1/103
Glossary-style flashcards covering key ICT concepts, terms, and tools from the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
ICT
Information and Communication Technology: Use of communication technology/devices to send, save, and edit information; products that store, process, transmit, convert, duplicate, or receive electronic information.
Information
Facts provided or learned about something or someone.
Communication
Imparting or exchanging of information or news.
Technology
Scientific knowledge for practical purposes, especially in industry; machinery and equipment from applying scientific knowledge.
Immateriality
Information that you have and can move from one place to another (intangible in form).
Interconnection
Link between various technologies.
Digitization
Information processed in a single universal format.
Interactivity
Exchange of information between user and computer.
Instantaneity
Transmitting information over long distances with extreme speed.
Innovation
Development of new methods or means to enhance communication.
Influenciality
Accessing a large amount of information to build knowledge through association with other connected users.
Diversity of information
Information that can impact multiple areas (economy, education, etc.).
Importance of ICT
ICT as a source of knowledge, a medium to transfer knowledge, a medium of interaction, and a means of seeking help.
Advantages of ICT
Benefits include communication, globalization, cost-effectiveness, greater availability, and bridging cultural gaps.
Disadvantages of ICT
Destructive/immoral content, unemployment, privacy concerns, lack of job security, and domination by some cultures.
Cybercrime
Illegal acts done using the internet; crimes committed online.
Phishing
Attempt to acquire sensitive information (usernames, passwords, credit card details).
Spoofing
Impersonation on a network to launch attacks, steal data, or bypass access controls.
Blackmail/Extortion
Unlawfully obtaining money or resources through coercion.
Accessing stored communication
Unauthorized access to an electronic communication facility or service.
Sports betting
Gambling on sports events over the internet.
Electronic/Cyber harassment
Online harassment or bullying.
Child pornography
Exploitation of children by clients of child prostitution.
Online prostitution
Inducing or coercing individuals to engage in prostitution via interstate commerce.
Online drug trafficking
Drug trafficking conducted over the internet.
Criminal copyright infringement (PirateBay)
Piracy of copyrighted material for financial gain.
LAN
Local Area Network: collection of devices connected in one physical location.
WAN
Wide Area Network: large network not tied to a single location; can span the world.
World Wide Web
Information system connected by hypertext links; documents are navigated via the web.
Static Web Pages
Web pages that cannot be manipulated by the user (non-interactive).
Dynamic Web Pages
Web pages that users can contribute to or comment on (interactive).
Folksonomy
Categorizing information with freely chosen words or tags (e.g., hashtags).
Rich User Experience
Dynamic, responsive design that reacts to user input.
User Participation
Users can contribute content (comments, reviews, etc.).
Long Tail
Services offered on demand rather than one-time purchases.
Software as a Service (SaaS)
Users subscribe to software only when needed, via the cloud.
Mass Participation
Diverse information sharing through universal web access.
3.0 Semantic Web
Web pages designed so machines can understand user preferences to tailor content (AI).
Technological Convergence
Synergy of different technologies working toward a common goal.
Social Media
Platforms enabling creation, co-creation, discussion, modification, and exchange of user-generated content.
Social Networks
Sites that connect people with shared interests (e.g., Facebook).
Bookmarking sites
Websites that store/manage links with tags for easy search/sharing.
Social News
Sites where users post news items or links (e.g., Reddit).
Media Sharing
Sites where users upload/share media content (images, music, videos) with likes and comments.
Microblogging
Sites focused on short user updates that followers receive.
Blogs and Forums
Sites where users post content; examples include Blogger, WordPress, Tumblr.
Mobile Technology
Rise of mobile devices (phones/tablets) enabling tasks previously done on PCs.
Mobile Devices Operating Systems
iOS, Android, Blackberry OS, Windows Phone OS, Symbian, Web OS, Windows Mobile.
Assistive Media
Non-profit service aiding people with visual or reading impairments.
Cloud Computing
Accessing software and storage over the internet (the cloud) rather than locally.
Client Computers
End-user devices used to interact with cloud services.
Distributed Servers
Servers in multiple locations working together as a single system.
Datacenters
Facilities housing many servers where applications run and are accessed via the internet.
Public Cloud
Cloud services accessible to the general public; often less secure due to openness.
Private Cloud
Cloud services restricted to a single organization with higher security.
Community Cloud
Cloud services shared by a group of organizations.
Hybrid Cloud
Combination of public and private clouds for different workloads.
Internet Safety
Online security and safety of people and information when using the internet.
Internet Security
Range of security practices to protect online activities and transactions.
CIA Triad
Confidentiality, Integrity, Availability—core security goals.
Masquerader
Outside attacker who uses someone else’s credentials to access a system.
Misfeasor
Inside user who misuses privileges or accesses unauthorized areas.
Clandestine User
User (inside/outside) who evades auditing and access controls.
Computer Crime
Criminal acts involving computers (damage, theft, manipulation).
Computer Criminals
People who commit computer crimes (employees, outsiders, organized crime, hackers).
Virus
Malware that requires a host to activate and spread.
Worm
Self-replicating malware that spreads without a host trigger.
Trojan Horse
Malicious code that hides as legitimate software to take control.
Spyware
Software that runs in the background to monitor user activity.
Adware
Software that displays unwanted advertisements, often as pop-ups.
Ransomware
Malware that blocks access to data or demands ransom for release.
Spam
Unwanted email, typically sent by bots or advertisers.
Dormant Phase
Virus has infected the system but remains inactive.
Propagation Phase
Virus multiplies and spreads to other files or programs.
Triggering Phase
Virus activates in response to a condition or date.
Execution Phase
Virus payload is released; end users notice problems.
Worm vs Virus vs Trojan Horse
Worms spread automatically; viruses require a host; trojans disguise as legitimate software.
Mail Merge
Word feature to create multiple documents by combining a main document with a data source.
Main Document
The primary document in a mail merge that contains the message body.
Data Source
Source data (e.g., an Excel file) used to populate a mail merge.
Ribbon
Collection of tools organized under a tab (e.g., Home) in Word/PowerPoint.
Slide
A single page in a PowerPoint presentation.
Slide Deck
Group of slides that comprise a presentation.
Design Template
Pre-designed styles applied to slides to set appearance.
Slide Show Button
Control that starts the presentation in full-screen mode.
Animation
Effects applied to text or graphics on a slide.
Transition
Effects that move from one slide to the next.
Normal View
Default PowerPoint/Word editing view.
Notes Page View
View showing speaker notes for each slide.
Outline View
Displays slide text in outline form for quick editing.
Slide Sorter View
Thumbnails of slides to reorder and organize the deck.
Column
Vertical component in Excel, identified by letters.
Row
Horizontal component in Excel, identified by numbers.
Cell
Intersection of a row and column; unique address on a worksheet.
Cell Reference
The address of a cell (e.g., B5) used in formulas.
SUM
Function that adds numbers in a specified range.
COUNT
Function that counts numeric cells in a range.
MIN
Function that returns the smallest value in a range.
MAX
Function that returns the largest value in a range.
AVERAGE
Function that returns the arithmetic mean of a range.