ICT

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

the best way to filter information you get from the search engines is by using the advanced search. This will allow you to filter out information you do not need. (NATAPOS DEN PUNYETA)

ADVANCED SEARCH

an open source OS developed by Google. Being open source means mobile phone companies use this OS for free.

ANDROID

Is a non- profit service designed to help people who have visual and reading impairments. A database of audio recordings is used to read to the user.

ASSISTIVE MEDIA

Data and information systems are available when required.

AVAILABILITY

It is important to add your own creative genius in everything that will be credited to you.

BE CREATIVE

ask yourself whether what you are making is something that came from you or something made from somebody else's creativity.

BE CREATIVE

even if a material does not say that it is copyrighted, it is not a valid defense against copyright. Be responsible enough to know if something has a copyright.

BE RESPONSIBLE

use in blackberry devices

BLACKBERRY OS

Example. Blogger, WordPress and Tumblr

BLOGS AND FORUMS

Other users are able to comment on the said topic

BLOGS AND FORUMS

allow user to post their content.

BLOGS AND FORUMS

Example: Stumble Upon, Pinterest

BOOKMARKING SITES

Most of the sites allow you to create a tag to others.

BOOKMARKING SITES

Sites that allow you to store and manage links to various website and resources.

BOOKMARKING SITES

is defined as "severe or repeated use by one or more students of a written, verbal or electronic expression, or a physical gesture, or any combination thereof, directed to another student that has the effect of actually causing or placing the latter in reasonable fear of physical or emotional harm or damage to his property.

BULLYING

clients are the device that the end user interact with cloud.

CLIENT COMPUTERS

distributed computing on internet or delivery of computing service over the internet.

CLOUD COMPUTING

allows systems and services to be accessible by group of organizations.

COMMUNITY

Ensures that data or an information system is accessed by only an authorized person.

CONFIDENTIALITY

For example, besides using your personal computer to create word documents, you can now use your smartphone.

CONVERGENCE

is the synergy of technological advancements to work on a similar goal or task

CONVERGENCE

a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is punishable by law.

COPYRIGHT

(colloquially referred to as piracy) is the use of works protected by copyright law without permission for a usage where such permission is required.

COPYRIGHT INFRINGEMENT

Includes your rights over your work, and anyone who uses it without your consent is punishable by law.

COPYRIGHT LAW

Undesirably alters system operation by adversely modifying system functions or data.

CORRUPTION

a crime committed or assisted through the use of the Internet.

CYBER CRIME

It is collection of servers where application is placed and is accessed via Internet.

DATACENTERS

A circumstance or event that may result in an authorized entity receiving false data and believing it to be true.

DECEPTION

a person born or brought up during the age of digital technology and therefore familiar with computers and the Internet from an early age

DIGITAL NATIVE

A circumstances or even that interrupts or prevents the correct operation of system services and functions.

DISRUPTION

Often servers are in geographically different places, but server acts as if they are working next to each other.

DISTRIBUTED SERVERS

virus is idle

DORMANT PHASE

who coined the term web 2.0 in january 1999?

Darcy DiNucci

Function is performed

EXECUTION PHASE

Sensitive data are directly released to an unauthorized entity.

EXPOSURE

means that an intellectual property may be used w/o consent as long as it is used in commentaries, criticism, parodies, research and etc.

FAIR USE

False data deceive an authorized entity.

FALSIFICATION

is not copyright infringement

FAN FICTION

allows user to categorize and classify information using freely chosen keywords e.g. tagging by FB, Twitter, use tags that start with the sign #, referred to as hashtag.

FOLKSONOMY

focus on a question you want answered. If it is a series of questions, start with one. Never search everything on one go.

HAVE A QUESTION IN MIND

is a mixture of public and private cloud. However, the critical activities are performed using private cloud while the non-critical activities are performed using public cloud. (natapos din ang lesson 1 :)))))))))) yoko na

HYBRID

deals with the use of different communication technologies such as mobile phones, telephone, internet, etc. to locate, save, send, and edit information.

ICT

SINO ANG JOWA NI IYA

IKAW YIEEEE

prevents or interrupts system operation by disabling a system component.

INCAPACITATION

A threat action whereby an unauthorized entity indirectly accesses sensitive data by reasoning from characteristics or byproducts of communications.

INFERENCE

assures that the data or information system can be trusted.

INTEGRITY

If you create something - an idea, an invention, a form of literary work, or a research, you have the sole right as to how it should be used by others

INTELLECTUAL PROPERTY

An unauthorized entity directly accesses sensitive data traveling between authorized sources and destinations.

INTERCEPTION

an unauthorized entity gains access to sensitive data by circumventing a system's security protections.

INTRUSION

use in apple devices such as iPhone and iPad

IOS

has been a vital tool to our modern lives that is why it is also important to make the best of the internet.

Internet

used to record the keystrokes done by user. This is done to steal passwords or any other sensitive information.

KEYLOGGERS

This is synonymous to subscribing to a data plan that charges you for the amount of time you spent in the internet.

LONG TAIL

services that are offered on demand rather than on a one-time purchase

LONG TAIL

An unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity.

MASQUERADE

diverse information sharing through universal web access.

MASS PARTICIPATION

. Ex. Flickr, YouTube and Instagram

MEDIA SHARING

sites that allow you to upload and share media content like images, music and video.

MEDIA SHARING

EXAMPLE: TWITTER AND PLURK

MICROBLOGGING

focus on short updates from the user. Those that subscribed to the user will be able to receive these updates.

MICROBLOGGING

An entity assumes unauthorized logical or physical control of a system resource.

MISAPPROPRIATION

Causes a system component to perform a function or service that is detrimental to system security.

MISUSE

The popularity of smartphones and tablets has taken a major rise over the years.

MOBILE TECHNOLOGIES

narrow down what you are searching for.

NARROW IT DOWN

is a network etiquette, the do's and don'ts of online communication

NETIQUETTE

A threat action that interrupts delivery of system services by hindering system operation.

OBSTRUCTION

a more complicated way of phishing where it exploits the DNS system.

PHARMING

dubbed by most as the "ICT Hub of Asia

PHILIPPINES

acquires sensitive personal information like passwords and credits card details.

PHISHING

tells the user how the website will handle its data.

PRIVACY POLICY/TERMS OF SERVICES

It offers increased security because of its private nature.

PRIVATE

allows systems and services to be accessible within an organization.

PRIVATE

Virus places an identical copy of itself into other programs or into certain system areas on the disk.

PROPAGATION PHASE

allows systems and services to be easily accessible to the general public. Public cloud may be less secured because of its openness, e.g. e-mail

PUBLIC

An entity deceives another by falsely denying responsibility for an act.

REPUDIATION

content is dynamic and is responsive to user's input

RICH USER EXPERIENCE

is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and manipulates them into paying money for a fake malware removal tool.

ROGUE SECURITY SOFTWARE

This law also includes protection of individuals from bullying through electronic means

Republic act 10627

is a website, application, or online channel that enables web users web users to create , co-create, discuss modify, and exchange user generated content.

SOCIAL MEDIA

Example: Facebook and Google+

SOCIAL NETWORKS

Once the user creates his/her account, he/she can set up a profile, add people, share content, etc

SOCIAL NETWORKS

These are sites that allows you to connect with other people with the same interests or background.

SOCIAL NETWORKS

Example. Reddit and Digg

SOCIAL NEWS

Sites that allow users to post their own news items or links to other news sources.

SOCIAL NEWS

The users can also comment on the post and comments may also be rank.

SOCIAL NEWS

users will be subscribe to a software only when needed rather than purchasing them e.g. Google docs used to create and edit word processing and spread sheet.

SOFTWARE AS A SERVICES

unwanted email mostly from bots or advertisers.

SPAMS

The original smartphone OS. Used by Nokia devices

SYMBIAN

Virus is activated to perform the function for which it was intended. Caused by a variety of system events

TRIGGERING PHASE

who proposed the technology in 1989?

Tim Berners-Lee

A circumstance or event whereby an entity gains access to data for which the entity is not authorized.

UNAUTHORIZED DISCLOSURE

Copyright protects literary works, photographs, paintings, drawings, films, music (and lyrics), choreography, and sculptures, but it generally does NOT protect underlying ideas and facts.

UNDERSTAND

This means that you can express something using your own words, but you should give credit to the source.

UNDERSTAND

Others are able to place a content of their own by means of comments, reviews and evaluation e.g. Lazada, Amazon.

USER PARTICIPATION

The owner of the website is not the only one who is able to put content.

USER PARTICIPATION

A circumstances or event that results in control of system services or functions by an unauthorized entity.

USURPATION

originally used in smartphone; now in smart TVs.

WEB OS

developed by Microsoft for smartphones and pocket PCs

WINDOWS MOBILE

A closed source and proprietary operating system developed by Microsoft.

WINDOWS PHONE OS

also called as static web pages

Web 1.0

is the system that enables you to access hypertext documents and other files over the internet.

World wide web

a program designed to send you advertisement, mostly pop-ups.

adware

invades an individual 's privacy by using photos and other information meant to disgrace that individual

bullying

AYOKO NA POTA

hUHUhuHU

it refers to the online security or safety of people and their information when using internet.

internet safety

stands for malicious software

malware

This law protects an individual from various unwanted online and cyber acts that may harm or evade one's privacy and integrity.

republic act 10175

is a movement led by the World Wide Web Consortium (W3C).

semantic web

provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries

semantic web

a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through key logging.

spyware

When the WWW was invented, most web pages were?

static

also known as flat page or stationary page

static

The content is also the same for all users.

static web pages

n the sense that the page is "as is" and cannot be manipulated by the user.

static web pages

a malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hacker to get your information.

trojan

a malicious program designed to transfer from one computer to another in any means possible.

virus

also called as dynamic web pages

web 2.0

is a term coined by Darcy DiNucci on January 1999.

web 2.0

It aims to have machines (or servers) understand the user's preferences to be able to deliver web content.

web 3.0

also called as semantic web page

web 3.0

a malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other computers.

worms


Set pelajaran terkait

Ch 25: Assessment of the Respiratory System

View Set

NASM 7th ed, Chapter 19: Speed, Agility, and Quickness Training Concepts

View Set

Health Assessment Prep U: Chapter 16- Assessing the Eyes

View Set

Anatomy and Physiology Exam 1 (SuperExam)

View Set

Chapter 18 (Part 3)- Eating Disorders

View Set

Ch 20 Forming & Operating Partnership, Tax 332 Chapter 20, ACCT 4343-Tax of Business Ch.9

View Set