Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
63 Cards in this Set
- Front
- Back
- 3rd side (hint)
INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) |
often deals with the use of different technologies such as mobile phones, telephones, computer, Internet, and other devices, as well as software and applications to locate, save, send, and manipulate information. |
|
|
PRE-MECHANICAL PERIOD |
During this time, humans started communicating with one another using words and pictograms carved in rocks. Then they started to write symbols as substitutes for pictures to depict ideas, objects, and animals. These gave rise to our modern-day alphabet. |
Periods of ICT Development |
|
MECHANICAL PERIOD |
During this time, the interest in automating and speeding up numerical calculation grew. The machines driven by mechanical means such as steam and gears dominated information processing and calculation. |
Periods of ICT Development |
|
ELECTROMECHANICAL PERIOD |
In this period, the use of electricity for information handling and transfer bloomed. The need and the urgency to share information with one another in a faster yet reliable manner over long distances aroused. This period saw the use of the telegraph to transmit information over long distances. |
Periods of ICT Development |
|
ELECTRONIC PERIOD |
The highlight of this period is focused on the advent of solidstate devices or electronic devices. The four main events found in this period are the late vacuum tubes period, the transistors period, the integrated circuits period, and the computer processors period. |
Periods of ICT Development |
|
ICT TODAY |
The fusion of hardware equipment, precise software, Graphic User Interface (GUI), and an effective digital telecommunications network is the present composition of the ICT network. Perhaps one of the most widely used information systems today, the World Wide Web, is the product of this fusion. Almost every day, people go to the Web for directions, instructions, information, and even entertainment. Further, Internet applications such as Internet Browsers work as tools for communication and transmission of information from one point to another. |
Periods of ICT Development |
|
ICT HUB OF ASIA BUSINESS PROCESS OUTSOURCING |
Philippines is dubbed the “__________” because of the huge growth of ICT related jobs, one of which is BPO, _______________________, or call centers |
|
|
19.3% |
the Annual Survey of Philippines Business and Industries in 2010, the ICT industry shares ____% of the total employee population |
|
|
Voice over Internet Protocol |
VoIP |
|
|
Internet protocol suite |
(TCP/IP) |
|
|
WORLD WIDE WEB (WWW) |
an information system on the Internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another. |
|
|
TIM-BERNERS LEE |
Inventor of WORLD WIDE WEB (WWW) |
|
|
WEB 1.0 OR STATIC WEB |
It is the first stage of the World Wide Web evolution. It is a flat or stationary page since it cannot be manipulated by the user. |
Types of Web Pages |
|
WEB 2.0 OR THE SOCIAL/DYNAMIC WEB |
allows users to interact with the page, the user may be able to comment or create a user account. Most website that we visit today are Web 2.0. |
Types of Web Pages |
|
WEB 3.0 OR SEMANTIC WEB |
provides a framework that allows data to be shared and reused to deliver web content specifically targeting the user. Search Engines will learn about you and your habits from each search you perform and will gather details about you from your previous activities like likes and social postings and present the answers as per your preferences. |
Types of Web Pages |
|
Compatibility Security Vastness Vagueness Logic |
Web 3.0 is yet to be fully realized because of several problems: |
|
|
Folksonomy |
allows user to categorized and classify/arrange information using freely chosen keywords (e.g., tagging). Popular social networking sites such as Twitter, Instagram, and Facebook use tags that start with the pound sign (#). This is also referred to as hashtag |
Features of Web 2.0 |
|
Rich user experience |
content is dynamic and is responsive to user’s input. An example would be a website that shows local content. In the case of social networking sites, when logged on, your account is used to modify what you see in their website. |
Features of Web 2.0 |
|
User participation |
the owner of the website is not the only one who is able to put content. Others are able to place content of their own by means of comments, reviews, and evaluation. Some websites allow readers to comment on an article, participate in a poll, or review a specific product (e.g., Lazada.com, online stores). |
Features of Web 2.0 |
|
Long tail |
services that are offered on demand rather than on a one-time purchase. In certain cases, time-based pricing is better than file size-based pricing or vice versa. This is synonymous to subscribing to a data plan that charges you for the amount of times you spent on the internet, or a data plan that charges you for the amount of bandwidth you used |
Features of Web 2.0 |
|
Software as a service |
users will subscribe to a software only when needed rather than purchasing them. This is cheaper option if you do not always need to use a software. For instance, Google Docs is a free web-based application that allows the user to create and edit word processing and spreadsheet documents online. When you need a software, like a Word Processor, you can purchase it for a one-time huge amount and install it in your computer and it is yours forever. Software as service allows you to “rent” a software for a minimal fee. |
Features of Web 2.0 |
|
Mass participation |
diverse information sharing through universal web access. Since most users can use the Internet, Web 2.0’s content is based on people from various cultures. |
Features of Web 2.0 |
|
Convergence |
is the synergy of technological advancements to work on a similar goal or task. For example, besides using your personal computer to create word documents, you can now use your smartphone. |
TRENDS IN ICT |
|
Social media |
- is a website, application, or online channel that enables web users web users to create, co-create, discuss modify, and exchange user generated content. |
TRENDS IN ICT |
|
Social network |
These are sites that allows you to connect with otherpeople with the same interests or background. Once the user creates his/her account, he/she can set up a profile, add people, share content, etc.Example: Facebook and Google+ |
six type of social media: |
|
Bookmarking sites |
Sites that allow you to store and manage links to various website and resources. Most of the sites allow you to create a tag to others. Ex. Stumble Upon, Pinterest |
six type of social media: |
|
Social news |
Sites that allow users to post their own news items or links to other news sources. The users can also comment on the post and comments may also be rank. Ex. Reddit and Digg |
six type of social media: |
|
Media sharing |
sites that allow you to upload and share media content like images, music and video. Ex. Flickr, YouTube and Instagram |
six type of social media: |
|
Microblogging |
focus on short updates from the user. Those that subscribed to the user will be able to receive these updates. Ex. Twitter and Plurk |
six type of social media: |
|
Blog and forums |
allow user to post their content. Other users are able to comment on the said topic. Ex. Blogger, WordPress and Tumblr. |
six type of social media: |
|
iOS |
use in apple devices such as iPhone and iPad |
Mobile Operating System |
|
Android |
an open source OS developed by Google. Being open source means mobile phone companies use this OS for free. |
Mobile Operating System |
|
Blackberry OS |
use in blackberry devices |
Mobile Operating System |
|
Windows phone OS |
A closed source and proprietary operating system developed by Microsoft |
Mobile Operating System |
|
Symbian |
the original smartphone OS. Used by Nokia devices |
Mobile Operating System |
|
WebOS |
originally used in smartphones; now in smart TVs. |
Mobile Operating System |
|
Windows mobile |
developed by Microsoft for smartphones and pocket PCs |
Mobile Operating System |
|
Assistive media |
is a non-profit service designed to help people who have visual and reading impairments. A database of audio recordings is used to read to the user. |
|
|
First name Last name Middle name Current and previous School Cellphone number Name of your mother and father Name of your siblings Address Home phone number Birthday
|
ONLINE SAFETY, SECURITY AND NETIQUETTE |
ONLINE SAFETY, SECURITY AND NETIQUETTE |
|
Malware |
stands for malicious software. It is computer software sent by attackers to inflict chaos on a computer’s operation and processes. |
Internet threats |
|
Virus |
a malicious program loaded into a user’s computer without the user’s knowledge and perform malicious actions and can be transferred from one computer to another through the internet and local networks or data storage like flash drives. |
Malware |
|
Worm |
a stand-alone malicious program that can self-replicate and propagate via computer networks without human help. |
Malware |
|
Trojan |
a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. |
Malware |
|
Rogue security software |
tricks the user into posting that it is security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all |
Trojan |
|
Spyware |
a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging. |
Malware |
|
Keyloggers |
used to record the keystroke done by the users |
Spyware |
|
Adware |
a program designed to send you advertisements, mostly as pop-ups |
Malware |
|
Spam |
unwanted email mostly from bots or advertisers. It can be used to send malware. |
Internet threats |
|
Phishing |
its goal is to acquire sensitive personal information like passwords and credit card details |
Internet threats |
|
Pharming |
– a more complicated way of phishing where it exploits the DNS (Domain Name Service) system |
Phishing |
|
Netiquette |
is a coined or portmanteau term of network and etiquette. The term “netizen” refers to the person who is a member or a part of the online community. Hence, netiquette is a set of ideal rules and conduct that a netizen should observe in communicating and/or publishing information and materials over the World Wide Web and in ICT in general. |
|
|
Republic Act 10627 or Anti-Bullying Act of 2013 |
Bullying is defined as “severe or repeated use by one or more students of a written, verbal or electronic expression, or a physical gesture, or combination, thereof directed to another student that has the effect of actually causing or placing the latter in reasonable fear of physical or emotional harm or damage to his property.” |
Government Provisions for Online Courtesy and Etiquette |
|
Republic Act 10175 or Cybercrime Prevention Act of 2012 |
This law protects an individual from various unwanted online and cyber acts that may harm or evade one’s privacy and integrity. Cybercrime offenses include, but are not limited to, integrity and availability of data, illegal access of computers through remote means without permission, interception of one’s information from private conversation or correspondence, acquisition of passwords and other vital information from an individual, computer forgery, and libel. |
Government Provisions for Online Courtesy and Etiquette |
|
Data Privacy Act of 2012 |
protects personal information and data from being divulged without consent. |
Government Provisions for Online Courtesy and Etiquette |
|
Web search engines |
These are programs designed to search or mine the World Wide Web based on keywords provided by the user. They return search results such as Websites, files, photos, or other media files. Examples of these are Bing, Duckduckgo, Google, and Yahoo. |
EFFECTIVE INTERNET RESEARCH |
|
Research indexing sites |
these are Websites dedicated to compiling and indexing research done by academic researchers, engineers, social scientists, and so on. Examples are IEEE Xplore and Google Scholar. |
EFFECTIVE INTERNET RESEARCH |
|
Massive Online Open Course (MOOC) sites or tutorial sites |
these are websites dedicated to teaching and informing users focused on different areas. Examples are Coursera, edX, and Udemy. |
EFFECTIVE INTERNET RESEARCH |
|
Employment Web sites |
these are websites that enable companies to post job vacancies and also accommodate job seekers by providing a resumesubmission facility. |
EFFECTIVE INTERNET RESEARCH |
|
Electronic commerce (e-commerce) |
this is a technology that uses electronic means to trade products and currencies. It also includes any technology that introduces ease in business management and customer convenience. |
EFFECTIVE INTERNET RESEARCH |
|
Published author’s name |
Publishing the name of the one who wrote the article or information is one sign that the information is valid, credible, and legitimate. |
Authenticity Verification of Information from the Web |
|
Credible Websites |
error-free articles are more likely published by credible Websites. Examples are government-connected and government-maintained Web sites. |
Authenticity Verification of Information from the Web |
|
Rating, number of viewers, and number of shares |
credible articles are more likely to receive a high rating or a high number of viewers. |
Authenticity Verification of Information from the Web |
|
Reference and related articles |
– a credible article include a list of reference or article-related to the published one. |
Authenticity Verification of Information from the Web |