ICT Flashcards
It deals with the use of different communication technologies such as mobile phones, telephones, internet to locate,
save, send, and edit information.
• It is a study of computers as data processing tools.
• It introduces students to the fundamentals of using computer systems in an internet environment.
ICT
t is an electronic device for storing and processing data, typically in binary
form, according to instructions given to it in variable progra
Computer
The heart of the computer, this is the component that actually executes instructions
organized in programs (“software”) which tell the computer what to do.
CPU
Enables a computer to store, at least temporarily, data, programs, and
intermediate results.
Memory
Allows a computer to permanently retain large amounts
of data and programs between jobs. Example is a disk drive.
Mass storage device
Usually a keyboard and mouse, the input device is the conduit through which data and instructions enter
a computer
Input device
A display screen, printer, or devices that let you see what the computer has accomplished
Output device
A small, single-user computer based on a microprocessor.
personal computer
A powerful, single-user computer. A workstation is like a personal computer, but it has a more powerful
microprocessor and, in general, a higher-quality monitor.
Workstation
A multi-user computer capable of supporting up to hundreds of users simultaneously.
Minicomputer
A powerful multi-user computer capable of supporting many hundreds or thousands of users
simultaneously.
Mainframe
An extremely fast computer that can perform hundreds of millions of instructions per second
Super computer
A computer designed to fit comfortably on top of a desk, typically with the monitor sitting on top of
the computer. D
Desktop computer
An extremely
lightweight personal computer.
Notebook computer
A small, portable
computer – small enough that it can sit on your lap.
Laptop computer
A portable computer that is small enough to be held in one’s hand. Although extremely
convenient to carry, handheld computers have not replaced notebook computers because of their small
keyboards and screens. They are also called PDAs (Personal Digital Assistant) and Pocket computers.
Hand-held computer
An information system on the internet that allows documents to be connected to other documents by hypertext links,
enabling the user to search for information by moving from one document to another
WWW
It is a hypertext document connected to the World Wide Web. It is a document that is suitable for the World Wide
Web.
Web pages
A collection of web pages which are grouped together and usually connected together in various ways.
Web site
It is a computer that hosts a website on the Internet.
Web server
It refers to the first stage in the world wide web, which was entirely made up of the web pages connected
by hyperlinks.
Web 1.0
– is known as a flat page or stationary age in the sense that the page is “as is” and cannot be
manipulated by the user. The content is also the same for all users that is referred to as Web 1.0
Static Web page
It is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a website differently than others. It allows the users to interact with the page;
Web 2.0
platform is all about
semantic web. It aims to have
machines (or servers) understand the user’s preferences to be able to deliver web content.
Web 3.0
web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The user is able to see website
differently than others (example: social networking sites, wikis, video sharing sites)
Dyanamix web pages
allows user to categorize and classify information using freely chosen keywords e.g. tagging
by FB, Twitter, use tags that start with the sign #, referred to as hashtag.
Folksonomy
content is dynamic and is responsive to user’s input
Rich user Experience
The owner of the website is not the only one who is able to put content. Others are able
to place a content of their own by means of comments, reviews and evaluation e.g. Lazada, Amazon.
User participation
services that are offered on demand rather than on a one-time purchase. This is synonymous to
subscribing to a data plan that charges you for the amount of time you spent in the internet.
Long tail
e- users will be subscribe to a software only when needed rather than purchasing them
e.g. Google docs used to create and edit word processing and spread sheet.
Software as a service
– diverse information sharing through universal web access. Web 2.0’s content is based
on people from various cultures.
Mass participation
is the synergy of technological advancements to work on a similar goal or task. For example, besides
using your personal computer to create word documents, you can now use smartphone.
Convergence
is a website, application, or online channel that enables web users web users to create, co-create,
discuss modify, and exchange user generated content.
Social Media
These are sites that allows you to connect with other people with the same interests or
background. Once the user creates his/her account, he/she can set up a profile, add people, share content,
among others. Example: Facebook and Google+
Social networks
Sites that allow you to store and manage links to various website and resources. Most of
the sites allow you to create a tag to others. Example: Stumble Upon, Pinterest
Bookmarking site
Sites that allow users to post their own news items or links to other news sources. The users can
also comment on the post and comments may also be rank.
Example: Reddit and Digg
Social news
sites that allow you to upload and share media
content like images, music and video. Example: Flickr, YouTube
and Instagram
Media sharing
focus on short updates from the user. Those
that subscribed to the user will be able to receive these
updates. Example: Twitter and Plurk
Microblogging
allow user to post their content. Other users are able to comment on the said topic.
Example: Blogger, WordPress and Tumblr
Blogs and Forums
s a non- profit service designed to help people who have visual and reading impairments. A database
of audio recordings is used to read to the user.
Assistive media
distributed computing on internet or delivery of computing service over the internet. Instead of
running an e-mail program on your computer, you log in to a Web e-mail account remotely. The software and storage
for your account doesn’t exist on your computer – it’s on the service’s computer cloud
Cloud computing
lients are the device that the end user interact with cloud
client computers
often servers are in geographically different places, but server acts as if they are working
next to each other.
Distributed servers
it is a collection of servers where application is placed and is accessed via Internet
Data centers
allows systems and services to be easily accessible to the general public. Public cloud may be less
secured because of its openness, e.g. e-mail
public cloud
allows systems and services to be accessible within an organization. It offers increased security
because of its private nature
Private cloud
allows systems and services to be accessible by group of organizations
Community cloud
is a mixture of public and private cloud. However, the critical activities are performed using private
cloud while the non-critical activities are performed using public cloud.
Hybrid cloud
s who you are in the cyberspace. It is how you present
yourself to others online
Online identity
What you share. It is the layer that you do control. It consists of data you feed into social media and
mobile applications.
first layer
Made of Behavioral Observations. These are not so much choices you consciously make, but the
metadata that gives context to those choice.
second layer
: Interpretations of the first and second. It is what the machine thinks about you. Your data are analyzed
by various algorithms and compared with other users’ data for meaningful statistical correlations
third layer
It is a law approved on September 12, 2012. It aims to address legal issues concerning online interactions in the internet.
Cybercrime Prevention Act of 2012 (Republic Act No. 10175)
An individual who uses computer, networking or other skills to
overcome a technical problem. It may also refer to a person who uses his or
her abilities to gain unauthorized access to systems or networks in order to
commit crimes.
Hackers
It is any event or action that could cause a loss of or damage to computer hardware, software,
data, information, or processing capability.
Computer security risk
An individual with extensive computer knowledge whose purpose
is to breach internet security or gain access to software without paying
royalties.
Crackers
An unskilled individual who use scripts or programs developed
by others to attach computer systems and networks and deface websites.
Script kiddies
An individual practicing the act or spying to gain secret
information on a government or a business competitor through the use of any
ICT tools
Corporate spies
An individual or group who uses email as an offensive force. They usually send a company
a threatening email stating that will exploit a security leak or launch an attack that will harm the company’s
network.
Cyberextortionist
Individuals who are involved in any premeditated, politically motivated attack against
information, computer systems, computer programs, and data which results in violence against non-combatant
targets
Cyberterrorist
It is the use of a computer network
without permission.
Unauthorized access
. It is the use of a computer or its data for
unapproved or possibly illegal activities.
Unauthorized use
It is the act of stealing a computer
equipment.
Hardware theft
It is the act of defacing or destroying
computer equipment.
Hardware vandalism
. It occurs when someone: a) steals a software
media; b) intentionally erases programs; c) illegally copies a
program; and d) illegally registers and / or activates a
program.
Software theft
. It occurs when someone steals personal
or confidential information.
Information theft
A program that affects a computer negatively by altering the way the computer works.
Computer virus
Copies itself repeatedly, using up resources and possibly shutting down the computer network.
Worm
A malicious program that hides within or looks like a legitimate program.
trojan horse
A malicious program that hides within or looks like a legitimate program.
rootkit
to the growing gap between the underprivileged member of society,
especially the poor, rural, elderly, and handicapped portion of the population who do not have
access to computers or the internet.
digital divide
People who were not born
in the digital era and later
adopted the new
technology
digital immigrants
People who were born during or after the
digital era which begins in 1980.
digital natives
is the ability to use information and communication technologies to find, evaluate, create, and
communicate information, requiring both cognitive and technical skills.
Digital literacy
Understanding how internet
culture is expressed and transmitted through
phenomena such as memes, emojis, and animated gifs.
Cultural:how to behave
incorporates what we know of as computer literacy or
IT skills with an understanding of the key concepts.
Cognitive:How to do
The constructive element
involves knowing what it means to “construct”
something in a digital environment.
Constructive: How to use
Knowing the
purpose of various online tools and how they are
different or similar to each other.
Communicative: How to communicate
Understanding and capitalizing upon the ways in which online world differs from the offline
world
Confident: How to belong
It refers to creating new things which add value where the focus is more on the value created
rather than the act of creating something new.
Creative:How to make
Using reasoning skills to question, analyze, scrutinize, and evaluate digital content, tools, and
applications.
Critical:How to evaluate
Refers to individuals having the knowledge and ability to use digital environments to selforganize; to be part of a movement bigger than themselves.
Civic: How to participate