1/46
Vocabulary flashcards covering key ICT concepts, technologies, web evolution, online platforms, mobile systems, emerging tech, netiquette, and cybersecurity threats discussed in the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Information and Communication Technology (ICT)
Collective term for hardware and software technologies that enable people to transmit, process, store, and communicate information.
Digital Native
A person born or raised during the age of digital technology and therefore familiar with computers and the Internet from early childhood.
Hashtag (#)
A symbol used online to categorize or group posts by topic.
Online Platform
A technology base upon which other applications or processes are developed; if you can program on it, it’s a platform.
Online Content
Textual, visual, or aural material—such as text, images, sounds, videos, or animations—encountered by users on websites.
Online Website
A collection of related web pages, usually under one domain name, hosted on at least one web server.
Netiquette
Accepted manners and proper behavior when communicating in the online environment.
Incognito Mode
A browser feature that enables private browsing, though it does not completely hide users from web trackers.
World Wide Web (WWW)
The system that allows access to hypertext documents and files over the Internet, proposed by Tim Berners-Lee in 1989.
Static Web Page (Web 1.0)
A stationary page whose content is fixed and identical for all users; cannot be interacted with or changed by visitors.
Web 2.0
The evolution of the web to dynamic pages that allow user interaction such as commenting, account creation, and content sharing.
Semantic Web (Web 3.0)
A W3C-led movement aiming for machines to understand user preferences to deliver targeted web content quickly.
Compatibility Issue (Web 3.0)
Limitation where current HTML files and browsers do not yet fully support Web 3.0 standards.
Security Issue (Web 3.0)
Risk arising because machines must store user preferences, potentially exposing personal data.
Vastness
A Web 3.0 challenge stemming from the billions of existing web pages on the Internet.
Vagueness
Problem in Web 3.0 where imprecise words like “old” or “small” depend on context and user interpretation.
Logic Limitation
Constraint in Web 3.0 because computers rely on formal logic, which may not capture complex human intent.
Bookmarking Site
Website that lets users store and manage links to various online resources (e.g., Pinterest).
Social News Site
Platform where users post news items or links to other sources (e.g., Reddit, Digg, Quora).
Media Sharing Site
Online service for uploading and sharing images, music, or videos (e.g., YouTube, Instagram, Flickr).
Microblogging
Service focused on short user updates, often limited in length (e.g., Twitter, Tumblr).
Blog
A website or page where individuals regularly post content, opinions, or articles (e.g., WordPress, Blogger).
Forum
Online discussion site where users can post messages and engage in conversations on various topics.
Mobile Technologies
Smartphones and tablets capable of performing tasks once limited to personal computers and accessing high-speed internet.
4G-LTE
Fourth-generation mobile network technology that delivers high-speed wireless Internet.
5G
Fifth-generation mobile network offering faster speeds and lower latency than 4G-LTE.
iOS
Mobile operating system developed by Apple for iPhones and iPads.
Android
Google-developed open-source mobile operating system used by many smartphone manufacturers.
BlackBerry OS
Mobile operating system designed for BlackBerry devices.
Windows Phone OS
Microsoft’s former mobile operating system for smartphones.
Symbian
Early mobile operating system once popular on Nokia devices.
WebOS
Mobile operating system initially created by Palm, later used in smart devices and TVs.
Artificial Intelligence (AI)
Method of making computers, robots, or software think intelligently by mimicking human cognitive processes.
Machine Learning (ML)
AI subfield that enables systems to learn patterns from data for tasks like predictive analytics and language processing.
Robotics
Design, construction, and use of machines (robots) to perform tasks traditionally done by humans, especially repetitive or hazardous work.
Metaverse
Persistent, immersive three-dimensional virtual realm where many users can interact, work, shop, and play in real time.
Malware
General term for malicious software designed to damage, disrupt, or gain unauthorized access to a computer system.
Virus
Malware that replicates itself and spreads to other computers via networks or removable media.
Trojan
Malware disguised as a legitimate program that, once installed, leaves a PC unprotected for hackers.
Rogue Security Software
Type of Trojan that pretends to be legitimate security software and persuades users to pay for false protection.
Spyware
Program that secretly runs in the background to monitor user activity and collect information.
Keylogger
Type of spyware that records a user’s keystrokes to capture emails, messages, or passwords.
Adware
Software that delivers unwanted advertisements to users, often via pop-ups.
Spam
Unwanted or unsolicited email, frequently used to distribute advertisements or malware.
Phishing
Deceptive practice of sending emails or messages to trick users into providing sensitive personal information.
Pharming
Advanced phishing technique that exploits the DNS system to redirect users to fraudulent websites without their knowledge.
Think Before You Click
Guideline urging users to consider the potential impact on themselves and others before posting or sharing content online.