Introduction to Information and Communication Technology – Vocabulary

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/46

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key ICT concepts, technologies, web evolution, online platforms, mobile systems, emerging tech, netiquette, and cybersecurity threats discussed in the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

47 Terms

1
New cards

Information and Communication Technology (ICT)

Collective term for hardware and software technologies that enable people to transmit, process, store, and communicate information.

2
New cards

Digital Native

A person born or raised during the age of digital technology and therefore familiar with computers and the Internet from early childhood.

3
New cards

Hashtag (#)

A symbol used online to categorize or group posts by topic.

4
New cards

Online Platform

A technology base upon which other applications or processes are developed; if you can program on it, it’s a platform.

5
New cards

Online Content

Textual, visual, or aural material—such as text, images, sounds, videos, or animations—encountered by users on websites.

6
New cards

Online Website

A collection of related web pages, usually under one domain name, hosted on at least one web server.

7
New cards

Netiquette

Accepted manners and proper behavior when communicating in the online environment.

8
New cards

Incognito Mode

A browser feature that enables private browsing, though it does not completely hide users from web trackers.

9
New cards

World Wide Web (WWW)

The system that allows access to hypertext documents and files over the Internet, proposed by Tim Berners-Lee in 1989.

10
New cards

Static Web Page (Web 1.0)

A stationary page whose content is fixed and identical for all users; cannot be interacted with or changed by visitors.

11
New cards

Web 2.0

The evolution of the web to dynamic pages that allow user interaction such as commenting, account creation, and content sharing.

12
New cards

Semantic Web (Web 3.0)

A W3C-led movement aiming for machines to understand user preferences to deliver targeted web content quickly.

13
New cards

Compatibility Issue (Web 3.0)

Limitation where current HTML files and browsers do not yet fully support Web 3.0 standards.

14
New cards

Security Issue (Web 3.0)

Risk arising because machines must store user preferences, potentially exposing personal data.

15
New cards

Vastness

A Web 3.0 challenge stemming from the billions of existing web pages on the Internet.

16
New cards

Vagueness

Problem in Web 3.0 where imprecise words like “old” or “small” depend on context and user interpretation.

17
New cards

Logic Limitation

Constraint in Web 3.0 because computers rely on formal logic, which may not capture complex human intent.

18
New cards

Bookmarking Site

Website that lets users store and manage links to various online resources (e.g., Pinterest).

19
New cards

Social News Site

Platform where users post news items or links to other sources (e.g., Reddit, Digg, Quora).

20
New cards

Media Sharing Site

Online service for uploading and sharing images, music, or videos (e.g., YouTube, Instagram, Flickr).

21
New cards

Microblogging

Service focused on short user updates, often limited in length (e.g., Twitter, Tumblr).

22
New cards

Blog

A website or page where individuals regularly post content, opinions, or articles (e.g., WordPress, Blogger).

23
New cards

Forum

Online discussion site where users can post messages and engage in conversations on various topics.

24
New cards

Mobile Technologies

Smartphones and tablets capable of performing tasks once limited to personal computers and accessing high-speed internet.

25
New cards

4G-LTE

Fourth-generation mobile network technology that delivers high-speed wireless Internet.

26
New cards

5G

Fifth-generation mobile network offering faster speeds and lower latency than 4G-LTE.

27
New cards

iOS

Mobile operating system developed by Apple for iPhones and iPads.

28
New cards

Android

Google-developed open-source mobile operating system used by many smartphone manufacturers.

29
New cards

BlackBerry OS

Mobile operating system designed for BlackBerry devices.

30
New cards

Windows Phone OS

Microsoft’s former mobile operating system for smartphones.

31
New cards

Symbian

Early mobile operating system once popular on Nokia devices.

32
New cards

WebOS

Mobile operating system initially created by Palm, later used in smart devices and TVs.

33
New cards

Artificial Intelligence (AI)

Method of making computers, robots, or software think intelligently by mimicking human cognitive processes.

34
New cards

Machine Learning (ML)

AI subfield that enables systems to learn patterns from data for tasks like predictive analytics and language processing.

35
New cards

Robotics

Design, construction, and use of machines (robots) to perform tasks traditionally done by humans, especially repetitive or hazardous work.

36
New cards

Metaverse

Persistent, immersive three-dimensional virtual realm where many users can interact, work, shop, and play in real time.

37
New cards

Malware

General term for malicious software designed to damage, disrupt, or gain unauthorized access to a computer system.

38
New cards

Virus

Malware that replicates itself and spreads to other computers via networks or removable media.

39
New cards

Trojan

Malware disguised as a legitimate program that, once installed, leaves a PC unprotected for hackers.

40
New cards

Rogue Security Software

Type of Trojan that pretends to be legitimate security software and persuades users to pay for false protection.

41
New cards

Spyware

Program that secretly runs in the background to monitor user activity and collect information.

42
New cards

Keylogger

Type of spyware that records a user’s keystrokes to capture emails, messages, or passwords.

43
New cards

Adware

Software that delivers unwanted advertisements to users, often via pop-ups.

44
New cards

Spam

Unwanted or unsolicited email, frequently used to distribute advertisements or malware.

45
New cards

Phishing

Deceptive practice of sending emails or messages to trick users into providing sensitive personal information.

46
New cards

Pharming

Advanced phishing technique that exploits the DNS system to redirect users to fraudulent websites without their knowledge.

47
New cards

Think Before You Click

Guideline urging users to consider the potential impact on themselves and others before posting or sharing content online.