question since the machine is saving his or Unit I: Introduction to ICT her preferences. 1. Information and Communication 17. Vastness – the World Wide Web already Technology (ICT) Deals with the use of contains billions of pages. different technologies such as mobile 18. Vagueness – Certain words are imprecise. phones, telephone, Internet, etc. to locate, The word “old” and “small” would depend save, and edit information. on the user 2. Philippines – The “ICT Hub of Asia”. 19. Logic – Since machines use logic there are Evolution of web pages certain limitations for a computer to be 3. Web 2.0 – Dynamic, Writable able to predict the user is referring to at a 4. Web 1.0 – Static, Readable given time. 5. Web 3.0 - Semantic, Executable Trends in ICT 6. Static – refers to web pages tthat are the 20. Convergence – Technological convergence same regardless of the user. is the synergy of technological 7. Dynamic – refers to web pages that are advancements to work on a similar goal or affected by user input or preferences. task. 8. Hashtag – used to “categorize posts in 21. Social Media – is a website, application, or website. online channel that enables web user to Features of Web 2.0 create, co-create, discuss, modify, and 9. Folksonomy – Allows users to categorize exchange user – generated content. and classify/arrange information using Six Types of Social media: chosen keywors. (eg. Tagging) with the use of hasgtag (#) 22. Social Networks – These are sites that 10. Rich user Experience – content is dynamic allows you to connect with other people and is responsive to user’s input. with the same interests or background. 11. User participation – the owner of website 23. Bookmarking Sites – These are sites that is not the only one who is able to put allow you to store and manage links to content. Others are able to place a content various websites and resources. on their own. By the means of comments, 24. Social News – These are sites that allow reviews, and evaluation. users to post their own news items or links 12. Long tail – Services that are offered on to other news sources. demand rather than on a one- times 25. Media sharing – These are sites that allow purchase. Synonymous to subscribing to a you to upload and share media content like data plan that charges you for the amount images, music, and video. of time you spent in the internet. 26. Microblogging – These are sites that focus 13. Software as service – users will subscribe on short updates from the user. Those to a software only when needed rather subscribed to the user will be able to than purchasing them. receive these update. 14. Mass Participation – diverse information 27. Blogs And Forums – These are websites sharing through universal web access Since allow to users to post their content. Others most users can use the internet. user are able to comment on the said topic. Web 3.0 several problems Mobile Technologies Operating systems: 15. Compatibility – HTML files and current 28. iOS - used in Apple devices such as the web browser could not support web 3.0. iPhone and IPad. 29. Android – an open source operating system developed by Google. Being open source means several mobile phone 46. Pharming – a more complicated way of companies use this OS for free. phishing where it exploits the DNS 30. Blackberry OS – used in Blackberry devices (Domain Name Service) system. 31. Windows Phone OS – a closed source and 47. Cybercrime – a crime committed or proprietary operating system developed assisted through the use of the internet. by Microsoft. 48. Privacy Policy – tells the user how the 32. Symbian – the original smartphones OS; website will handle its data. used by Nokia devices 49. Copyright – a part of the law, where in you 33. WebOS – originally used for smartphones; gave the rights to your work, and anyone now used for smart TVs uses it without your consent is punishable 34. Windows Mobile – developed by by law. Microsoft for smartphones and pocket PCs 50. Fair use – means that an intellectual 35. Assistive Media – is a nonprofit service property may be used without a consent as designed to help people who have visual long as it is used in commercials, criticism, and reading impairments. search engines, parodies etc. 51. Incognito – a browser that is synonymous LESSON 2: RULES OF NETTIQUETTE to “private” browsing. INTERNET THREATS 52. Internet – the information superhighway. 36. Malware – stands for malicious software 53. Private – an option to hide post so that 37. Virus – a malicious program that transfers search engines could not scan it. from one computer to another either COPY RIGHT INFRINGEMENT through the internet and local networks or data storage like flash drives and CDs. 54. Understand – Copyright protects literary 38. Worm – a malicious program that transfers works, photographs, paintings, drawings, from one computer to another by any type films, music, choreography, and of means. sculptures. 39. Trojan – a malicious program that is 55. Be responsible – Even if material does not disguised as useful program but once say that is copyrighted, it is not a valid downloaded or installed, leaves your PC defense against copyright. unprotected and allows hackers to get 56. Be creative – Ask yourself whether what your information. you are making else’s creativity. 40. Rogue security software – tricks the user 57. Know the law – There are some limitations into posing that it is a security software. to copyright laws. 41. Spyware – a program that runs in the 58. Mail merge – allows you to efficiently background without you knowing it (thus create documents that gave the same called “spy”). general content but may gave different 42. Keyloggers – used to record the keystroke recipients or purpose. done by the users. Steps in Doing Mail merge: 43. Adware – a program designed to send you 59. Create main document advertisements, mostly pop ups. 60. Create data source 44. Spam – unwanted email mostly from bots 61. Insert place holders or advertisers. It can be used to send 62. Preview malware. 63. Print 45. Phishing – its goal is to acquire sensitive personal information like passwords and credit card details.