ICT- 1st Quarter Flashcards
ICT stands for
Information and Communication Technology
an umbrella term referring to communication hardware and software that allows the access, storage, transmission and manipulation of information.
ICT
in terms of hardware, it specifically encompasses radio, television, communication devices (smart and non-smart phones), desktop computer, laptops, and network technologies
ICT
it also comprised of software, applications and platforms that allows information to be accessed, stored, transmitted, and manipulated
ICT
This is when multiple devices combine into a single gadget because of technological advancement
Convergent Technologies
These are software, applications or platforms that allow users to communicate in an online social communities or network
Social Media
This is a term for devices that are easily carried and allows fast means of communications
Mobile Technologies
the system that enables people to access information over the internet
WWW (World Wide Web)
the actual interconnections of computers and other networks
Internet
The user can only read whatever online content the creator has made.
Web 1.0
refers for the ability of the user to add content through posting, sharing, commenting or rating. This allows interaction not only in between the user and the creator but also other users. Examples are sites like Facebook, Youtube, Twitter, and Reddit
Web 2.0
This is a concept of how the web will evolve. The keyword for this is executable, which refers to the capability of accepting a request from the user will execute a solution or suggestion considering the behavioral data the user. It is not fully realized and is still developing, the full concept can still change.
Web 3.0
What is Web 1.0?
“read-only web”
“static website”
What is Web 2.0?
“read-write”
“dynamic”
What is Web 3.0?
“semantic”
“executable”
Features of Web 2.0
Folksonomy
Rich User Experience
User Participation
Long Tail
Software as a Service
Mass Participation
it allows user to categorize and classify or arrange information using freely chosen keywords which uses sign (#) also referred to as hashtag. e.g, tagging in Facebook/Twitter
Folksonomy
its content is dynamic and is responsive to user’s input. Example, a website that shows local content or in case of social networking sites, when you are logged on, your account is used to modify what you see in their website.
Rich User Experience
the owner of the website is not only who is able to put content. Others are able to place a content of their own by means of comments, review, and evaluation. e.g, Amazon.com, online stores
User Participation
services that are offered on demand rather than on a one-time purchase. In certain cases, time-based pricing is better than file size-based pricing or vice versa. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent in the internet, or a data plan that charges you for the amount of bandwidth you used.
Long Tail
Users will subscribe to a software only when needed rather than purchasing them. This is a cheaper option if you do not always need to use a software. For instance, Google Docs is a free web-based application that allows user to create and edit word processing and spreadsheet documents online.
Software as a Service
diverse information sharing through universal web access. Since most users can use the Internet, Web 2.0’s content is based on people from various cultures.
Mass Participation
Is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange user-generated content.
Social media
Types of Social Media: (6)
Social Networks
Bookmarking Sites
Social News
Media Sharing
Microblogging
Blogs and Forums
These are sites that allow you to connect with other people with the same interests or background. Once a user creates his or her account, he or she can set up a profile, add people, create groups, and share content.
e.g., Facebook and Google+
Social Networks
These sites that allow you to store and manage links to various websites and resources. Most of these sites allow you to create a tag that allows you and others to easily search or share them.
e.g., Pinterest
Bookmarking Sites
These are sites that allows users to post their own news items or links to other news sources. The users can also comment on the post and comments may also be ranked. They are also capable of voting on these news articles of the website. Those who get the most amount of votes are shown most prominently.
e.g., Reddit and Digg
Social News
These are sites that allow you to upload and share media content like images, music, and video. Most of these sites have additional social features like liking, commenting, and having user profiles.
e.g., Youtube and Instagram
Media Sharing
These are sites that focus on short updates from the user. Those subscribed to the user will be able to receive these updates.
e.g., Twitter
Microblogging
These websites allow users to post their content. Other users are able to comment on the said topic. There are several free blogging platforms like Blogger, Wordpress, and Tumblr. On the other hand, forums are typically part of a certain website or web service.
Blogs and Forums
Is a nonprofit service designed to help people who have visual and reading impairments.
A database of audio recordings is used to read to the user.
Assistive Media
It is a movement led by the World Wide Web Consortium (W3C)
Semantic Web
The term W3C was coined by the inventor of the World Wide Web
Tim Berners-Lee
The aim of this is to have machines (or servers) understand the user’s preferences to be able to deliver web content specifically targetting the user (aims to do better)
Web 3.0
Web 3.0 is yet to be fully realized because of several problems:
Compatibility
Security
Vastness
Vagueness
Logic
HTML files and current web browsers could not support Web 3.0.
Compatibility
The user’s security is also in question since the machine is saving his or her preferences.
Security
The World Wide Web already contains billions of web pages.
Vastness
Certain words are imprecise. The words “old” and “small” would depend on the user.
Vagueness
Since machines use logic, there are certain limitation for a computer to be able to predict what the user is referring to at a given time.
Logic
Trends in ICT:
Convergent Technologies
Social Media
Mobile Technologies
Assistive Media
It is the synergy of technological advancements to work on a similar goal or task. For example, besides using your personal computer to create word documents, you can now use your smartphone. It can also use cloud technologies to sync files from one device to another while also using LTE technology which means you can access your files anytime, anywhere.
It is using several technologies to accomplish a task conveniently.
Convergent Technologies
The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices’ capability to do tasks that were originally found in personal computers. Several of these devices are capable of using high-speed internet.
Mobile Technologies
Mobile Devices use different operating systems: (7)
IOS
Android
Blackberry OS
Windows Phone OS
Symbian
WebOS
Windows Mobile
used in Apple devices such as the iPhone and iPad
IOS
an open source operating system developed by Google. Being open source means several mobile phone companies use this OS for free.
Android
used in Blackberry devices.
Blackberry OS
a closed source and proprietary operating system developed by Microsoft
Windows Phone OS
the original smartphone OS; used by Nokia devices.
Symbian
originally used for smartphones; now used for smart TVs.
Web OS
developed by Microsoft for smartphones and pocket PC’s
Windows Mobile
There is still a risk in sharing this. Chances are, a hacker already knows plenty of stuff about you even if you only give this out. You cannot just walk in a room and start introducing yourself to everyone. You do not know whom you can come across.
First Name
If sharing your first name is a small risk, having both your first and last is more risky. You will be vulnerable to being searched for using search engines, which include image search. Matching a name with a face can lead to several cybercrimes like identity theft.
Last Name
Sharing this is probably not the most risky of these shared information, but sharing your entire full name would be.
Middle Name
Most people who steal identities study their subject. They can use this information for verification purposes.
Current and Previous School
Should never be posted over the internet. The Internet is a public place. It is the same as posting your number on a billboard.
Your cellphone number
Risky yet not as risky as posting their full names, especially your mother’s maiden name. Many websites require your mother’s maiden name as an answer to a secret question whenever you lose your password.
The name of your father and mother
This is a huge risk, especially if you have younger siblings. Strangers may pretend or use their identity to dupe you.
The name of your siblings
Giving the internet your phone number is one thing, giving them this is a whole other level. It would be much easier for the criminals to find you.
Your address
This shared information is riskier than sharing your personal phone number. Scams usually this information to deceive you, one of which is when a stranger pretends to be your parents or pretends to be you.
Your home phone number
Letting people know this is probably a must if you want to get as many gifts as possible. But having this in your profile makes you vulnerable to identity theft.
Your birthday
The internet is defined as the ___________ ___________. This means anyone has access to this highway, can place information, and can grab that information. This is why some website continues to improve their security features. The threat of cybercrime is very real. Whatever information we share today could affect our future.
Information Superhighway
3 Kinds of Internet Threats:
- Malware
- Spam
- Phishing
6 Types of Malware:
- Virus
- Worm
- Trojan
- Spyware
- Adware
- Ransomware
Or malicious software, is any program or file that is harmful
to a computer.
Malware
is a type of malware that, when executed,
replicates itself by modifying other computer
programs and inserting its own code into those
programs. If this replication succeeds, the affected
areas are then said to be “infected” with a
computer virus, a metaphor derived from
biological viruses.
Virus
is a standalone malware computer program that
replicates itself in order to spread to other
computers. It often uses a computer network to
spread itself, relying on security failures on the
target computer to access it. It will use this
machine as a host to scan and infect other
computers. Ex: ILOVEYOU virus
Worm
is a type of malware that disguises itself as
legitimate code or software. Once inside the
network, attackers are able to carry out any
action that a legitimate user could perform, such
as exporting files, modifying data, deleting files or
otherwise altering the contents of the device.
Trojan
malicious software that enters a user’s computer,
gathers data from the device and user, and sends
it to third parties without their consent. A
commonly accepted definition is a strand
of malware designed to access and damage a
device without the user’s consent. Ex: Keylogger
Spyware
(or advertising software) is the term used for
various pop-up advertisements that show up on
your computer or mobile device. It has the
potential to become malicious and harm your
device by slowing it down, hijacking your browser
and installing viruses and/or spyware.
Adware
a malware designed to deny a user or organization
access to files on their computer. By encrypting
these files and demanding a ransom payment for
the decryption key, cyber-attackers place
organizations in a position where paying the
ransom is the easiest and cheapest way to regain
access to their files.
Ransomware
unsolicited and unwanted
junk email sent out in bulk to
an indiscriminate recipient
list. Typically, it is sent
for commercial purposes. It
can be sent in massive
volume by botnets, networks
of infected computers.
Spam
a type of cybercrime in which victims are
contacted by email, telephone, or text
message by an attacker posing as a
trustworthy entity in order to obtain
sensitive information or data, such as
login credentials, credit card details, or
other personally identifiable information.
Phishing
It is the use of works protected by copyright law without
permission for a usage where such permission is required.
Copyright Infringement
Here are some tips that could help avoid copyright infringement:
- Always assume that the work is copyrighted.
- Do not copy, share or alter without seeking permission.
- Review and retain licensing agreements.
- Consider buying content.
- Give credit to the original author of the page or information.