ICT Flashcards
Deals with the use of different communication technologies
ICT
ICT
Information and Communications Technology
Trends in ICT
- Convergence
- Social Media
- Mobile Technologies
- Assistive Technologies
- synergy of technological advancements to work on a similar goal or task. - the usage of several technologies to accomplish tasks conveniently
Convergence
- enables users to create, co-create,
discuss, modify, and exchange user-generated content.
Social Media
Social Media
a) Social Networking Sites
a) Bookmarking Sites
b) Social News
c) Media Sharing
d) Microblogging
e) Blogs and Forums
- devices’ capability to do tasks that a personal computer can and handier than a personal computer
Mobile Technologies
OS
Operating Systems
Mobile OS examples
- iOS
- Android
- Blackberry OS
- WebOS
- Symbian
Originally a smartphone O.S. but is now mostly used for smart TVs
WebOS
“An act prescribing the intellectual property code and establishing the intellectual property office, providing for its powers and functions, and for other purposes. It shall protect and secure the exclusive rights of scientists, inventors, artists, and other gifted citizens to their intellectual property and creations, particularly when beneficial to the people, for such periods as provided in this Act. “
R.A. 8293
T or F There are 16 crimes under R.A. 10175
True
WWW
World Wide Web
words, phrases, symbols, and/or designs that identify a brand from others.
trademark
a piece of non-public information that is guarded by their respective companies.
trade secret
awarded for inventions satisfying a global criterion of non-obviousness, global novelty, and industrial or commercial application.
patent
legal protection for the owner of his original work.
copyright
Considered as one of the most destructive computer malware of all time, created by a Filipino programmer back in 2000
ILOVEYOU
Who was the person that once said, “The Internet gave us access to everything, but it also gave everything access to us.”
James Veitch
T or F Setting your post to private will help search engines scan your posts
False
A three-dimensional computer-generated environment that can be explored and interacted with by a person
VR
VR
Virtual Reality
Sites that allow you to upload and share media content like images, music, and video
Media Sharing
any device, software, or equipment that helps people work around their challenges.
Assistive Technology
T or F A forum is mostly journalistic, while a blog is mainly focused on discussions.
False
This type of social media website focuses on short updates posted by the user.
Microblogging
OTP
One time pin
is based on reality but used to inflict harm
Mal-information
is false but not deliberately created to harm
Misinformation
is false and intends to cause harm
Disinformation
MALWARE
Malicious software
Doctrine in the law that allows the limited use of copyrighted materials without acquiring permission from the copyright holder first
fair use
- An open-source operating system developed by Google
- being open-source means several mobile phone companies use this OS for free
Android
What is the Original phone O.S. used by Nokia, Sony Ericsson, Samsung, and others?
Symbian
T or F Using incognito or private mode protects your browsing activity from hackers
False
- a term used when someone has posted or emailed something untrue and damaging about someone else on the Internet, including in message boards, bulletin boards, blogs, chat rooms, personal websites, social media, social networking sites, or other published articles.
cyber-libel
- a term used when someone has posted or emailed something untrue and damaging about someone else on the Internet, including in message boards, bulletin boards, blogs, chat rooms, personal websites, social media, social networking sites, or other published articles.
cyber-libel
Malware Examples
- Virus
- Worm
- Trojan
- Spyware
- Adware
These are unsolicited emails, mostly from bots or advertisers, that can be used to send malware.
Spam
a stand-alone malicious program that can self-replicate and propagate via computer networks without human help.
Virus
The registering, selling, or using a domain name with the intent of profiting from the goodwill of someone else’s trademark is called
Cyber-squatting
A program that runs in the background without the knowledge of the user
Spyware
A malware disguised as a legitimate software
Trojan
Pinterest is a social media website that can be classified as a
Bookmarking Sites
any program or file that is designed with malicious intent
Malware
In the Philippines, copyrights only last a lifetime (of the author) plus ____ __
50 years
Cybercrime Prevention Act of 2012
RA 10175
ERIC
Education Resources Information Center
online digital library of education research and information
ERIC
acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information
Phishing
more complicate than
phishing where it exploits the DNS
(Domain Name Service) system.
Farming
a crime that involves a computer and a
network
Cybercrime
DOAJ
Directory of Open Access Journals
a stand-alone malicious program that can self-replicate and propagate via computer networks with human help.
Worm