Send a link to your students to track their progress
203 Terms
1
New cards
ICT
Diverse set of technological tools and resources used to communicate, create, disseminate, store, and manage information
2
New cards
WEB
An information system in the internet that allows documents to be connected to other documents by hypertext links, enabling the user to search information by moving from one document to another. it's also invented by Tim Bernres Lee
3
New cards
WEB 1.0
Is known for its flat page or stationary page in the sense that the page is "as is" and cannot be manipulated by the user
4
New cards
Static Web
Other term for WEB 1.0
5
New cards
WEB 2.0
WEB 2.0 is the evolution of the WEB 1.0 by adding dynamic web pages—the users is able to see a website differently than others. WEB 2.0 also allow the users to interact with the page; instead of just reading the page
6
New cards
Examples of WEB 2.0
Social networking sites, wikis, video sharing sites, hosted services, and web applications
7
New cards
Features of WEB 2.0
Folksonomy, Rich User Experience, Long Tail, User Participation, Software as a Services, Mass Participations
8
New cards
FOLKSONOMY
Allows user to categorize and classify information using freely chosen keywords. Tagging by FB, twitter, use tags that start with the sign #, referred to as hashtag.
9
New cards
RICH USER EXPERIENCE
Content is dynamic and is responsive to user's input.
10
New cards
LONG TAIL
Services that are offered on demand rather than on a one-time purchase. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent on the internet.
11
New cards
USER PARTICIPATION
The owner of the website is not the only one who is able to put content. Others can place a content of their own by means of comments, reviews and evaluation e.g., Lazada, Amazon.
12
New cards
SOFTWARE AS A SERVICES
Users will subscribe to a software only when needed rather than purchasing them Google docs used to create and edit word processing and spread sheet
13
New cards
MASS PARTICIPATION
Diverse information sharing through universal web access. Web 2.0's content is based on people from various cultures.
14
New cards
WEB 3.0
Semantic web site is a movement led by the World Wide Web Consortium (W3C) The aim of Web 3.0 is to have machines (or servers) understand the user's preferences to be able to deliver web content specifically targeting the user.
HTML files and the current web browsers could not support web 3.0
17
New cards
SECURITY
The user's security is also in question since the machine is saving his or her preferences
18
New cards
VASTNESS
The World Wide Web already contains billions of web pages
19
New cards
VAGUENESS
Certain words are imprecise
20
New cards
LOGIC
Since machines use logic, there are certain limitations for a computer to be able to predict what the user is referring to at a given time.
21
New cards
ASSISTIVE MEDIA
This are equipment's that helps a people with disability to increase, to improve or to maintain his/her functional capabilities
22
New cards
COLLABORATIVE PLATFORM
Is a category of business software that adds broad social networking capabilities to work processes. A collaborative platform is a virtual workplace that centralizes resources and technologies to facilitate communication and human contact in corporate project work
23
New cards
CONVERGENT TECHNOLOGY
An extension of the term convergence, which means coming together" of two or more separate technology or Synergy of technological advancements to work on a similar goal or task
24
New cards
MOBILE TECHNOLOGY
The popularity of smartphones and tablets has taken a major rise over the years.This is largely because of the devices capability to do task that were originally found in personal computers
25
New cards
SOCIAL MEDIA
Are computer-mediated tools that allows people or companies to create, share or exchange information, career interest, ideas and even pictures and videos in virtual communities and networks.
26
New cards
SOCIAL NETWORKS
These are sites that allows you to connect with other people with the same interest or background
27
New cards
SOCIAL NEWS
These are sites that allows user to post their own news items or links to other news sources
28
New cards
BLOGS AND FORUMS
These websites allow user to post their content
29
New cards
MEDIA SHARING
These sites allow you to upload and share media content like images, music and video
30
New cards
BOOKMARKING SITES
These are sites that allows you to store and manage links to various websites and resources
31
New cards
RULE NO. 1:
REMEMBER THE HUMAN
32
New cards
RULE NO. 2:
ADHERE TO THE SAME STANDARDS ONLINE THAT YOU FOLLOW IN REAL LIFE
33
New cards
RULE NO. 3:
KNOW WHERE YOU ARE IN CYBERSPACE
34
New cards
RULE NO. 4:
RESPECT ANOTHER PEOPLE’S TIME AND BANDWIDTH
35
New cards
RULE NO. 5:
MAKE YOURSELF LOOK GOOD ONLINE
36
New cards
RULE NO. 6:
SHARE EXPERT KNOWLEDGE
37
New cards
RULE NO. 7:
HELP KEEP FLAME WARS UNDER CONTROL
38
New cards
RULE NO. 8:
RESPECT ANOTHER PEOPLE’S PRIVACY
39
New cards
RULE NO. 9:
DONT ABUSE YOUR POWER
40
New cards
RULE NO. 10:
BE FORGIVING OF ANOTHER PEOPLE'S MISTAKE
41
New cards
INTERNET THREATS
A category of cybersecurity risks that may cause an undesirable event or action via the internet
42
New cards
VIRUS
A virus is a specific type of malware that self-replicates by inserting its code into other programs.
43
New cards
MALWARE
a catch-all term for any type of malicious software, regardless of how it works, its intent, or how it's distributed.
44
New cards
TROJAN
In order to try and access consumers' systems, an attacker will frequently utilize social engineering to conceal malicious malware in genuine applications.
45
New cards
ROGUE SECURITY SOFTWARE
a type of malicious software and online fraud that tricks consumers into thinking their computer has a virus and tries to persuade them to pay for a phony malware removal program that in fact installs malware on their computer.
46
New cards
WORM
a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it.
47
New cards
SPYWARE
It intrudes, takes private information and internet usage data, and then passes it to third parties like advertising, data companies, or other users. This type of malware that is hard to detect
48
New cards
KEYLOGGER
The act of secretly recording the keys pressed on a keyboard such that the person using it is unaware that their actions are being watched is known as keystroke logging, also known as keylogging or keyboard capture.
49
New cards
ADWARE
commonly referred to as advertisement-supported software, makes money for its creators by displaying banner ads on your screen, typically inside of a web browser.
50
New cards
PHISHING
Is the deceiving attempt to obtain sensitive information such as usernames, passwords, credit card details often for malicious reasons.
51
New cards
SPAM
Malspam is an abbreviation for "malware spam" or "malicious spam," which refers to spam messages that include malware.
52
New cards
INTELLECTUAL PROPERTY RIGHTS
a category of property that includes intangible creations of the human intellect
53
New cards
TYPES OF IPR
COPYRIGHTS, PATENTS, TRADE SECRET, TRADEMARK
54
New cards
PATENT
It protects a process, manufacture, composition of matter, and a useful machine. Design patent-It protects the shape, appearance, pattern design, layout, and looks of a product. The protection is granted for a limited period, generally 20 years from the filing date of the application.
55
New cards
TRADE SECRET
any valuable information that is not publicly known (a well-guarded secret)e.g.,. ingredients used in their food products, business methods, customer data. Trade secret protection is not limited in time (patents last in general for up to 20 years).
56
New cards
COPYRIGHT
protects the original work of authorship. Such works are literature, drawings, paintings, songs, music, computer software, films, photos, web content.
57
New cards
TRADEMARK
offers legal protection for logo, design, symbol, phrase, wordmarks, or a combination of those that represents a source of goods or services.
58
New cards
COPYRIGHT INFRIGEMENT
Includes the unauthorized or unlicensed copying of a work subject to copyright.
59
New cards
PLAGIARISM
using someone else's work or ideas without giving proper credit.
60
New cards
COPYRIGHT INFRIGEMENT
❑ Legal term
❑ Civil crime
❑ Unauthorized used of someone else’s creative work
❑ Monetary damage for infringement
61
New cards
PLAGIARISM
❑ Not a legal term
❑ Academic crime
❑ Claiming ownership of someone else’s creative work
❑ Not punishable by government, but may be by academic
62
New cards
FAIR USE
means that an intellectual property
may be used without consent as long as it is
used in Fair Uses of Copyrighted Material.
63
New cards
CONTEXTUALIZED
ONLINE SEARCH & RESEARCH
SKILL
Utilize the Internet as a tool for reliable information gathering and
research to best meet particular class objectives or solve a
situation.
64
New cards
Accuracy
Content is grammatically correct, verifiable and cited when necessary
65
New cards
Author
Defines who created the content, the individual or group’s credential/expertise and
provides contact information
66
New cards
Currency
Information is current & updated frequently
67
New cards
Fairness
Content is balanced, presenting all sides of an issue and
multiple points of view
68
New cards
Relevance
Content is relevant to your topic or research.
69
New cards
Search Engine
are programs that look for documents based from specified keywords and return these documents where the keyword were found
70
New cards
SITE
Use to search with in specific website
71
New cards
PLUS
Use to search pages that contain both words
72
New cards
HYPEN
Use to exclude word or phrases
73
New cards
ASTERISK
Use to fill the missing word or phrases
74
New cards
QUOTATION
Use to search for exact word or phrases.
75
New cards
RANGE
Use to search with in a range of numbers
76
New cards
LINK
Use to search for a page that is link to another page
77
New cards
MICROSOFT WORD
Is a word processor developed by Microsoft.
78
New cards
WORD START SCREEN
From here,
you'll be able to create a new
document, choose
a template, or access
your recently edited
documents.
79
New cards
QUICK ACCESS TOOLBAR
lets you access common
commands no matter which tab is selected.
By default, it includes the Save, Undo, and Redo
commands.
80
New cards
TITLE BAR
This displays the document name followed by a
program name.
81
New cards
THE RIBBON
contains all of the commands
you will need to perform common tasks in Word.
It has multiple tabs (menu bar) each with
several groups of commands.
82
New cards
COMMAND GROUP
Each group contains a series of
different commands. Simply click any command to
apply it. Some groups also have an command
arrow in the bottom-right corner, which you can click
to see even more commands.
83
New cards
RULER
it is located at the top and to the left of your
document. It makes it easier to make indention
alignment and spacing adjustments.
84
New cards
SCROLL BAR
Click, hold, and drag the scroll bar to scroll up
and down through the pages of your document.
85
New cards
ZOOM CONTROL
Click, hold, and drag the slider to use
the zoom control. The number to the right of
the slider bar reflects the zoom percentage.
86
New cards
DOCUMENT VIEWS
Read Mode, Print Layout, Webpage Layout
87
New cards
WORD COUNT
displays the number of
words in your document.
88
New cards
PAGE NUMBER INDICATOR
helps you keep track
of the number of pages your document contains.
89
New cards
BACKSTAGE VIEW
gives you various options for saving,
opening a file, printing, and sharing your document.
90
New cards
READ MODE
displays your document in full-
screen mode.
91
New cards
PRINT LAYOUT
It shows the
document as it would appear if it were printed.