Introduction to Information and Communication Technology

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/40

flashcard set

Earn XP

Description and Tags

These flashcards cover essential concepts and definitions related to Information and Communication Technology as outlined in the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

41 Terms

1
New cards

Information and Communication Technology (ICT)

The tools and infrastructure that enable access and use of the World Wide Web, including computers, smartphones, and the internet.

2
New cards

World Wide Web (WWW)

A system on the internet that allows users to view and share information through websites and web pages.

3
New cards

Web 1.0

The first phase of the World Wide Web, characterized by static web pages where users could only read information.

4
New cards

Web 2.0

The second generation of the WWW, known for user interaction, allowing users to create, share, and interact with content.

5
New cards

Web 3.0

The next phase in web development focused on smart technologies, semantic web, and personalized content through AI and blockchain.

6
New cards

Assistive Media

Digital tools, software, or devices designed to aid people with disabilities in accessing, creating, and interacting with information.

7
New cards

Text-to-Speech Software

Software that converts written text into spoken words, enabling users to listen to digital text.

8
New cards

Screen Readers

Software programs that read aloud text displayed on a screen, aiding users who are blind or have low vision.

9
New cards

Closed Captioning (CC)

A feature that displays text on the screen representing spoken dialogue, designed for accessibility for deaf or hard of hearing users.

10
New cards

Voice Recognition Software

Technology that allows a computer or device to understand and respond to spoken words, converting speech into text or commands.

11
New cards

Cybersecurity

The practice of protecting computer systems and networks from damage, theft, and unauthorized access.

12
New cards

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to systems or networks.

13
New cards

Phishing

Online scams where attackers attempt to steal sensitive information by masquerading as legitimate entities.

14
New cards

Netiquette

The etiquette and norms of behavior used in online communications to promote politeness and respect.

15
New cards

Productivity

The ability to work efficiently and produce maximum output within a limited time.

16
New cards

Google Forms

A tool for creating surveys and collecting data, which automatically encodes responses in Google Sheets.

17
New cards

Infographics

Visual representations of information designed to make complex data more accessible and engaging.

18
New cards

Information and Communication Technology (ICT)

The tools and infrastructure that enable access and use of the World Wide Web, including computers, smartphones, and the internet.

19
New cards

World Wide Web (WWW)

A system on the internet that allows users to view and share information through websites and web pages.

20
New cards

Web 1.0

The first phase of the World Wide Web, characterized by static web pages where users could only read information.

21
New cards

Web 2.0

The second generation of the WWW, known for user interaction, allowing users to create, share, and interact with content.

22
New cards

Web 3.0

The next phase in web development focused on smart technologies, semantic web, and personalized content through AI and blockchain.

23
New cards

Assistive Media

Digital tools, software, or devices designed to aid people with disabilities in accessing, creating, and interacting with information.

24
New cards

Text-to-Speech Software

Software that converts written text into spoken words, enabling users to listen to digital text.

25
New cards

Screen Readers

Software programs that read aloud text displayed on a screen, aiding users who are blind or have low vision.

26
New cards

Closed Captioning (CC)

A feature that displays text on the screen representing spoken dialogue, designed for accessibility for deaf or hard of hearing users.

27
New cards

Voice Recognition Software

Technology that allows a computer or device to understand and respond to spoken words, converting speech into text or commands.

28
New cards

Cybersecurity

The practice of protecting computer systems and networks from damage, theft, and unauthorized access.

29
New cards

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to systems or networks.

30
New cards

Phishing

Online scams where attackers attempt to steal sensitive information by masquerading as legitimate entities.

31
New cards

Netiquette

The etiquette and norms of behavior used in online communications to promote politeness and respect.

32
New cards

Productivity

The ability to work efficiently and produce maximum output within a limited time.

33
New cards

Google Forms

A tool for creating surveys and collecting data, which automatically encodes responses in Google Sheets.

34
New cards

Infographics

Visual representations of information designed to make complex data more accessible and engaging.

35
New cards

Cloud Computing

The on-demand delivery of computing services—including servers, storage, and databases—over the internet.

36
New cards

Social Media

Websites and applications that enable users to create and share content or to participate in social networking.

37
New cards

E-commerce

The buying and selling of goods or services using the internet, and the transfer of money and data to execute these transactions.

38
New cards

Digital Divide

The gap between those who have easy access to computers and the internet, and those who do not.

39
New cards

Internet of Things (IoT)

A network of physical objects embedded with sensors and software that connect and exchange data with other devices over the internet.

40
New cards

Two-Factor Authentication (2FA)

A security process in which users provide two different authentication factors to verify themselves to better protect their credentials.

41
New cards

Artificial Intelligence (AI)

The simulation of human intelligence processes by machines, especially computer systems, for tasks like learning and problem-solving.