Sunteți pe pagina 1din 2

EMPOWERMENT TECHNOLOGIES REVIEWER 16.

Security – The user’s security is also in


question since the machine is saving his or
Unit I: Introduction to ICT
her preferences.
1. Information and Communication 17. Vastness – the World Wide Web already
Technology (ICT) Deals with the use of contains billions of pages.
different technologies such as mobile 18. Vagueness – Certain words are imprecise.
phones, telephone, Internet, etc. to locate, The word “old” and “small” would depend
save, and edit information. on the user
2. Philippines – The “ICT Hub of Asia”. 19. Logic – Since machines use logic there are
Evolution of web pages certain limitations for a computer to be
3. Web 2.0 – Dynamic, Writable able to predict the user is referring to at a
4. Web 1.0 – Static, Readable given time.
5. Web 3.0 - Semantic, Executable Trends in ICT
6. Static – refers to web pages tthat are the 20. Convergence – Technological convergence
same regardless of the user. is the synergy of technological
7. Dynamic – refers to web pages that are advancements to work on a similar goal or
affected by user input or preferences. task.
8. Hashtag – used to “categorize posts in 21. Social Media – is a website, application, or
website. online channel that enables web user to
Features of Web 2.0 create, co-create, discuss, modify, and
9. Folksonomy – Allows users to categorize exchange user – generated content.
and classify/arrange information using
Six Types of Social media:
chosen keywors. (eg. Tagging) with the use
of hasgtag (#) 22. Social Networks – These are sites that
10. Rich user Experience – content is dynamic allows you to connect with other people
and is responsive to user’s input. with the same interests or background.
11. User participation – the owner of website 23. Bookmarking Sites – These are sites that
is not the only one who is able to put allow you to store and manage links to
content. Others are able to place a content various websites and resources.
on their own. By the means of comments, 24. Social News – These are sites that allow
reviews, and evaluation. users to post their own news items or links
12. Long tail – Services that are offered on to other news sources.
demand rather than on a one- times 25. Media sharing – These are sites that allow
purchase. Synonymous to subscribing to a you to upload and share media content like
data plan that charges you for the amount images, music, and video.
of time you spent in the internet. 26. Microblogging – These are sites that focus
13. Software as service – users will subscribe on short updates from the user. Those
to a software only when needed rather subscribed to the user will be able to
than purchasing them. receive these update.
14. Mass Participation – diverse information 27. Blogs And Forums – These are websites
sharing through universal web access Since allow to users to post their content. Others
most users can use the internet. user are able to comment on the said topic.
Web 3.0 several problems Mobile Technologies Operating systems:
15. Compatibility – HTML files and current 28. iOS - used in Apple devices such as the
web browser could not support web 3.0. iPhone and IPad.
29. Android – an open source operating
system developed by Google. Being open
source means several mobile phone 46. Pharming – a more complicated way of
companies use this OS for free. phishing where it exploits the DNS
30. Blackberry OS – used in Blackberry devices (Domain Name Service) system.
31. Windows Phone OS – a closed source and 47. Cybercrime – a crime committed or
proprietary operating system developed assisted through the use of the internet.
by Microsoft. 48. Privacy Policy – tells the user how the
32. Symbian – the original smartphones OS; website will handle its data.
used by Nokia devices 49. Copyright – a part of the law, where in you
33. WebOS – originally used for smartphones; gave the rights to your work, and anyone
now used for smart TVs uses it without your consent is punishable
34. Windows Mobile – developed by by law.
Microsoft for smartphones and pocket PCs 50. Fair use – means that an intellectual
35. Assistive Media – is a nonprofit service property may be used without a consent as
designed to help people who have visual long as it is used in commercials, criticism,
and reading impairments. search engines, parodies etc.
51. Incognito – a browser that is synonymous
LESSON 2: RULES OF NETTIQUETTE
to “private” browsing.
INTERNET THREATS 52. Internet – the information superhighway.
36. Malware – stands for malicious software 53. Private – an option to hide post so that
37. Virus – a malicious program that transfers search engines could not scan it.
from one computer to another either
COPY RIGHT INFRINGEMENT
through the internet and local networks or
data storage like flash drives and CDs. 54. Understand – Copyright protects literary
38. Worm – a malicious program that transfers works, photographs, paintings, drawings,
from one computer to another by any type films, music, choreography, and
of means. sculptures.
39. Trojan – a malicious program that is 55. Be responsible – Even if material does not
disguised as useful program but once say that is copyrighted, it is not a valid
downloaded or installed, leaves your PC defense against copyright.
unprotected and allows hackers to get 56. Be creative – Ask yourself whether what
your information. you are making else’s creativity.
40. Rogue security software – tricks the user 57. Know the law – There are some limitations
into posing that it is a security software. to copyright laws.
41. Spyware – a program that runs in the 58. Mail merge – allows you to efficiently
background without you knowing it (thus create documents that gave the same
called “spy”). general content but may gave different
42. Keyloggers – used to record the keystroke recipients or purpose.
done by the users. Steps in Doing Mail merge:
43. Adware – a program designed to send you 59. Create main document
advertisements, mostly pop ups. 60. Create data source
44. Spam – unwanted email mostly from bots 61. Insert place holders
or advertisers. It can be used to send 62. Preview
malware. 63. Print
45. Phishing – its goal is to acquire sensitive
personal information like passwords and
credit card details.

S-ar putea să vă placă și