EMP TECH EXAM Flashcards
ICT
Information and Communication Technology or Technologies.
generally refers to all devices, networking components, applications, and systems that facilitate interaction with the digital world.
ICT
Components of ICT
digital data, internet access, cloud computing, software, hardware, digital transactions, and communications technology.
ICT is ____ to the modern society
Essential
ICT is ______ part of our daily life (work, communication, learning, and living)
Valuable
ICT _______ all parts of the human experience from computers to robots.
Revolutionize
On-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user.
Cloud Computing
Set of instruction, data or program use to operate computers and executive specific tasks.
Software
Refers to any physical component of computer system containing circuit board, IC’s (integrated circuit) or other electronics.
Hardware
It can be broadly defined as online or automated transactions that take place between people and organizations – without the use of paper.
Digital Transaction
Also known as information technology, refers to all equipment and programs that are used to process and communicate information.
Communication technology
Is the data representing other forms of data using specific machine language system that can be interpreted by various technologies.
Digital Data
Is the process of connecting to the internet using personal computers, laptops, or mobile devices by users or enterprises. Internet access is subject to data signaling rates.
Internet Access
Wired
Wireless
Disk
Cloud
Keypad
Touchpad
Cellular
Smartphone
commonly referred to as WWW, W3, or the Web - is an interconnected system of public webpages accessible through the Internet.
World Wide Web
is an English computer scientist best known as the inventor of the World Wide Web.
He created the first web server, web browser, and webpage on his computer at the CERN physics research lab in 1990.
Sir Timothy John Berners-Lee, also known as TimBL
CERN
European Organization for Nuclear
Research.
Components of the Web
HTTP, HTML, URL
protocol governs data transfer between a server and a client.
HTTP (Hyper Text Transfer Protocol
To access a Web component, a client supplies a unique universal identifier, called a _
URL (uniform resource locator).
is the most common format for publishing web documents.
HTML (hypertext markup language)
Most web pages were static. Static in the sense that the page is “as is” and cannot be manipulated by the user. The content is also the same for all users.
Content is served from the server’s file system.
Frames and tables are used to position and align the elements.
Web 1.0
refers to worldwide websites which Nighlight user-generated content, usability, and interoperability for end users.
Web 2.0
t allows users to categorize and classify/arrange information using freely chosen keywords (e.g. hashtagging).
Folksonomy
content is dynamic and is responsible to user’s input.
Rich user experience
the owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comments, reviews, and evaluation.
User Participation
also known as Web 2.0 Marketing. _____keywords are used in SEO (Search Engine Optimization) as a cost-effective way to drive traffic to a website without having to bid on expensive keywords.
Long Tail
users will subscribe to a software only when needed rather than purchasing them.
Software as a Service (SaaS
diverse information sharing through universal web access.
Mass Participation
is a set of values and technical applications that define a new era of the World Wide Web.
_______ Is meant to be decentralized, open to everyone (with a bottom-up design) and built on top of blockchain technologies and developments in the Semantic Web, which describes the web as a network of meaningfully linked data.
Web 3.0
instrad af code being written and controlled by a small goup sf experts, it was developed in full view everyone, encouraging maximum and experimentation
Bottom-up design
Features of Web 3.0
Use of Artificial intelligence
Decentralization
Blockchain Technology
Semantic Web
Internet of Things
SIMILARITES OF WEB 1, WEB 2 and WEB 3
1.Internet Infrastructure - HITP HTML.
2.Global Connectivity - communicate, collaboration, access to information.
3.User participation - consuming, creating and sharing content.
4.Technological advancements - hardware, software, cloud computing, Al.
5.Evolutionary Progression - continuum progression.
6.Impact on the Society - influence, access to information, security, digtal literacy.
This is your sensitive personal information or your identity such as your username and passwords or bank accounts.
Private Information
to protect the fundamental human right of privacy.
Republic Act 10173 - Data Privacy Act of 2012
tells the user how the website will handle its data.
Privacy Policy
or e-reputation, is the reputation of a company, person, product, service or any other element on the Internet and digital platforms.
Online Reputation
Also known as Web safety or Internet safety.
Being aware of the nature of the possible threats that you could encounter whilst engaging in activity through the Internet.
Online Safety
If digital wallet users or net banking user is not familiar with the malicious entities present online then it will create a high risk to lose money and personal data.
Securing Online Transactions
in cyber security is the conversion of data from a readable format into an encoded format. _____ data can only be read or processed after it’s been decrypted. ______ is the basic building block of data security.
Encryption
Protecting from cyber-criminals
Create strong password.
Keep software and Operating System updated.
Never open attachments in spam emails.
Do not click on links in spam emails or unreliable websites.
Be mindful of the website you visit.
Update Firewalls and AntiVirus.
Examples of Cybercrimes
Email and internet fraud.
Identity fraud (where personal information is stolen and used).
Theft of financial or card payment data.
Theft and sale of corporate data.
Cyberextortion (demanding money to prevent a threatened attack).
Ransomware attacks (a type of cyberextortion).
Cryptojacking (where hackers mine cryptocurrency using resources they do not own).
Cyberespionage (where hackers access government or company data).
Interfering with systems in a way that compromises a network.
Infringing copyright.
Illegal gambling.
Selling illegal items online.
Soliciting, producing, or possessing child pornography.