ICT
the best way to filter information you get from the search engines is by using the advanced search. This will allow you to filter out information you do not need. (NATAPOS DEN PUNYETA)
ADVANCED SEARCH
an open source OS developed by Google. Being open source means mobile phone companies use this OS for free.
ANDROID
Is a non- profit service designed to help people who have visual and reading impairments. A database of audio recordings is used to read to the user.
ASSISTIVE MEDIA
Data and information systems are available when required.
AVAILABILITY
It is important to add your own creative genius in everything that will be credited to you.
BE CREATIVE
ask yourself whether what you are making is something that came from you or something made from somebody else's creativity.
BE CREATIVE
even if a material does not say that it is copyrighted, it is not a valid defense against copyright. Be responsible enough to know if something has a copyright.
BE RESPONSIBLE
use in blackberry devices
BLACKBERRY OS
Example. Blogger, WordPress and Tumblr
BLOGS AND FORUMS
Other users are able to comment on the said topic
BLOGS AND FORUMS
allow user to post their content.
BLOGS AND FORUMS
Example: Stumble Upon, Pinterest
BOOKMARKING SITES
Most of the sites allow you to create a tag to others.
BOOKMARKING SITES
Sites that allow you to store and manage links to various website and resources.
BOOKMARKING SITES
is defined as "severe or repeated use by one or more students of a written, verbal or electronic expression, or a physical gesture, or any combination thereof, directed to another student that has the effect of actually causing or placing the latter in reasonable fear of physical or emotional harm or damage to his property.
BULLYING
clients are the device that the end user interact with cloud.
CLIENT COMPUTERS
distributed computing on internet or delivery of computing service over the internet.
CLOUD COMPUTING
allows systems and services to be accessible by group of organizations.
COMMUNITY
Ensures that data or an information system is accessed by only an authorized person.
CONFIDENTIALITY
For example, besides using your personal computer to create word documents, you can now use your smartphone.
CONVERGENCE
is the synergy of technological advancements to work on a similar goal or task
CONVERGENCE
a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is punishable by law.
COPYRIGHT
(colloquially referred to as piracy) is the use of works protected by copyright law without permission for a usage where such permission is required.
COPYRIGHT INFRINGEMENT
Includes your rights over your work, and anyone who uses it without your consent is punishable by law.
COPYRIGHT LAW
Undesirably alters system operation by adversely modifying system functions or data.
CORRUPTION
a crime committed or assisted through the use of the Internet.
CYBER CRIME
It is collection of servers where application is placed and is accessed via Internet.
DATACENTERS
A circumstance or event that may result in an authorized entity receiving false data and believing it to be true.
DECEPTION
a person born or brought up during the age of digital technology and therefore familiar with computers and the Internet from an early age
DIGITAL NATIVE
A circumstances or even that interrupts or prevents the correct operation of system services and functions.
DISRUPTION
Often servers are in geographically different places, but server acts as if they are working next to each other.
DISTRIBUTED SERVERS
virus is idle
DORMANT PHASE
who coined the term web 2.0 in january 1999?
Darcy DiNucci
Function is performed
EXECUTION PHASE
Sensitive data are directly released to an unauthorized entity.
EXPOSURE
means that an intellectual property may be used w/o consent as long as it is used in commentaries, criticism, parodies, research and etc.
FAIR USE
False data deceive an authorized entity.
FALSIFICATION
is not copyright infringement
FAN FICTION
allows user to categorize and classify information using freely chosen keywords e.g. tagging by FB, Twitter, use tags that start with the sign #, referred to as hashtag.
FOLKSONOMY
focus on a question you want answered. If it is a series of questions, start with one. Never search everything on one go.
HAVE A QUESTION IN MIND
is a mixture of public and private cloud. However, the critical activities are performed using private cloud while the non-critical activities are performed using public cloud. (natapos din ang lesson 1 :)))))))))) yoko na
HYBRID
deals with the use of different communication technologies such as mobile phones, telephone, internet, etc. to locate, save, send, and edit information.
ICT
SINO ANG JOWA NI IYA
IKAW YIEEEE
prevents or interrupts system operation by disabling a system component.
INCAPACITATION
A threat action whereby an unauthorized entity indirectly accesses sensitive data by reasoning from characteristics or byproducts of communications.
INFERENCE
assures that the data or information system can be trusted.
INTEGRITY
If you create something - an idea, an invention, a form of literary work, or a research, you have the sole right as to how it should be used by others
INTELLECTUAL PROPERTY
An unauthorized entity directly accesses sensitive data traveling between authorized sources and destinations.
INTERCEPTION
an unauthorized entity gains access to sensitive data by circumventing a system's security protections.
INTRUSION
use in apple devices such as iPhone and iPad
IOS
has been a vital tool to our modern lives that is why it is also important to make the best of the internet.
Internet
used to record the keystrokes done by user. This is done to steal passwords or any other sensitive information.
KEYLOGGERS
This is synonymous to subscribing to a data plan that charges you for the amount of time you spent in the internet.
LONG TAIL
services that are offered on demand rather than on a one-time purchase
LONG TAIL
An unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity.
MASQUERADE
diverse information sharing through universal web access.
MASS PARTICIPATION
. Ex. Flickr, YouTube and Instagram
MEDIA SHARING
sites that allow you to upload and share media content like images, music and video.
MEDIA SHARING
EXAMPLE: TWITTER AND PLURK
MICROBLOGGING
focus on short updates from the user. Those that subscribed to the user will be able to receive these updates.
MICROBLOGGING
An entity assumes unauthorized logical or physical control of a system resource.
MISAPPROPRIATION
Causes a system component to perform a function or service that is detrimental to system security.
MISUSE
The popularity of smartphones and tablets has taken a major rise over the years.
MOBILE TECHNOLOGIES
narrow down what you are searching for.
NARROW IT DOWN
is a network etiquette, the do's and don'ts of online communication
NETIQUETTE
A threat action that interrupts delivery of system services by hindering system operation.
OBSTRUCTION
a more complicated way of phishing where it exploits the DNS system.
PHARMING
dubbed by most as the "ICT Hub of Asia
PHILIPPINES
acquires sensitive personal information like passwords and credits card details.
PHISHING
tells the user how the website will handle its data.
PRIVACY POLICY/TERMS OF SERVICES
It offers increased security because of its private nature.
PRIVATE
allows systems and services to be accessible within an organization.
PRIVATE
Virus places an identical copy of itself into other programs or into certain system areas on the disk.
PROPAGATION PHASE
allows systems and services to be easily accessible to the general public. Public cloud may be less secured because of its openness, e.g. e-mail
PUBLIC
An entity deceives another by falsely denying responsibility for an act.
REPUDIATION
content is dynamic and is responsive to user's input
RICH USER EXPERIENCE
is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and manipulates them into paying money for a fake malware removal tool.
ROGUE SECURITY SOFTWARE
This law also includes protection of individuals from bullying through electronic means
Republic act 10627
is a website, application, or online channel that enables web users web users to create , co-create, discuss modify, and exchange user generated content.
SOCIAL MEDIA
Example: Facebook and Google+
SOCIAL NETWORKS
Once the user creates his/her account, he/she can set up a profile, add people, share content, etc
SOCIAL NETWORKS
These are sites that allows you to connect with other people with the same interests or background.
SOCIAL NETWORKS
Example. Reddit and Digg
SOCIAL NEWS
Sites that allow users to post their own news items or links to other news sources.
SOCIAL NEWS
The users can also comment on the post and comments may also be rank.
SOCIAL NEWS
users will be subscribe to a software only when needed rather than purchasing them e.g. Google docs used to create and edit word processing and spread sheet.
SOFTWARE AS A SERVICES
unwanted email mostly from bots or advertisers.
SPAMS
The original smartphone OS. Used by Nokia devices
SYMBIAN
Virus is activated to perform the function for which it was intended. Caused by a variety of system events
TRIGGERING PHASE
who proposed the technology in 1989?
Tim Berners-Lee
A circumstance or event whereby an entity gains access to data for which the entity is not authorized.
UNAUTHORIZED DISCLOSURE
Copyright protects literary works, photographs, paintings, drawings, films, music (and lyrics), choreography, and sculptures, but it generally does NOT protect underlying ideas and facts.
UNDERSTAND
This means that you can express something using your own words, but you should give credit to the source.
UNDERSTAND
Others are able to place a content of their own by means of comments, reviews and evaluation e.g. Lazada, Amazon.
USER PARTICIPATION
The owner of the website is not the only one who is able to put content.
USER PARTICIPATION
A circumstances or event that results in control of system services or functions by an unauthorized entity.
USURPATION
originally used in smartphone; now in smart TVs.
WEB OS
developed by Microsoft for smartphones and pocket PCs
WINDOWS MOBILE
A closed source and proprietary operating system developed by Microsoft.
WINDOWS PHONE OS
also called as static web pages
Web 1.0
is the system that enables you to access hypertext documents and other files over the internet.
World wide web
a program designed to send you advertisement, mostly pop-ups.
adware
invades an individual 's privacy by using photos and other information meant to disgrace that individual
bullying
AYOKO NA POTA
hUHUhuHU
it refers to the online security or safety of people and their information when using internet.
internet safety
stands for malicious software
malware
This law protects an individual from various unwanted online and cyber acts that may harm or evade one's privacy and integrity.
republic act 10175
is a movement led by the World Wide Web Consortium (W3C).
semantic web
provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries
semantic web
a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through key logging.
spyware
When the WWW was invented, most web pages were?
static
also known as flat page or stationary page
static
The content is also the same for all users.
static web pages
n the sense that the page is "as is" and cannot be manipulated by the user.
static web pages
a malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hacker to get your information.
trojan
a malicious program designed to transfer from one computer to another in any means possible.
virus
also called as dynamic web pages
web 2.0
is a term coined by Darcy DiNucci on January 1999.
web 2.0
It aims to have machines (or servers) understand the user's preferences to be able to deliver web content.
web 3.0
also called as semantic web page
web 3.0
a malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other computers.
worms