ETECH Flashcards
can be traced thousands or years ago, around 3000
BCE to 1450 CE. During this time humans started communicating with one another using words and pictograms curved in rocks.
Premechanical period
considered the first data centers in history.
Library
pictogram dating back 3100 BCE
Sumerian
considered to be the first counting device was introduced in the 2nd century BCE. Manually operated device similar to the modern calculator.
Abacus
This period served as the bridge between our current period and the
premechanical period. This period started around 1450 – 1840. During this time, the interest in automating and speeding up numerical calculations grew.
Mechanical Period
which was invented by the famous mathematician inventor Blaise
Pascal.
Pascaline
which is considered the first programmable
mechanical computer and was invented by Charles Babbage.
Analytical Engine
“Father of the Computer”
Charles Babbage
It is a crime of stealing personal information for the purpose of assuming that
person’s name or identity to make any form of transactions.
Identity Theft
considered the first
electrical communications devices.
Telegraph
This period started around 1840 – 1940. In this period, the use of
electricity for information handling and transfer bloomed.
Electromechanical Period
first computer programmer.
Ada Lovelace
invented the
first commercial telegraph in 1837 (OLIVIA AND KING)
William Cooke and Sir Charles Wheatstone
An American inventor successfully introduced the first single circuit telegraph
Samuel Morse
The last period in ICT history. It started in the 1940s and continues to the present. The highlight of this period is focus on the advent of solid state devices or electronic devices.
Electronic Period
best known for
his invention of the telephone.
Alexander Graham Bell
the first electronic and general purpose computer. (1946)
ENIAC
It is an electronic with properties and
functions similar to vacuum tubes but it is lightweight and faster. (1947)
Transistors
Introduced by Tim Berners-Lee.
It consists of different pages that are formatted in a markup language called HTML (Hypertext Markup Language) and linked to each other that contain text, graphics, multimedia files, hyperlinks, etc.
WWW
is a device that composed of a group of transistors
and circuit elements compressed in a single package. (ICU)
Integrated Circuit (IC)
It is also known as a flat or stationary page and it cannot be manipulated by users.
WEB 1.0
It is a dynamic web page where user can interact with page like
creating a user account, posting comments, uploading files and
images, and others.
WEB 2.0
Features of web 2.0
FOLKSONOMY
RICH USER EXPERIENCE
USER PARTICIPATION
LONG TAIL
SOFTWARE AS A SERVICE
MASS PARTICIPATION
users can classify and arrange information by
adding tags or labels. (SODOMY FOLKLORE)
Folksonomy
Two or more technologies
perform into one single
function
Convergent Technology
It often deals with the use of different
technological inventions like mobile
phones, telephones, computer, Internet, and other devices
ICT
It is an etiquette
applied online that shows proper manner and behavior.
Netiquette
The importance of internet plays a crucial part in human development.
Online Safety
It happens when someone intentionally abused, harass, and mistreated by other
person using electronic communication.
Cyberbullying
A criminal practice where electronic communication is used to stalk or harass individual or group.
Cyber Stalking
The act of sending sexually explicit text messages, images, and videos.
Sexting
a malicious program that replicate
itself by copying itself to another program.
Virus
Also known as
Malicious Software. It is a set of
instructions that run on your computer and make your system do
something that an attacker wants it
to do.
Malware
malicious program that copy is itself and spreads to other computers.
Worm
a malicious program that disguised as legitimate program that user will accept and use but take control of your computer.
Trojan
A malicious program that gathers information from victim’s computer and send it back to the hacker.
Spyware
An unwanted advertisement that will pop-up several
times on victim’s computer then behave abnormally and tedious to close them.
ADWARE
A program that runs in the background and steals user credentials and confidential information and send back to hack by
recording every keystroke that a user makes on their computer or
device.
Keylogger
A collection of infected internets–connected devices such as PC and mobile phone that are controlled by a common type of malware.
Botnet
A software tools used by hackers to gain control over a computer on a network without being exposed.
Rootkit
A ransom virus that block the user from accessing the
programs or files and demands to pay the ransom through online
method for the removal of the virus.
Ransomware
Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware.
Spam
A cyberattack method
using deceptive emails and websites to acquiring sensitive personal information.
Phishing
Pharming
A more complicated way of phishing where it exploits the DNS (DOMAIN NAME
SERVICE) system.
A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others.
Cybercrime