ICT, Kinds of Malware, and Violations & Laws Flashcards
ICT stands for
Information and Communication Technology
Through the power of ICT technologies like computer networks and gadgets made the world connected in the ___________________
cyber world
Though we can use these features effortlessly, every one of us needs to be technology enabled and be aware of the __________________
digital community
The Philippines is the fastest growing app market in Southeast Asia and the ________________ in the world.
highest digital population
It refers to fusing of technological advancement to work on a similar task. Example. Using smartphone as camera in taking pictures instead of DSLR camera.
Convergence
An application and website where user can communicate, create and share content, and participate in online communities.
Social Media
A website where people with the same come together to share information. Examples: Twitter, Instagram, Facebook
Social Network
A website where user can post stories and are ranked based on the popularity through voting. Examples: Digg, Reddit, Propeller, Slashdot, Fark
Social News
A website that allows you to share and store internet bookmarks, articles, posts, blogs, images and others. Examples: Pinterest, StumbleUpon, Dribble
Bookmarking Sites
A website that allows you to share and store multimedia files such as video, photos and music. Examples: Instagram, YouTube, Flickr
Media Sharing
a website that allows you to broadcast short message. Examples: Twitter, Tumblr,
Microblogging
a discussion website that allows user to ask questions and comments on a journal posted by an individual or group. Examples: Wordpress, Blogger
Blogs and Forums
a technology used in cellular and other devices such netbook, laptop, tablet, smartphones and etc.
Mobile Technologies
A platform that assist people with disability. It will guide the individual like a blind person by using an audio recording.
Assistive Media
If you can program it, then it’s a platform. If you can’t, then it’s not.” - Marc Andreessen
Online Platforms
Online Platform: Google Chrome, Yahoo, Microsoft Edge
Web Search Engines
Online Platform: Globe Telecom, Smart Communications, PLDT
Communication Services
Online Platform: BDO Online, GCASH, PayMaya
Payment System
Online Platform: Lazada, Shopee, Amazon
Advertising Platforms
Online Platform: Canva, Powtoon, Capcut
Creative Content Outlets
Think before you _____________
click
Never post about your ____________________
future vacation
Add people whom _________________________
you only know in real life
Install and update ________________ in your computer
antivirus
Do not share your ______________ or OTPs with anyone
password
Add password to your ______________ at home to make it private
WIFI
Do not visit _______________ and download files from unknown sources.
untrusted websites
Do not give your ___________________ to anyone or post it in unknown sites
personal information
It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication.
Cyberbullying
It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions.
Identity Theft
A criminal practice where electronic communication is used to stalk or harass individual or group
Cyber Stalking
The act of sending sexually explicit text messages, images, and videos
Sexting
Also known as Malicious Software
Malware
A malicious program that replicate itself by copying itself to another program.
Virus
A malicious program that disguised as legitimate program that user will accept and use but take control of your computer.
Trojan Horse
Malicious program that copy’s itself and spreads to other computers.
Worm
A malicious program that gathers information from victim’s computer and send it back to the hacker.
Spyware
An unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close them.
Adware
Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware.
Spam
A cyberattack method using deceptive emails and websites to acquiring sensitive personal information.
Phishing
A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others.
Cybercrime
It is an etiquette applied online that shows proper manner and behavior.
Netiquette
If you are a member of an online society through social media you are called __________________
Netizen
_____________ is a research method in collecting and gathering information via internet by using search engine such as google.
Internet Research
___________________ is a program that allows users to search for content on internet.
Search Engine
There are millions of information that we can get from the internet. Some of this information are free but others are not. They are protected by a _______________________
copyright law
_______________________ is a protection given to the owner of the rights in an original work such as books, musical works, films, paintings, and other works, and computer programs.
Copyright
This original work is called intellectual property which is protected under Republic Act 8293 known as the _______________________________
Intellectual Property Code of the Philippines
This happens when the copyrighted work is use by other person without permission of the author or copyright holder. Any person who is infringing the right protected work would be liable under the law.
Copyright Infringement
_________________________ is the use of copyrighted material for comment, teaching, criticism, news reporting, research, scholarship, and other similar purpose is not an infringement of copyright.
Fair use