Emp.Tech 1st Semester

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

flashcard set

Earn XP

Description and Tags

A set of vocabulary flashcards covering foundational terms from the Empowerment Technology lecture, including ICT concepts, Internet history, web evolution, social media, netiquette and online safety.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

Information and Communication Technology (ICT)

An umbrella term for hardware and software that enable access, storage, transmission and manipulation of information.

2
New cards

Hardware (ICT context)

Physical components such as radios, televisions, phones, desktop computers, laptops and network devices used for communication.

3
New cards

Software (ICT context)

Applications and platforms that let users access, store, transmit and manipulate digital information.

4
New cards

Internet

A global network of interconnected computers that use standardized protocols to provide information and communication services; first introduced in 1974.

5
New cards

World Wide Web (WWW)

An information system for sharing content over the Internet via web servers and browsers; invented by Tim Berners-Lee in 1989 and opened to the public in 1991.

6
New cards

Web Browser

A software application (e.g., Chrome, Firefox) that retrieves and displays resources on the World Wide Web.

7
New cards

Web 1.0

The early ‘read-only’ web characterized by static, unmodifiable pages with identical content for all users.

8
New cards

Static Webpage

A ‘flat’ or stationary page whose content cannot be changed by the visitor and remains the same for all users.

9
New cards

Web 2.0

The ‘read-write’ web featuring dynamic pages, user interaction, social media and web-based applications; term popularized by Tim O’Reilly.

10
New cards

Dynamic Webpage

A page whose content can change in response to user actions, database queries or other variables.

11
New cards

Web 3.0

The ‘portable personal’ or semantic web that enables data to be shared and reused across applications through smarter, machine-interpretable content.

12
New cards

Semantic Web

A framework within Web 3.0 that structures and links data so it can be understood and processed by machines as well as humans.

13
New cards

Social Media

Web 2.0 services whose backbone is user-generated content and social networks (e.g., Facebook, Twitter, Instagram).

14
New cards

Netiquette

A set of guidelines for proper and respectful behavior in online communication environments.

15
New cards

Firewall

Software or hardware that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

16
New cards

Virus

Malicious code that attaches to legitimate programs and replicates to spread and damage or alter data.

17
New cards

Worm

Self-replicating malware that spreads across networks without needing to attach to a host file.

18
New cards

Trojan Horse (Trojan)

Malware disguised as legitimate software that, once executed, performs harmful actions without the user’s knowledge.

19
New cards

Ransomware

Malware that encrypts a victim’s data and demands payment for decryption.

20
New cards

Spyware

Software that secretly gathers user information and sends it to a third party without consent.

21
New cards

Adware

Software that automatically displays or downloads unwanted advertising material when a user is online.

22
New cards

Bots

Automated programs that can perform tasks such as spamming or launching attacks, often as part of a botnet.

23
New cards

Malware

An umbrella term for malicious software, including viruses, worms, trojans, ransomware, spyware and adware.

24
New cards

Two-Step Verification (2-Step Verification)

A security process requiring a password plus a second factor—such as a code sent to a phone—to access an account.

25
New cards

Strong Password

A complex password that combines upper- and lowercase letters, numbers and symbols to resist guessing or brute-force attacks.

26
New cards

Account Recovery Option

An alternative email address or phone number used to regain access if an account password is forgotten or compromised.

27
New cards

Operating System Update

A vendor-provided upgrade that patches security vulnerabilities and improves system performance and features.

28
New cards

User-Generated Content

Material—text, images, videos—created and posted by users rather than by site owners or professionals.

29
New cards

Tagging (Folksonomy)

A Web 2.0 practice where users assign keywords to content for easier search and organization.

30
New cards

Tim Berners-Lee

Computer scientist who invented the World Wide Web in 1989.