• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/63

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

63 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT)

often deals with the use of different technologies such as mobile phones, telephones, computer, Internet, and other devices, as well as software and applications to locate, save, send, and manipulate information.

PRE-MECHANICAL PERIOD

During this time, humans started communicating with one another using words and pictograms carved in rocks. Then they started to write symbols as substitutes for pictures to depict ideas, objects, and animals. These gave rise to our modern-day alphabet.

Periods of ICT Development

MECHANICAL PERIOD

During this time, the interest in automating and speeding up numerical calculation grew. The machines driven by mechanical means such as steam and gears dominated information processing and calculation.

Periods of ICT Development

ELECTROMECHANICAL PERIOD

In this period, the use of electricity for information handling and transfer bloomed. The need and the urgency to share information with one another in a faster yet reliable manner over long distances aroused. This period saw the use of the telegraph to transmit information over long distances.

Periods of ICT Development

ELECTRONIC PERIOD

The highlight of this period is focused on the advent of solidstate devices or electronic devices. The four main events found in this period are the late vacuum tubes period, the transistors period, the integrated circuits period, and the computer processors period.

Periods of ICT Development

ICT TODAY

The fusion of hardware equipment, precise software, Graphic User Interface (GUI), and an effective digital telecommunications network is the present composition of the ICT network. Perhaps one of the most widely used information systems today, the World Wide Web, is the product of this fusion. Almost every day, people go to the Web for directions, instructions, information, and even entertainment. Further, Internet applications such as Internet Browsers work as tools for communication and transmission of information from one point to another.

Periods of ICT Development

ICT HUB OF ASIA


BUSINESS PROCESS OUTSOURCING

Philippines is dubbed the “__________” because of the huge growth of ICT related jobs, one of which is BPO, _______________________, or call centers

19.3%

the Annual Survey of Philippines Business and Industries in 2010, the ICT industry shares ____% of the total employee population

Voice over Internet Protocol

VoIP

Internet protocol suite

(TCP/IP)

WORLD WIDE WEB (WWW)

an information system on the Internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.

TIM-BERNERS LEE

Inventor of WORLD WIDE WEB (WWW)

WEB 1.0 OR STATIC WEB

It is the first stage of the World Wide Web evolution. It is a flat or stationary page since it cannot be manipulated by the user.

Types of Web Pages

WEB 2.0 OR THE SOCIAL/DYNAMIC WEB

allows users to interact with the page, the user may be able to comment or create a user account. Most website that we visit today are Web 2.0.

Types of Web Pages

WEB 3.0 OR SEMANTIC WEB

provides a framework that allows data to be shared and reused to deliver web content specifically targeting the user. Search Engines will learn about you and your habits from each search you perform and will gather details about you from your previous activities like likes and social postings and present the answers as per your preferences.

Types of Web Pages

Compatibility


Security


Vastness


Vagueness


Logic

Web 3.0 is yet to be fully realized because of several problems:

Folksonomy

allows user to categorized and classify/arrange information using freely chosen keywords (e.g., tagging). Popular social networking sites such as Twitter, Instagram, and Facebook use tags that start with the pound sign (#). This is also referred to as hashtag

Features of Web 2.0

Rich user experience

content is dynamic and is responsive to user’s input. An example would be a website that shows local content. In the case of social networking sites, when logged on, your account is used to modify what you see in their website.

Features of Web 2.0

User participation

the owner of the website is not the only one who is able to put content. Others are able to place content of their own by means of comments, reviews, and evaluation. Some websites allow readers to comment on an article, participate in a poll, or review a specific product (e.g., Lazada.com, online stores).

Features of Web 2.0

Long tail

services that are offered on demand rather than on a one-time purchase. In certain cases, time-based pricing is better than file size-based pricing or vice versa. This is synonymous to subscribing to a data plan that charges you for the amount of times you spent on the internet, or a data plan that charges you for the amount of bandwidth you used

Features of Web 2.0

Software as a service

users will subscribe to a software only when needed rather than purchasing them. This is cheaper option if you do not always need to use a software. For instance, Google Docs is a free web-based application that allows the user to create and edit word processing and spreadsheet documents online. When you need a software, like a Word Processor, you can purchase it for a one-time huge amount and install it in your computer and it is yours forever. Software as service allows you to “rent” a software for a minimal fee.

Features of Web 2.0

Mass participation

diverse information sharing through universal web access. Since most users can use the Internet, Web 2.0’s content is based on people from various cultures.

Features of Web 2.0

Convergence

is the synergy of technological advancements to work on a similar goal or task. For example, besides using your personal computer to create word documents, you can now use your smartphone.

TRENDS IN ICT

Social media

- is a website, application, or online channel that enables web users web users to create, co-create, discuss modify, and exchange user generated content.

TRENDS IN ICT

Social network

These are sites that allows you to connect with otherpeople with the same interests or background. Once the user creates his/her account, he/she can set up a profile, add people, share content, etc.Example: Facebook and Google+

six type of social media:

Bookmarking sites

Sites that allow you to store and manage links to various website and resources. Most of the sites allow you to create a tag to others. Ex. Stumble Upon, Pinterest

six type of social media:

Social news

Sites that allow users to post their own news items or links to other news sources. The users can also comment on the post and comments may also be rank. Ex. Reddit and Digg

six type of social media:

Media sharing

sites that allow you to upload and share media content like images, music and video. Ex. Flickr, YouTube and Instagram

six type of social media:

Microblogging

focus on short updates from the user. Those that subscribed to the user will be able to receive these updates. Ex. Twitter and Plurk

six type of social media:

Blog and forums

allow user to post their content. Other users are able to comment on the said topic. Ex. Blogger, WordPress and Tumblr.

six type of social media:

iOS

use in apple devices such as iPhone and iPad

Mobile Operating System

Android

an open source OS developed by Google. Being open source means mobile phone companies use this OS for free.

Mobile Operating System

Blackberry OS

use in blackberry devices

Mobile Operating System

Windows phone OS

A closed source and proprietary operating system developed by Microsoft

Mobile Operating System

Symbian

the original smartphone OS. Used by Nokia devices

Mobile Operating System

WebOS

originally used in smartphones; now in smart TVs.

Mobile Operating System

Windows mobile

developed by Microsoft for smartphones and pocket PCs

Mobile Operating System

Assistive media

is a non-profit service designed to help people who have visual and reading impairments. A database of audio recordings is used to read to the user.

First name


Last name


Middle name


Current and previous School


Cellphone number


Name of your mother and father


Name of your siblings


Address


Home phone number


Birthday


ONLINE SAFETY, SECURITY AND NETIQUETTE

ONLINE SAFETY, SECURITY AND NETIQUETTE

Malware

stands for malicious software. It is computer software sent by attackers to inflict chaos on a computer’s operation and processes.

Internet threats

Virus

a malicious program loaded into a user’s computer without the user’s knowledge and perform malicious actions and can be transferred from one computer to another through the internet and local networks or data storage like flash drives.

Malware

Worm

a stand-alone malicious program that can self-replicate and propagate via computer networks without human help.

Malware

Trojan

a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.

Malware

Rogue security software

tricks the user into posting that it is security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all

Trojan

Spyware

a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging.

Malware

Keyloggers

used to record the keystroke done by the users

Spyware

Adware

a program designed to send you advertisements, mostly as pop-ups

Malware

Spam

unwanted email mostly from bots or advertisers. It can be used to send malware.

Internet threats

Phishing

its goal is to acquire sensitive personal information like passwords and credit card details

Internet threats

Pharming

– a more complicated way of phishing where it exploits the DNS (Domain Name Service) system

Phishing

Netiquette

is a coined or portmanteau term of network and etiquette. The term “netizen” refers to the person who is a member or a part of the online community. Hence, netiquette is a set of ideal rules and conduct that a netizen should observe in communicating and/or publishing information and materials over the World Wide Web and in ICT in general.

Republic Act 10627 or Anti-Bullying Act of 2013

Bullying is defined as “severe or repeated use by one or more students of a written, verbal or electronic expression, or a physical gesture, or combination, thereof directed to another student that has the effect of actually causing or placing the latter in reasonable fear of physical or emotional harm or damage to his property.”

Government Provisions for Online Courtesy and Etiquette

Republic Act 10175 or Cybercrime Prevention Act of 2012

This law protects an individual from various unwanted online and cyber acts that may harm or evade one’s privacy and integrity. Cybercrime offenses include, but are not limited to, integrity and availability of data, illegal access of computers through remote means without permission, interception of one’s information from private conversation or correspondence, acquisition of passwords and other vital information from an individual, computer forgery, and libel.

Government Provisions for Online Courtesy and Etiquette

Data Privacy Act of 2012

protects personal information and data from being divulged without consent.

Government Provisions for Online Courtesy and Etiquette

Web search engines

These are programs designed to search or mine the World Wide Web based on keywords provided by the user. They return search results such as Websites, files, photos, or other media files. Examples of these are Bing, Duckduckgo, Google, and Yahoo.

EFFECTIVE INTERNET RESEARCH

Research indexing sites

these are Websites dedicated to compiling and indexing research done by academic researchers, engineers, social scientists, and so on. Examples are IEEE Xplore and Google Scholar.

EFFECTIVE INTERNET RESEARCH

Massive Online Open Course (MOOC) sites or tutorial sites

these are websites dedicated to teaching and informing users focused on different areas. Examples are Coursera, edX, and Udemy.

EFFECTIVE INTERNET RESEARCH

Employment Web sites

these are websites that enable companies to post job vacancies and also accommodate job seekers by providing a resumesubmission facility.

EFFECTIVE INTERNET RESEARCH

Electronic commerce (e-commerce)

this is a technology that uses electronic means to trade products and currencies. It also includes any technology that introduces ease in business management and customer convenience.

EFFECTIVE INTERNET RESEARCH

Published author’s name

Publishing the name of the one who wrote the article or information is one sign that the information is valid, credible, and legitimate.

Authenticity Verification of Information from the Web

Credible Websites

error-free articles are more likely published by credible Websites. Examples are government-connected and government-maintained Web sites.

Authenticity Verification of Information from the Web

Rating, number of viewers, and number of shares

credible articles are more likely to receive a high rating or a high number of viewers.

Authenticity Verification of Information from the Web

Reference and related articles

– a credible article include a list of reference or article-related to the published one.

Authenticity Verification of Information from the Web