1st Quarter Flashcards
(51 cards)
What does ICT stands for?
Information and Communications Technology
It is an umbrella term that includes any communication device or application.
ICT (Information and Communications Technology)
It is an interconnected system of public webpages accessible through the Internet.
WWW (World Wide Web)
Web pages can either be _____ or _____.
static or dynamic
The web page is “ as is “ and cannot be manipulated by the user, moreover, the content is also the same for all users.
Web 1.0 or Static Web Pages
The web page have more and developed features, where what I see is not what another person sees.
Web 2.0 or Dynamic Web Pages
It is an etiqutte applied online that shows proper manner and behavior
Netiqutte
It happens when someone intentionally abused,
harass, and mistreated by other person using
electronic communication.
Cyberbullying
It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions.
Identity Theft
A criminal practice where electronic communication is used to stalk or harass individual or group.
Cyber Stalking
The act of sending sexually explicit text messages, images, and videos
Sexting
It is designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs
Virus
it transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself.
Worm
It disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
Trojan
tricks used into posting that it is a security software. It ask the user to pay to improve his/her security but in reality they are not protected at all.
Rogue Security software
It runs in the background without knowing it. It has the ability to monitor what you are currently doing and typing through key logging.
Spyware
The web page is able to understand the user’s preferences to be able to deliver web content specifically targeting the user.
Web 3.0
It is used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.
Keyloggers
What are the key features of Web 2.0?
- Folksonomy
- Rich User Experience
- User Participation
- Long Tail
- Software as a Service
- Mass Participation
A program designed to send you advertisements, mostly as pop-ups
Adware
Unwanted email mostly from bots or advertisers. It can be used to send malware
Spam
Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website.
Phishing
A more complicated way of phishing where it exploits the DNS (Domain Name Service) system
Pharming
Allows users to categorize and locate information (ex. Tagging)
Folksonomy