or data breaches, which can lead to unauthorized access to financial services and the theft of sensitive personal information.
134
How can modern hearing aids benefit from 'Auracast' or similar pairing technologies?
They can be wirelessly paired with smartphones, TVs, and even public smoke alarms to stream audio directly to the wearer, enhancing safety and participation.
135
What does it mean to have a 'digital emergency plan' in the context of a smart home or digital finance?
It involves maintaining non-digital backups, such as keeping physical cash on hand or spare batteries, to remain resilient if digital systems fail or power is lost.
136
Why is collaborative problem-solving in environments like Massive Open Online Courses (MOOCs) beneficial?
It allows participants to leverage a wide variety of knowledge, perspectives, and experiences to improve learning outcomes and create better solutions than one could alone.
137
Give an example of a conflict between different types of 'value' created by digital innovation.
The economic benefit of using AI for fast recruitment might conflict with the social value of ensuring fair, unbiased, and transparent decision-making.
138
How can IoT sensors be used in the agricultural sector to create value?
By placing sensors in fields to monitor soil moisture and nutrient levels, allowing farmers to optimize water use and crop health through data.
139
What is a 'Digital Twin' in the context of industrial IoT?
A virtual model of a physical object or system used for preventive maintenance, allowing engineers to predict and fix problems before they occur in the real world.
140
Which 'No-Code' platforms can be used to turn an idea into a functional mobile app without writing complex code?
Platforms like Adalo, Glide, or Bubble allow users to build and launch mobile applications through visual interfaces.
141
Name two online platforms used specifically to design and test IoT codes and hardware simulations.
Tinkercad and Wokwi (or Arduino Cloud).
142
How can a user creatively combine IoT and mobile devices to improve home energy efficiency?
By using a smartphone app to set a strategy where the intensity of smart lights is automatically adjusted based on the time of day and available ambient light.
143
What is a 'FixMyStreet' style platform and how does it address social problems?
It is a public reporting system that allows citizens to digitally report local issues like potholes or broken streetlights to their local government for repair.
144
What is an 'Online Time Bank' and what social value does it create?
A resource-sharing platform where 'time' spent helping others is used as currency, fostering community support and the exchange of services without traditional money.
145
What is a 'Hackathon' and what is its primary goal?
A time-bound collaborative event where people with different skills build a prototype solution to a specific intellectual, social, or practical problem.
146
What happens in a 'Makerspace' regarding co-creation?
Users engage in 'end-user development,' using shared digital tools (like 3D printers or laser cutters) to co-design and co-create products that provide value to the community.
147
What does 'alignment' mean when co-creating new AI products for society?
Ensuring that the AI's goals and behaviors are designed to match human values, ethics, and the specific needs of the citizens the service is meant to support.
148
How can 'Citizen Science' activities utilize IoT sensors for the public good?
By using air or water quality sensors managed by community members to collect and share data about their local environment for research and advocacy.
149
What is 'Ideation' in the context of a digital contest or challenge?
The process of generating, developing, and communicating new ideas to solve a problem before moving into the prototyping or building phase.
150
How does 'Vehicle-to-Everything' (V2X) communication represent a creative use of IoT?
It allows automobiles to communicate with other cars, traffic lights, and infrastructure to improve road safety, reduce traffic, and optimize fuel consumption.
151
What is the main physical difference between USB-A and USB-C connectors?
USB-A is the traditional rectangular connector that only fits one way; USB-C is smaller, oval-shaped, and reversible (fits both ways).
152
Which USB standard supports 'Power Delivery' (PD) to charge high-wattage devices like laptops?
USB-C.
153
What is the difference between HDMI and VGA cables?
HDMI is a digital connection that carries both high-definition video and audio; VGA is an older analog connection that carries video only.
154
What is the function of a 'DisplayPort' compared to HDMI?
Both carry digital video and audio, but DisplayPort is often preferred in professional and gaming settings for higher refresh rates and multi-monitor daisy-chaining.
155
How can you identify a USB 3.0 port on a computer?
It is typically colored blue inside or marked with an 'SS' (SuperSpeed) icon.
156
What is 'Lossy Compression' in digital files?
A method that reduces file size by permanently removing some data (e.g., JPEG, MP3); the quality decreases but the file is much smaller.
157
What is 'Lossless Compression'?
A method that reduces file size without losing any original data; the file can be perfectly reconstructed (e.g., ZIP, PNG, FLAC).
158
Why is the SVG file format unique for web graphics?
It is a 'Vector' format, meaning it uses mathematical paths instead of pixels; it can be scaled to any size without losing quality or becoming blurry.
159
What is the advantage of the PNG format over JPEG?
PNG supports 'Transparency' (alpha channels) and lossless compression, making it ideal for logos and web icons.
160
What is the HEIC/HEIF format often found on modern smartphones?
A high-efficiency image format that provides better quality than JPEG at roughly half the file size.
161
What is the difference between 'CC' and 'BCC' in an email?
CC (Carbon Copy) makes all recipients visible to each other; BCC (Blind Carbon Copy) hides the recipients' email addresses from others.
162
What is the 'IMAP' protocol used for in email?
It synchronizes email across multiple devices; messages remain on the server so you see the same 'Sent' and 'Inbox' folders everywhere.
163
What is the 'POP3' protocol and why is it considered legacy?
It downloads emails to a single device and usually deletes them from the server, making it difficult to access the same emails from other devices.
164
Which protocol is responsible for 'sending' emails from a client to a server?
SMTP (Simple Mail Transfer Protocol).
165
What is the typical file size limit for email attachments across major providers like Gmail or Outlook?
Approximately 20 to 25 Megabytes (MB).
166
What is an 'IP Address'?
A unique numerical label (like a digital home address) assigned to each device connected to a computer network that uses the Internet Protocol for communication.
167
What is the difference between IPv4 and IPv6?
IPv4 uses a 32-bit format (e.g., 192.168.1.1) and has a limited number of addresses; IPv6 uses a 128-bit alphanumeric format to provide a nearly infinite supply of addresses.
168
What is the difference between a 'Static' and a 'Dynamic' IP address?
A Static IP remains the same permanently (used for servers); a Dynamic IP is temporarily assigned by the ISP and can change over time.
169
What is a VPN (Virtual Private Network) 'tunnel'?
An encrypted connection that masks your IP address and data traffic from your ISP and hackers, making it appear as if you are browsing from a different location.
170
What is the main technical improvement of 5G over 4G?
Significantly higher bandwidth (speed) and much lower latency (reduced delay/ping).
171
In networking, what is the difference between 'Bandwidth' and 'Latency'?
Bandwidth is the total capacity to transfer data (the width of the pipe); Latency is the time it takes for a single piece of data to travel (the speed of the flow).
172
What is 'Ransomware'?
A type of malware that encrypts a user's files, making them inaccessible, and demands a payment (usually in cryptocurrency) to unlock them.
173
What is a 'Trojan Horse' in computing?
Malicious software that disguises itself as a legitimate program to trick users into installing it.
174
What is a 'Keylogger'?
A type of spyware that records every keystroke made on a keyboard to steal passwords, credit card numbers, and private messages.
175
What is a 'Man-in-the-Middle' (MitM) attack?
A cyberattack where the attacker secretly intercepts and relays communication between two parties who believe they are communicating directly (common on public Wi-Fi).
176
What is 'Zero-Day' vulnerability?
A software security flaw that is unknown to the developer and has no available patch, leaving it open to immediate exploitation by hackers.
177
Why might a USB drive formatted in 'FAT32' fail to copy a 5GB movie file?
FAT32 has a maximum individual file size limit of 4 Gigabytes (GB).
178
What is the standard file system for modern Windows computers?
NTFS (New Technology File System).
179
Which file system is used by modern Apple computers (macOS)?
APFS (Apple File System).
180
What is a 'Device Driver'?
A piece of software that tells the Operating System how to communicate with and control a specific piece of hardware (like a printer or graphics card).
181
How do you force-quit a non-responsive application in Windows?
By opening the 'Task Manager' (Ctrl+Alt+Delete or Ctrl+Shift+Esc) and selecting 'End Task'.
182
What is 'Safe Mode' in an Operating System?
A diagnostic mode that starts the computer with only the most essential drivers and services to help troubleshoot software conflicts.
183
What does '1080p' resolution mean in terms of pixels?
It means the screen has 1920 horizontal pixels and 1080 vertical pixels (Full HD).
184
What is the difference between 4K and 1080p resolution?
4K (Ultra HD) has four times the total number of pixels as 1080p, resulting in a much sharper and more detailed image.
185
What is 'Refresh Rate' (measured in Hertz/Hz)?
The number of times per second the screen updates the image; a higher rate (e.g., 120Hz) results in smoother motion.
186
What does 'PPI' (Pixels Per Inch) measure?
The pixel density of a screen; a higher PPI means pixels are packed closer together, making the image look sharper to the human eye.
187
What is the 'Ping' command used for?
To test the reachability of a host on a network and measure the round-trip time it takes for messages to be sent and received.
188
What is a '.CSV' file?
A 'Comma-Separated Values' file; a plain text file that stores tabular data (numbers and text) in a format that can be easily opened by spreadsheet software.
189
What is the primary use of a '.TIFF' file?
A high-quality, uncompressed (or lossless) image format used primarily in professional photography and high-quality printing.
190
What is the difference between an 'Archive' (ZIP) and a 'Backup'?
An archive moves data to long-term storage to save space; a backup creates a 'copy' of active data to prevent loss in case of a disaster.
191
What is a 'Firewall'?
A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
192
What is 'Packet Loss' and how does it affect a video call?
When small units of data (packets) fail to reach their destination; it results in 'stuttering' audio, frozen video, or dropped calls.
193
What is an 'SSD' (Solid State Drive) and why is it faster than an 'HDD' (Hard Disk Drive)?
An SSD uses flash memory (no moving parts) to access data instantly; an HDD uses spinning magnetic platters, which are much slower to read and write.
194
What is a 'MAC Address'?
A unique physical identifier permanently assigned to a network interface card (NIC) by the manufacturer; unlike an IP address, it usually never changes.
195
What is 'End-to-End Encryption' (E2EE)?
A system of communication where only the communicating users can read the messages; no third party (including the service provider) can access the keys to decrypt the data.
196
What does it mean to 'Clear the Browser Cache'?
Deleting temporary files (like images and scripts) stored by the browser to speed up loading; doing this can fix display issues or outdated content on websites.
197
What is the 'HTTP' vs 'HTTPS' protocol?
HTTP is the standard protocol for transferring web data; HTTPS adds an SSL/TLS encryption layer to ensure the connection between the browser and server is secure.
198
Explain how a number x is sent using the Public Key (e, N) under RSA
The sender sends the Cyphertext C, which is the remainder of (x^e)/N. The recipient computes (C^d)/N, where d is the private Key, to get x.
199
What is the role of TCP (Transmission Control Protocol) and IP (Internet Protocol)?
IP addresses data packages, TCP packages them and ensures that all of them arrive (in the right order).
200
What is the role of HTML, Javascript and PHP on a modern website?
HTML (Hyper Text Markup Language) defines the content of the page (headings, images, texts) but is not dynamic. Dynamic elements that do not reload the page (e.g., changing the colour when pressing the Like button) are based on Javascript. Both run on the client-side, i.e., in the web-browser. PHP (Hypertext Preprocessor) runs on the server side and interacts with databases etc. and then sends back HTML (e.g., new page after verifying your login).