LIVING IN THE IT ERA Flashcards
meaning of ICT
Information and Communications Technology
set of technological tools and resources used to exchange information
ICT
5 Uses of ICT in our Daily Lives
Communication
Job Opportunities
Education
Healthcare
Socializing
Provides effective and faster communication
Communication
Provides broader and easier job hunting
Job opportunities
Provides new and different teaching and learning approaches
Education
Provides High-tech and state of the art medical equipment
Healthcare
Provides stronger support networks and connections and boosts social skills
Socializing
9 Positive impacts of ICT in the Society
Daily Routine Management
Social Relationship
Information Sharing
Communication
Usage of Free Time
Creations of Job and Self- Employment
Paperless Environment
Health Literacy
4 Negative Impacts of ICT in the Society
Job Reduction/Loss
Competition and Misuse of Platforms
Reduced Face-to-face interaction
Cost
is an electronic device that designed to process data. Converting it to information that is useful to people
Computer
Two kinds of Computer
Analog Computer
Digital Computer
Represent data as variable points along a continuous spectrum of values
Analog Computer
Break all types of information into tiny units, and use numbers to represent those pieces of information
Digital Computers
4 Basic Computing Periods - Ages
Premechanical - 3000BC and 1450AD
Mechanical - 1450 and 1840
Electromechanical - 1840 and 1940
Electronic - 1940 and Present
Generations of Computer : (Ages)
1st Generation (1946-1958)
2nd Generation (1959 - 1964)
3rd Generation (1965 - 1970)
4th Generation (1971 - today)
5th Generation (Today - Future)
First generation computers relied on machine language, the lowest-level programming language understood
by computers, to perform operations, and they could only solve one problem at a time. Examples: ENIAC, EDSAC, UNIVAC I
Vacuum Tubes
- Moved from cryptic binary machine language to symbolic, or assembly, languages, which allowed programmers
to specify instructions in words.
Examples: UNIVAC III, RCA 501, Philco Transact S-2000
Transistors
- It could carry out instructions in billionths of a second. Much smaller and cheaper compare to the second
generation computers.
Integrated Circuits
Small computers became more powerful that they could be linked together to form networks, which
eventually led to the development of the Internet.
Microprocessors
The use of parallel processing and superconductors is helping to make artificial intelligence a reality.
Artificial Intelligence
is the largest computer network in the world that connects billions of computer user.
The Internet or “Net” (network of network)
is a collection of computers and devices connected via communication channels and transmission media allow to share resources (hardware, software, data, information)
Network
5 Major Components of an Internet
Servers
IP Address
Browser
Domain Name system
Internet Service provider
6 Types of Server
Application Server
Web Server
Proxy Server
Mail Server
File Server
A computer program that provides service to another computer program and it’s user
Server
A program in computer that provides the business logic for an application program
Application server
A computer program that serves requested HTML pages or files
Web Server
Is a software that acts as an intermediary between an endpoint device, such as computer and another sever from which a user is requesting
Proxy Server
Is an application that receives incoming e-mail and forward outgoing e-mail for delivery
Mail Server
Is a computer responsible for central storage and management of data files so that other computer on the same network can access them
File Server
Is a security component of a policy-based network that provides authorization services and facilities tracking and control of files
Policy Server
It is a numerical label assigned to each device. This provides identity to a network device
IP Address
It is an application program that provides a way to look information on the web
Browser
The phonebook of internet. We access information online through domain names
Domain Name System
It is an organization that provides services for accessing, using or participating in the internet.
Internet service provider
The hardware device that acts as the traffic cop for network signals arriving at your home or business from your ISP
Router
It is the sending and receiving of typewritten messages from one screen to another
Email/Electronic Mail
The jargon name of unwanted and unsolicited email
Spam
The popular, but imperfect defense against spam
Filtering
Is the mathematical scrambling of data so that it is hidden from eavesdroppers
Encryption
Related to encryption. The complex way that computer systems verify that you are who you say you are
Authentication
Terms that describes transferring something you find on the internet to your computer or device
Downloading
Transfer of data from your computer to another computer
Uploading
Is a generic term to describe a barrier against destruction like hackers and viruses
Firewall
websites and apps that allow people to share comments, photos, and videos
Social media
Games that allow people to play with and against each other over the internet
Online gaming
Operating system and application updates can typically downloaded from the internet
Software updates
Is a single digit in the binary numbering system
Bit
Generally consists of eight bits
Byte
A term that applies to programs/applets (macros and intelligent agents) used on the internet
web bot
Specialized software, such as google and yahoo, that lets www browser users search for information on the web by using keywords, phrases
Search Engine
is defined as an information superhighway, to access information over the web
Internet
Consists of information organized into Web pages containing text and graphic images. The world wide web is larger collection of interconnected documents or content.
The Web (World Wide web)
collection of linked web pages that has a common theme or focus
Website
The main page that all of the pages on a particular web site are organized around and link back to.
Home Page
6 Key web concepts
Web Site
Web server
Web Browser
URL
Protocol
Host
Filename
is an English engineer and computer scientist known as the inventor of the World Wide Web
Sir Timothy John Berners- Lee
Is a collection of related Web pages and associated items, such as documents and pictures
Web site
is a computer that delivers requested Web pages to your computer. The same Web server can store multiple Web sites
Web server
or browser is application software that allows users to access and view web pages
Web Browser
A web page has a unique address
URL (Uniform Resource Locator)
URL consists of 3 Parts
Protocol
Host
Filename
3 Generations of Web
Web 1.0 (Read- only static Web)
Web 2.0 (Read-write interactive web)
Web 3.0 (Read- write intelligent web)
- Old internet that only allows people to read from the internet.
Web 1.0 (Read - only static web)
Increased the emphasis on human collaboration. This is about user-generated content and the read-write
Web 2.0 (Read write interactive web)
More connected, open, and intelligent, with semantic web technologies, distributed databases, natural language processing, machine learning, machine reasoning and autonomous agents.
Web 3.0 (Read - write intelligent web)
The web pages that are affected by user input or preference.
Dynamic Page
Provides a framework that allows data to be shared and reuse to deliver web content specifically targeting the user.
Semantic Web
12 Types of Website
eCommerce Website
Business Website
Entertainment Website
Portfolio Website
Media Web
Brochure Website
Non- Profit Website
Educational Website
Infopreneur Website
Personal Website
Web Portal
Wiki or Community Forum
Exchange of products includes shopping cart and online payment scheme.
eCommerce Website
- Representing a company-logo, products and services.
Business Website
Movies, Music, Gaming.
Entertainment Website
Showcases past work and highlights competence and credentials.
Portfolio Website
- News and Reporting site.
Media Web
- Simplified form of a business website. Getting online presence but don’t want to invest much.
Brochure Website
Medium to open for potential donors donations. Ex: Foundation Websites
Non - Profit Website
Educational and online learning, Primary goal is providing educational materials to visitors or providing information on an educational institution
Educational Website
Infopreneurs create and sell information products. That could be in the form of courses, tutorials, videos or eBooks
Infopreneurs Website
- Personal space to share thoughts, views, opinions. Ex: Blogs, Vlogs, Photo Diaries
Personal Website
- Designed for internal purposes at a business, organization, or institution. They collect information indifferent formats from different sources into one place to make all relevant information accessible to the people who need to see it.
Web portal
- A wiki is any website where various users are able to collaborate on content and all make their own tweaks and changes as they see fit
Wiki or Community Forum
is a set of rules for behaving properly online. Observing and exercising good online behavior is our responsibility.
Netiquette and Computer Ethics
Be constructive and respectful when sharing opinions, beliefs, and criticisms, or responding to those of others in the conversation.
Respect Diversity in viewpoints
When sharing a viewpoint that differs from someone else’s, it is a best practice to first acknowledge the other person by briefly restating what he or she said, but in your own words: This lets the person know that you are listening and trying to understand them.
Diversity in Views
Communicating effectively in college and business environments requires the use correct terminology, spelling, and grammar that can easily be understood.
Avoid Slang, Acronyms and Text talk
Typing an entire message using all capital letters is known as “screaming”. It is distracting and generally frowned upon in professional environments. It is better to draw emphasis to selected words or
Avoid “screaming” in typed messages
- Virtual or not, we are still in school. E-mail and chat messages that you send or receive are considered private and should not be forwarded or copied to others without gaining the consent of all involved participants.
Exercise good judgement when sharing information with toehrs online
f the material you share with others online came from another source, make every effort to gain permission from the original author or copyright holder. Copying someone else’s work and passing it off as your own is plagiarism. It damages your reputation and could subject you to serious academic and legal consequences.
Avoid Plagiarism
Just because a document, article or post appears online does not mean it contains accurate or reliable information, In fact, online information generally demands closer scrutiny than print publications. Always check the source
Be able to identify fact from fiction
the characteristics of the culture of computers, information, technology and virtual reality.
Cyber
any criminal activity that involves a computer, networked device or a network.
Cybercrime
Law that addresses effective prevention and combat of cybercrime offenses by facilitating their detection, investigation, and prosecution at both the domestic and international levels, and by providing arrangements for fast and reliable international cooperation.
Republic Act No. 10175: Cybercrime Prevention Act of 2012
It is an act protecting individual personal information.
Republic Act no. 10173 : Data privacy act of 2017
The access to the whole or any part of a computer system without right
Illegal Access
The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system
Illegal Interception
The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
Data Interference
The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network without right
System Interference
The use, production, sale, distribution, or otherwise making available, without right,
Misuse of Devices
The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same name.
Cyber Squatting
The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible
Computer - related Forgery
The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
Computer- related Fraud
- The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right.
Computer - related identity theft
The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
Cybersex
The unlawful or prohibited acts defined and punishable by Republic Act No. 9775or the Anti-Child Pornography Act of 2009, committed through a computer system.
Child Pornography
The transmission of commercial electronic communication with the use of computer system which seek to advertise, sell, or offer for sale products and service are prohibited
Unsolicited Commercial Communications
- The unlawful or prohibited acts of libel (publication of false statements that damage someone’s reputation) as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future.
Libel
- Is a term used to describe actions taken by someone to gain unauthorized access to a computer
Hacking
Stands for Malicious Software. One common way to infiltrate your computer. It infects your computer.
Mailware
- is used most often by cyber criminals because it’s easy to execute and can produce the results they’re looking for with very little effort. Fake emails, text messages and websites created to look like they’re from authentic companies.
Phishing (Spoofing)
Scammers will register a Web Address that looks like it belongs to a real business or one that can easily by typed by accident when you are trying to type in the real business’ Website
Cybersquatting
- A type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.
Ransomware
2 Types of Ransomware
Lock screen ransomware
Encryption Ransomware
displays an image that prevents you from accessing your computer.
Lockscreen Ransomware
encrypts files on your system’s hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them.
Encryption Ransomware
One more common methods of both sending information out and collecting it from unsuspecting people. The mass distribution of unsolicited messages
Spam
Often used by third parties to infiltrate your computer
Spyware and Adware
A malicious program that is disguised as, or embedded within, legitimate software.
Trojan Horses
- Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list information
Viruses
Virtual “listening in” on information that’s shared over an unsecure (not encrypted) WiFi network·
WIFI eavesdropping
- Unlike a virus, goes to work on its own without attaching itself to files or programs
Worm
Scammers stealing online identity by getting access to personal information
Identity theft
- Making promises more than they can deliver.
Online Fraud