ICT

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Memory

(fast, expensive, short-term memory): Enables a computer to store, at least temporarily, data, programs, and intermediate results.

Mass storage device

(slower, cheaper, long-term memory): Allows a computer to permanently retain large amounts of data and programs between jobs. Example is a disk drive.

Software as a service

users will be subscribe to a software only when needed rather than purchasing them e.g. Google docs used to create and edit word processing and spread sheet.

Dynamic Web Pages

web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The user is able to see website differently than others (example: social networking sites, wikis, video sharing sites)

Website

• A collection of web pages which are grouped together and usually connected together in various ways. Often called a "web site" or simply a "site".

World Wide Web (WWW)

• An information system on the internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another. • It is an information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet. • Invented by Tim Berners-Lee.

Web Server

• It is a computer that hosts a website on the Internet.

ICT in the Philippines

• Philippines is dub as the "ICT Hub of Asia" because of huge growth of ICT-related jobs, one of which is BPO (Business Process Outsourcing) or call centers • ICT Department in the Philippines is responsible for the planning, development, and promotion of the country's information and communications technology agenda in support of national development.

Social News

- Sites that allow users to post their own news items or links to other news sources. The users can also comment on the post and comments may also be rank. Example: Reddit and Digg

Bookmarking Sites

- Sites that allow you to store and manage links to various website and resources. Most of the sites allow you to create a tag to others. Example: Stumble Upon, Pinterest

Mobile Technologies

- The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices capability to do the tasks that were originally found in PCs. Several of these devices are capable of using a high-speed internet. Today the latest model devices use 4G Networking (LTE), which is currently the fastest.

Social Networks

- These are sites that allows you to connect with other people with the same interests or background. Once the user creates his/her account, he/she can set up a profile, add people, share content, among others. Example: Facebook and Google+

Blogs and Forums

- allow user to post their content. Other users are able to comment on the said topic. Example: Blogger, WordPress and Tumblr

Community Cloud

- allows systems and services to be accessible by group of organizations

Private Cloud

- allows systems and services to be accessible within an organization. It offers increased security because of its private nature.

Public Cloud

- allows systems and services to be easily accessible to the general public. Public cloud may be less secured because of its openness, e.g. e-mail

Client computers

- clients are the device that the end user interact with cloud

Microblogging

- focus on short updates from the user. Those that subscribed to the user will be able to receive these updates. Example: Twitter and Plurk

Hybrid Cloud

- is a mixture of public and private cloud. However, the critical activities are performed using private cloud while the non-critical activities are performed using public cloud.

Assistive Media

- is a non- profit service designed to help people who have visual and reading impairments. A database of audio recordings is used to read to the user.

Convergence

- is the synergy of technological advancements to work on a similar goal or task. For example, besides using your personal computer to create word documents, you can now use smartphone.

Datacenters

- it is a collection of servers where application is placed and is accessed via Internet.

Distributed Servers

- often servers are in geographically different places, but server acts as if they are working next to each other.

Media Sharing

- sites that allow you to upload and share media content like images, music and video. Example: Flickr, YouTube and Instagram

Cloud Computing

-distributed computing on internet or delivery of computing service over the internet. Instead of running an e-mail program on your computer, you log in to a Web e-mail account remotely. The software and storage for your account doesn't exist on your computer - it's on the service's computer cloud.

Trojan Horse

. A malicious program that hides within or looks like a legitimate program.

Output device

: A display screen, printer, or devices that let you see what the computer has accomplished.

• Minicomputer

: A multi-user computer capable of supporting up to hundreds of users simultaneously.

Cyberextortionists

: An individual or group who uses email as an offensive force. They usually send a company a threatening email stating that will exploit a security leak or launch an attack that will harm the company's network.

Crackers

: An individual with extensive computer knowledge whose purpose is to breach internet security or gain access to software without paying royalties.

Script Kiddies

: An unskilled individual who use scripts or programs developed by others to attach computer systems and networks and deface websites.

Cultural

: How to behave. Understanding how internet culture is expressed and transmitted through phenomena such as memes, emojis, and animated gifs.

Confident

: How to belong. Understanding and capitalizing upon the ways in which online world differs from the offline world.

Communicative

: How to communicate. Knowing the purpose of various online tools and how they are different or similar to each other.

Cognitive

: How to do. The cognitive element incorporates what we know of as computer literacy or IT skills with an understanding of the key concepts.

Constructive

: How to use. The constructive element involves knowing what it means to "construct" something in a digital environment.

Input device

: Usually a keyboard and mouse, the input device is the conduit through which data and instructions enter a computer.

Digital literacy

is the ability to use information and communication technologies to find, evaluate, create, and communicate information, requiring both cognitive and technical skills.

Digital citizenship

is the continuously developing norms of appropriate, responsible, and empowered technology use.

Cyberbullying

occurs when a bully targets a victim using electronic communication methods, such as texting on cell phones or posting on social media websites.

Digital divide

refers to the growing gap between the underprivileged member of society, especially the poor, rural, elderly, and handicapped portion of the population who do not have access to computers or the internet.

Long Tail

services that are offered on demand rather than on a one-time purchase. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent in the internet.

Digital Access.

Full electronic participation and access to digital tools.

Digital Commerce.

Technology users' understanding that a large share of market economy is being done electronically.

CPU (Central Processing Unit)

The heart of the computer, this is the component that actually executes instructions organized in programs ("software") which tell the computer what to do.

User Participation

The owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comments, reviews and evaluation e.g. Lazada, Amazon.

Digital Rights and Responsibilities.

These are the requirements and freedoms extended to everyone in a digital world.

Web 3.0

This platform is all about semantic web. It aims to have machines (or servers) understand the user's preferences to be able to deliverweb content.

Embedded Computers

a specialized computer system that is part of a larger system or machine. Typically, an embedded system is housed on a single microprocessor board with the program stored in ROM.

Folksonomy

allows user to categorize and classify information using freely chosen keywords e.g. tagging by FB, Twitter, use tags that start with the sign #, referred to as hashtag.

Critical

How to evaluate. Using reasoning skills to question, analyze, scrutinize, and evaluate digital content, tools, and applications.

• Mainframe

A powerful multi-user computer capable of supporting many hundreds or thousands of users simultaneously.

• Workstation

A powerful, single-user computer. A workstation is like a personal computer, but it has a more powerful microprocessor and, in general, a higher-quality monitor.

Computer Virus.

A program that affects a computer negatively by altering the way the computer works.

Rootkit.

A program that hides in a computer and allows someone from a remote location to take full control.

Blog Search Engine.

A search engine for the blogosphere (personal websites and blogs collectively)

Metasearch Engine.

A search engine that queries other search engines and then combine the results that are received from all.

Personal computer

A small, single-user computer based on a microprocessor.

• Supercomputer

An extremely fast computer that can perform hundreds of millions of instructions per second.

Corporate Spies

An individual practicing the act or spying to gain secret information on a government or a business competitor through the use of any ICT tools.

Hackers

An individual who uses computer, networking or other skills to overcome a technical problem. It may also refer to a person who uses his or her abilities to gain unauthorized access to systems or networks in order to commit crimes.

World Wide Web (WWW)

An information system on the internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another. • It is an information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet. • Invented by Tim Berners-Lee.

Creative

How to make. It refers to creating new things which add value where the focus is more on the value created rather than the act of creating something new.

Civic

How to participate. Refers to individuals having the knowledge and ability to use digital environments to selforganize; to be part of a movement bigger than themselves.

Digital Literacy.

In schools, learners must be taught how to learn in a digital society. In other words, learners must be taught to learn anything,anytime, and anywhere.

Cyberterrorists.

Individuals who are involved in any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets.

Definition of ICT

Information and Communications Technology • It deals with the use of different communication technologies such as mobile phones, telephones, internet to locate, save, send, and edit information. • It is a study of computers as data processing tools. • It introduces students to the fundamentals of using computer systems in an internet environment

Subject Directory.

Classifies web pages in an organized set of categories

Worm.

Copies itself repeatedly, using up resources and possibly shutting down the computer network.

Digital Law.

Deals with the ethics of technology within a society. Unethical use manifests itself in the form of theft and / or crime.

Local (or Offline) Search Engine.

Designed to be used for offline PC.

Digital Security.

Electronic precautions to guarantee safety.

Digital Etiquette.

Electronic standards of conduct or procedures and has to do with the process of thinking about others when using digital devices.

Search Engine.

Finds information related to a topic

Web Pages

It is a hypertext document connected to the World Wide Web. It is a document that is suitable for the World Wide Web. • It is a document which can be displayed in a web browser such as Firefox, Google Chrome, Opera, Microsoft Internet Explorer or Edge, or Apple's Safari.

Cybercrime Prevention Act of 2012 (Republic Act No. 10175).

It is a law approved on September 12, 2012. It aims to address legal issues concerning online interactions in the internet.

Computer

It is an electronic device for storing and processing data, typically in binary form, according to instructions given to it in variable program

Computer Security Risks

It is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

Hardware Vandalism.

It is the act of defacing or destroying computer equipment.

Hardware Theft.

It is the act of stealing a computer equipment.

Web 2.0

It is the evolution of Web 1.0 by adding dynamic pages. The user is able to see a website differently than others. It allows the users to interact with the page; instead of just reading the page, the user may be able to comment or create user account.

Internet

It is the global system of interconnected computer networks that use the internet protocol suite (TCP/IP) to link billions of devices worldwide. • It is the largest computer network in the world, connecting millions of computers. • Sometimes called simply "the Net", is a worldwide system of computer networks - a network of networks in which the users at any one computer can get information from any other computer.

Internet

It is the global system of interconnected computer networks that use the internet protocol suite (TCP/IP) to link billions of devices worldwide. It is the largest computer network in the world, connecting millions of computers.Sometimes called simply "the Net", is a worldwide system of computer networks - a network of networks in which the users at any one computer can get information from any other computer.

Search Engine Optimization (SEO).

It is the process of maximizing the number of visitors to a particular website by ensuring that the site appears high on the list of results returned by a search engine.

Unauthorized access.

It is the use of a computer network without permission.

Unauthorized use.

It is the use of a computer or its data for unapproved or possibly illegal activities.

Information Theft.

It occurs when someone steals personal or confidential information.

Software Theft.

It occurs when someone: a) steals a software media; b) intentionally erases programs; c) illegally copies a program; and d) illegally registers and / or activates a program.

Web 1.0

It refers to the first stage in the world wide web, which was entirely made up of the web pages connected by hyperlinks.

Digital Health and Wellness.

It refers to the physical and psychological well-being in a digital world.

principal characteristics of computers

It responds to a specific set of instructions in a well-defined manner b. It can execute a pre-recorded list of instructions (program) c. It can quickly store and retrieve large amounts of data

Cybercrime

Offences against the confidentiality, integrity, and availability of computer data and systems (illegal access,

Rich User Experience

content is dynamic and is responsive to user's input

Mass Participation

diverse information sharing through universal web access. Web 2.0's content is based on people from various cultures.

Social Media

is a website, application, or online channel that enables web users web users to create, co-create, discuss modify, and exchange user generated content.

Research

is an activity of systematic enquiry that seeks answers to a problem.

Static Web Page

is known as a flat page or stationary age in the sense that the page is "as is" and cannot be manipulated by the user. The content is also the same for all users that is referred to as Web 1.0.


Ensembles d'études connexes

Food & Beverage Management Exam 1

View Set

Module 1 Exam - Foundations of Logical Reasoning

View Set

Central Ideas in Eleanor Roosevelt's "What I Hope to Leave Behind" "Assignment"

View Set