ict reviewer Flashcards
is the largest computer network in the world that connects billions of computer user.
The Internet or “net” (network of network)
is a collection of computers and devices connected via communication channels and transmission media allow to share resources (hardware, software, data, information).
Network
the word internet started
*1982-
Is an American internet pioneer and is recognize as one of the fathers the internet
VINTON GRAY CERF -
Major Components of the Internet
1.Servers
2.IP Address (Internet Protocol)
3.Browser
4.Domain Name System
is a computer program that provides service to another computer program and it’s user.
A.Servers
– a program in computer that provides the business logic for an application program.
Application Server
a computer program that serves requested HTML pages or files.
Web Server –
is a software that acts as an intermediary between an endpoint device, such as computer and another server from which a user is requesting.
.Proxy Server –
is an application that receives incoming e-mail from local users and remote senders and forward outgoing e-mail for delivery.
Mail Server –
is a computer responsible for central storage and management of data files so that other computer on the same network can access them.
File Server –
is a security component of a policy – based network that provides authorization services and facilities tracking and control of files.
Policy Server
is a security component of a policy – based network that provides authorization services and facilities tracking and control of files.
Policy Server
is a numerical label assigned to each device. This provides identity to a network device.
IP Address (Internet Protocol) –
is an application program that provides a way to look information on the web.
Browser –
is the phonebook of internet. We access information online through domain names.
Domain Name System (DNS) –
provided internet access to a specific geographic area.
Regional ISP
business that provides internet access in cities and towns nationwide.
National ISP –
a collection of billions of webpages that you can view with a web browser
Web –
the most common method of sending and receiving messages online
Email –
websites and apps that allow people to share comments, photos, and videos
Social media –
games that allow people to play with and against each other over the Internet *
Online gaming
operating system and application updates can typically downloaded from the Internet
Software updates –
is a coding language used to tell a browser how to place pictures, text, multimedia and links to create a web page. When a user clicks on a link within a web page, that link, which is coded with HTML, links the user to a specific linked web page.
HTML - Hypertext Markup Language
HTML
- Hypertext Markup Language
is a web address used to connect to a remote resource on the world wide web.
URL - Uniform Resource Locator
URL -
Uniform Resource Locator
the data communication standard of web pages. When a web page has this prefix, the links, text, and pictures should work correctly in a web browser.
HTTP - Hypertext Transfer Protocol,
HTTP -
is the acronym for Hypertext Transfer Protocol,
This indicates that the web page has a special layer of encryption added to hide your personal information and passwords from others.
HTTPS Hypertext Transfer Protocol Secure.
HTTPS
Hypertext Transfer Protocol Secure.
that is the etiquette of cyberspace and “etiquette” means the forms of required by good breeding or prescribed by authority to be required in social or official life. In other words, netiquette is a set of rules for behaving properly online.
netiquette
Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message.
REMEMBER THE GOLDEN RULE –
Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message.
REMEMBER THE GOLDEN RULE –
treat others with the same respect that you would like to receive and avoid confrontational or offensive language.
Make a good impression -
Communicating effectively in college and business environments requires the use of correct terminology, spelling, and grammar that can easily be understood.
AVOID SLANG, ACRONYMS, AND TEXT TALK –
– Typing an entire message using all capital letters is known as “screaming”. It is distracting and generally frowned upon in professional environments. It is better to draw emphasis to selected words
AVOID “SCREAMING” IN TYPED MESSAGES
– Proofreading your messages before you send them is a best practice for effective and efficient communication.
PROOFREAD YOUR MESSAGES BEFORE SENDING THEM
- Be constructive and respectful when sharing opinions, beliefs, and criticisms, or responding to those of others in the conversation.
RESPECT DIVERSITY IN VIEWPOINTS
It is the Characteristics of the culture of computers, information, technology and virtual reality.
Cyber
is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.
Cybercrime
they may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.
Cybercriminals
is a law in the Philippines approved on September 12,2012 which aims to address legal issues concerning online interactions and internet.
Republic Act No. 10175 Cybercrime Prevention Act of 2012
s an act protecting individual personal information.
Republic Act No. 10173 Data Privacy Act of 2012 i
The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
Copyright
is the violation, piracy or theft of a copyright holder’s exclusive rights through the unauthorized use of a copyrighted material or work.
-Copyright infringement
An act or instance of using or closely imitating the language and thoughts of another author without authorization.
.Plagiarism
generally used when speaking about excessive gaming behavior, which can be practiced both offline and online.
Offline:
Also known as “Internet Addiction”, gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet.
Online:
The persona you create about yourself virtually.
Virtual Self -
is a term used to describe actions taken by someone to gain unauthorized access to a computer.
Hacking
- An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons.
Computer-related forgery, fraud and/or identity theft
-The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
Cyberbullying
-Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
e.Cybersex
- Is a form of child sexual exploitation.
- Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti- Child Pornography Act of 2009, committed through a computer system.
Child Pornography
- Is an unprivileged false statement of fact which tends to harm the reputation of a person or company.
.Cyber Defamation
- is a common type of online fraud. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
Pharming
is used most often by cyber criminals because it’s easy to execute and can produce the results they’re looking for with very little effort. Fake emails, text messages and websites created to look like they’re from authentic companies. They’re sent by criminals to steal personal and financial information from you. This is also known as “spoofing”
Phishing
is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.
Ransomware
is one of the more common methods of both sending information out and collecting it from unsuspecting people. The mass distribution of unsolicited messages, advertising, or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs.
Spam
are often used by third parties to infiltrate your computer.
Spyware (Spyware & Adware) Spyware and adware
A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it’s downloaded.
Trojan horse
is another method used by cyber criminals to capture personal information. Virtual “listening in” on information that’s shared over an unsecure (not encrypted) WiFi network.
WiFi eavesdropping
is a process in which we use typography, images, colors, icons and other illustrations to communicate visually.
Graphic Design -
The basic elements of graphic design are the following:
Lines
Shapes
Form
Texture
Balance
is a kind of shape which connects two or more points. It is also considered as one of the essential element of graphic design. it can be thick, thin, curved, or jagged.
Line -
- is a two-dimensional external boundary of an object. Any object outline that has height and width can be considered as a —–. Together with lines, they form the foundation of your design.
Shape
There are two (2) major categories of shapes in design:
geometric
organic
these are regular and mathematical shapes.
Geometric
these are freeform shapes.
Organic –
is a three-dimensional shape. Shadows, perspective, depth, and sometimes texture creates a form. Without these attributes, a form is just a shape or series of shapes.
Form -
refers to the physical quality of the surface of an object in an artwork or design. It also refers to how an object look or feels like. An object might be smooth, rough, shiny, hard, or soft. It can be in 3D or 2D Texture adds depth and visual interest to the flat images or objects.
Texture -
is the creation of visual equilibrium by relating elements such as line, shape, color, space or form in terms of their visual weight.
Balance -
- From the name itself, which includes radial symmetry is when both two sides of a piece are equal. If you fold your artwork or piece into two or if you put an imaginary line between your artwork, each half is identical or visually similar to the other half.
Symmetrical balance.
Both sides of your composition does not contain the same elements but contain almost the same visual weight.
Asymmetrical balance -
are the building blocks of design. These two focus on the arrangement of your objects or elements on your design. Your good texts, images, or other elements in the graphic will turn to waste if your layout is not well-composed.
Layout and composition
There are five basic principles of layout and composition:
- Proximity
- White Space
- Alignment
- Contrast
- Repetition
is the process of placing related elements together. Elements that are not related to that group should be separated to show that these elements are not related to that group.
Proximity
the negative space between lines, paragraphs, and element on the design.
White space
helps designers to organize different elements in their composition. This is similar to the —- that we see in MS Word or other productivity tools. Effective use of——give your composition a definitive structure and a creative balance.
Alignment
means one element is opposite to the other element. This does not only apply to colors, but to typeface and size of elements as well. — helps you to catch the viewer’s eye, create a direction, or giving emphasis to something. For example, if you use dark color for your background, you should use light color for your foreground; or if you use different test style to give emphasis on your content.
Contrast
simply means to use of the same typefaces, color palettes, or other elements to achieve consistency in your composition. This creates unity in your composition or make your projects connected to each other.
Repetition
is the art of arranging texts that makes it readable and appealing to the viewer. It involves font style, typeface, and text structure.
Typography
refers to the variation of weights of a typeface, while typeface refers to the text style. — also refers to the format or storage mechanism of a text like .of and .tiff.
Font
Types of Fonts can be categorized into three:
Serif
San Serif
Display
are fonts that have little strokes called serif on each end of the letter. They are typically used in formal or traditional projects.
Serif fonts
are fonts with no extra strokes. Sans serif simple means “without serifs” as sans is a French word for without.
Sans serif