ICT- 1st Quarter Flashcards

(75 cards)

1
Q

ICT stands for

A

Information and Communication Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

an umbrella term referring to communication hardware and software that allows the access, storage, transmission and manipulation of information.

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

in terms of hardware, it specifically encompasses radio, television, communication devices (smart and non-smart phones), desktop computer, laptops, and network technologies

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

it also comprised of software, applications and platforms that allows information to be accessed, stored, transmitted, and manipulated

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is when multiple devices combine into a single gadget because of technological advancement

A

Convergent Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

These are software, applications or platforms that allow users to communicate in an online social communities or network

A

Social Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is a term for devices that are easily carried and allows fast means of communications

A

Mobile Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the system that enables people to access information over the internet

A

WWW (World Wide Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the actual interconnections of computers and other networks

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The user can only read whatever online content the creator has made.

A

Web 1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

refers for the ability of the user to add content through posting, sharing, commenting or rating. This allows interaction not only in between the user and the creator but also other users. Examples are sites like Facebook, Youtube, Twitter, and Reddit

A

Web 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is a concept of how the web will evolve. The keyword for this is executable, which refers to the capability of accepting a request from the user will execute a solution or suggestion considering the behavioral data the user. It is not fully realized and is still developing, the full concept can still change.

A

Web 3.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Web 1.0?

A

“read-only web”
“static website”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Web 2.0?

A

“read-write”
“dynamic”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Web 3.0?

A

“semantic”
“executable”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Features of Web 2.0

A

Folksonomy
Rich User Experience
User Participation
Long Tail
Software as a Service
Mass Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

it allows user to categorize and classify or arrange information using freely chosen keywords which uses sign (#) also referred to as hashtag. e.g, tagging in Facebook/Twitter

A

Folksonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

its content is dynamic and is responsive to user’s input. Example, a website that shows local content or in case of social networking sites, when you are logged on, your account is used to modify what you see in their website.

A

Rich User Experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

the owner of the website is not only who is able to put content. Others are able to place a content of their own by means of comments, review, and evaluation. e.g, Amazon.com, online stores

A

User Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

services that are offered on demand rather than on a one-time purchase. In certain cases, time-based pricing is better than file size-based pricing or vice versa. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent in the internet, or a data plan that charges you for the amount of bandwidth you used.

A

Long Tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Users will subscribe to a software only when needed rather than purchasing them. This is a cheaper option if you do not always need to use a software. For instance, Google Docs is a free web-based application that allows user to create and edit word processing and spreadsheet documents online.

A

Software as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

diverse information sharing through universal web access. Since most users can use the Internet, Web 2.0’s content is based on people from various cultures.

A

Mass Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange user-generated content.

A

Social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Types of Social Media: (6)

A

Social Networks
Bookmarking Sites
Social News
Media Sharing
Microblogging
Blogs and Forums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
These are sites that allow you to connect with other people with the same interests or background. Once a user creates his or her account, he or she can set up a profile, add people, create groups, and share content. e.g., Facebook and Google+
Social Networks
26
These sites that allow you to store and manage links to various websites and resources. Most of these sites allow you to create a tag that allows you and others to easily search or share them. e.g., Pinterest
Bookmarking Sites
27
These are sites that allows users to post their own news items or links to other news sources. The users can also comment on the post and comments may also be ranked. They are also capable of voting on these news articles of the website. Those who get the most amount of votes are shown most prominently. e.g., Reddit and Digg
Social News
28
These are sites that allow you to upload and share media content like images, music, and video. Most of these sites have additional social features like liking, commenting, and having user profiles. e.g., Youtube and Instagram
Media Sharing
29
These are sites that focus on short updates from the user. Those subscribed to the user will be able to receive these updates. e.g., Twitter
Microblogging
30
These websites allow users to post their content. Other users are able to comment on the said topic. There are several free blogging platforms like Blogger, Wordpress, and Tumblr. On the other hand, forums are typically part of a certain website or web service.
Blogs and Forums
31
Is a nonprofit service designed to help people who have visual and reading impairments. A database of audio recordings is used to read to the user.
Assistive Media
32
It is a movement led by the World Wide Web Consortium (W3C)
Semantic Web
33
The term W3C was coined by the inventor of the World Wide Web
Tim Berners-Lee
34
The aim of this is to have machines (or servers) understand the user's preferences to be able to deliver web content specifically targetting the user (aims to do better)
Web 3.0
35
Web 3.0 is yet to be fully realized because of several problems:
Compatibility Security Vastness Vagueness Logic
36
HTML files and current web browsers could not support Web 3.0.
Compatibility
37
The user's security is also in question since the machine is saving his or her preferences.
Security
38
The World Wide Web already contains billions of web pages.
Vastness
39
Certain words are imprecise. The words "old" and "small" would depend on the user.
Vagueness
40
Since machines use logic, there are certain limitation for a computer to be able to predict what the user is referring to at a given time.
Logic
41
Trends in ICT:
Convergent Technologies Social Media Mobile Technologies Assistive Media
42
It is the synergy of technological advancements to work on a similar goal or task. For example, besides using your personal computer to create word documents, you can now use your smartphone. It can also use cloud technologies to sync files from one device to another while also using LTE technology which means you can access your files anytime, anywhere. It is using several technologies to accomplish a task conveniently.
Convergent Technologies
43
The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices' capability to do tasks that were originally found in personal computers. Several of these devices are capable of using high-speed internet.
Mobile Technologies
44
Mobile Devices use different operating systems: (7)
IOS Android Blackberry OS Windows Phone OS Symbian WebOS Windows Mobile
45
used in Apple devices such as the iPhone and iPad
IOS
46
an open source operating system developed by Google. Being open source means several mobile phone companies use this OS for free.
Android
47
used in Blackberry devices.
Blackberry OS
48
a closed source and proprietary operating system developed by Microsoft
Windows Phone OS
49
the original smartphone OS; used by Nokia devices.
Symbian
50
originally used for smartphones; now used for smart TVs.
Web OS
51
developed by Microsoft for smartphones and pocket PC's
Windows Mobile
52
There is still a risk in sharing this. Chances are, a hacker already knows plenty of stuff about you even if you only give this out. You cannot just walk in a room and start introducing yourself to everyone. You do not know whom you can come across.
First Name
53
If sharing your first name is a small risk, having both your first and last is more risky. You will be vulnerable to being searched for using search engines, which include image search. Matching a name with a face can lead to several cybercrimes like identity theft.
Last Name
54
Sharing this is probably not the most risky of these shared information, but sharing your entire full name would be.
Middle Name
55
Most people who steal identities study their subject. They can use this information for verification purposes.
Current and Previous School
56
Should never be posted over the internet. The Internet is a public place. It is the same as posting your number on a billboard.
Your cellphone number
57
Risky yet not as risky as posting their full names, especially your mother's maiden name. Many websites require your mother's maiden name as an answer to a secret question whenever you lose your password.
The name of your father and mother
58
This is a huge risk, especially if you have younger siblings. Strangers may pretend or use their identity to dupe you.
The name of your siblings
59
Giving the internet your phone number is one thing, giving them this is a whole other level. It would be much easier for the criminals to find you.
Your address
60
This shared information is riskier than sharing your personal phone number. Scams usually this information to deceive you, one of which is when a stranger pretends to be your parents or pretends to be you.
Your home phone number
61
Letting people know this is probably a must if you want to get as many gifts as possible. But having this in your profile makes you vulnerable to identity theft.
Your birthday
62
The internet is defined as the ___________ ___________. This means anyone has access to this highway, can place information, and can grab that information. This is why some website continues to improve their security features. The threat of cybercrime is very real. Whatever information we share today could affect our future.
Information Superhighway
63
3 Kinds of Internet Threats:
1. Malware 2. Spam 3. Phishing
64
6 Types of Malware:
1. Virus 2. Worm 3. Trojan 4. Spyware 5. Adware 6. Ransomware
65
Or malicious software, is any program or file that is harmful to a computer.
Malware
66
is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.
Virus
67
is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. Ex: ILOVEYOU virus
Worm
68
is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.
Trojan
69
malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent. A commonly accepted definition is a strand of malware designed to access and damage a device without the user's consent. Ex: Keylogger
Spyware
70
(or advertising software) is the term used for various pop-up advertisements that show up on your computer or mobile device. It has the potential to become malicious and harm your device by slowing it down, hijacking your browser and installing viruses and/or spyware.
Adware
71
a malware designed to deny a user or organization access to files on their computer. By encrypting these files and demanding a ransom payment for the decryption key, cyber-attackers place organizations in a position where paying the ransom is the easiest and cheapest way to regain access to their files.
Ransomware
72
unsolicited and unwanted junk email sent out in bulk to an indiscriminate recipient list. Typically, it is sent for commercial purposes. It can be sent in massive volume by botnets, networks of infected computers.
Spam
73
a type of cybercrime in which victims are contacted by email, telephone, or text message by an attacker posing as a trustworthy entity in order to obtain sensitive information or data, such as login credentials, credit card details, or other personally identifiable information.
Phishing
74
It is the use of works protected by copyright law without permission for a usage where such permission is required.
Copyright Infringement
75
Here are some tips that could help avoid copyright infringement:
1. Always assume that the work is copyrighted. 2. Do not copy, share or alter without seeking permission. 3. Review and retain licensing agreements. 4. Consider buying content. 5. Give credit to the original author of the page or information.