ETECH WEEK 1 Flashcards
deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, and edit information.
Information and Communication
Technology (ICT)
It is a study of computers as data processing tools. It introduces students to the fundamental of using computer systems in an
internet environment.
Information and Communication
Technology (ICT)
introduced Microsoft
BILL GATES
introduced Apple
STEVE JOBS
pioneered Facebook and later bought Instagram
MARK ZUCKERBERG
developed last-minute.com
MARTHA LANE FOX
Her website relied heavily on online
systems which other websites soon followed suit.
MARTHA LANE FOX
invented the World Wide Web, an Internet-based hypermedia
initiative for global information sharing.
TIM BERNERS-LEE
global system of interconnected computer networks
that use the Internet protocol suite to link billions of devices
worldwide
INTERNET
Top Internet Service Providers in the Philippines
1.Converge ICT Solutions
2.One SKY
3.PLDT
4.Globe Broadband/TELECOM
5. RISE
an information space where documents and other web
resources are identified by URLs, interlinked by hypertext links, and
can be accessed via the Internet.
WORLD WIDE WEB (WWW)
a hypertext document connected to the World Wide Web.
WEB PAGE
document that is suitable for the World Wide Web.
WEB PAGE
location connected to the Internet that maintains one or more pages on the World Wide Web
WEBSITE
It is a related collection of World Wide Web (WWW) files that includes a beginning file located a home page.
WEBSITE
displays a web page on a monitor or mobile device.
WEB BROWSER
a software application for retrieving, presenting, and traversing information
resources on the World Wide Web.
WEB BROWSER
It is also known as flat page or stationary page because the page is “as is” and cannot be manipulated by the user. The content is also the same for all users
WEB 1.0 STATIC
allows users to use web browsers instead of just using their operating system
WEB 2.0
Browsers can now be used for their user interface, application software (or web applications), and even for file storage.
WEB 2.0
Its examples include social networking sites, blogs, wikis, video sharing sites, hosted services,
and web applications.
WEB 2.0
allows users to interact with the page
WEB 2.0
instead of just reading a page, the user may be able to comment or create a user account
WEB 2.0
Browsers can now be used for their user interface, application sotware (or web applications), and even for file storage
WEB 2.0
Features of WEB 2.0
- Folksonomy
- Rich User Experience
- User Participation
- Long Tail
- Software as a Service
allows users to categorize and classify/arrange information using
freely chosen keywords ex. tagging (# sign)
FOLKSONOMY
content is dynamic and is responsive to user’s input.
RICH USER EXPERIENCE
the owner of the website is not the only one who is able to
put content.
USER PARTICIPATION
services that are offered on demand rather than on a one-time
purchase
LONG TAIL
users will subscribe to a software only when needed
rather than purchasing them.
SOFTWARE AS A SERVICE
is a movement led by the
World Wide Web Consortium (W3C)
SEMANTIC WEB (WEB 3.0)
According to the W3C, “provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries”
SEMANTIC WEB
Several problems of WEB 3.0
- Compatibility
- Security
- Vastness
- Vagueness
- Logic
HTML files and current web browser could not support
Web 3.0
COMPATIBILITY
user’s security is also in question since the machine is saving his or her preferences
SECURITY
The World Wide Web already contains billions of web pages
VASTNESS
Certain words are imprecise. The words “old” and “small” would depend on the user.
VAGUENESS
Since machines use logic, there are certain limitations for a computer to be able to predict what the user is referring to at a given time.
LOGIC
TRENDS IN ICT
- Convergence
- Social Media
- Mobile Technologies
- Assisstive Media
Technological convergence is the synergy of technological
advancements to work on a similar goal or task.
CONVERGENCE
is a website, application, or online channel that enables web
users to create, co-create, discuss, modify, and exchange user-generated
content
SOCIAL MEDIA
The popularity of smartphones and tablets has taken a major
rise over the years. This is largely because of the devices
capability to do tasks that were originally found in personal
computers.
MOBILE TECHNOLOGIES
6 TYPES OF SOCIAL MEDIA
Social Networks
Bookmarking Sites
Social News Blogs
Media Sharing
Microblogging
Blogs and Forums
KINDS OF OPERATING SYSTEMS
a. IOS
b. Android
c. Blackberry OS
d. Windows Phone OS
e. Symbian
f. Web OS
g. Windows Mobile
is a nonprofit service designed to help people who have visual and reading impairments.
Assistive Media
CORE RULES OF NETIQUETTE
RULE 1: Remember the human.
RULE 2: Adhere to the same standards of behavior
online that you follow in real life.
RULE 3: Know where you are in cyberspace.
RULE 4: Respect other people’s time and bandwidth.
RULE 5: Make yourself good online.
RULE 6: Share expert knowledge
RULE 7: Help keep flame wars under control.
RULE 8: Respect other people’s privacy
RULE 9: Do not abuse your power.
RULE 10: Be forgiving of other people’s mistakes.
RULES OF NETIQUETTE
- Online security, safety and ethics
- Internet threats
- Protecting reputations online
- Copyright
- Contextualized online search and research skills
10 BEST RULES OF NETIQUETTE
> The Golden Rule
No Flaming
Don’t type in ALL CAPS
Follow the TOS (TOS-Term of Service)
Don’t talk with people you do not know
Obey Copyright Laws
Use proper Grammar and Spelling
Be honest/Be yourself
Don’t SPAM
Shop Secure Sites
refers to the online security or safety of people and their
information when using the internet.
INTERNET SAFETY
INTERNET THREATS
Malware
Virus
Spyware
Adware
Spam
stands for malicious software
MALWARE
It is a set of instructions that run on your computer and make your system do something that an attacker wants it to do.
MALWARE
a malicious program designed to replicate itself and transfer from one computer to another (internet, local networks, FDs, CDs, etc.)
VIRUS
a program that runs in the background without you
knowing it
SPYWARE
It has the ability to monitor what
you are currently doing and typing through keylogging
SPYWARE
A program designed to send your advertisement, mostly as pop-ups
ADWARE
Refers to the transmission of unsolicited messages from
various origins using electric messaging systems
SPAM
DANGERS ON THE INTERNET
Email Spam
Phishing
Pharming
Spyware
Computer worm
Trojan Horse
Rogue Security Software
Hacker
Also known as junk email, it is usually unsolicited commercial email sent from one source with
identical message sent to multiple recipients.
EMAIL SPAM
This is a deceitful practice of trying to get confidential information such as passwords and usernames and credit card details by making it appear as if it comes from a trustworthy source.
PHISHING
This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website.
PHARMING
affect the performance and settings of the computer
SPYWARE
This is a dangerous
computer program that replicates itself through a network.
COMPUTER WORM
it can erase data, can allow
access of the victim’s computer, can corrupt files, and can be used in Phishing for bank accounts
TROJAN HORSE
tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all
ROGUE SECURITY SOFTWARE
This is a person who is able to
enter and control other people’s computer without authorization.
HACKER