Empowerment Technology - Reviewer

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/40

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key terms from the lecture on ICT fundamentals, web evolution, social media types, mobile operating systems, online safety, malware, and advanced search techniques.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

41 Terms

1

Information and Communications Technology (ICT)

The use of various communication technologies—such as mobile phones, telephones, and the internet—to locate, save, send, and edit information.

2

Static Website

A site whose page content is the same for all users; examples include online brochures and portfolios.

3

Dynamic Website

A site that displays varied, interactive content tailored to user actions or preferences; e.g., Facebook, X (Twitter), Instagram.

4

Web 1.0

The early (1990s–2000s) read-only web featuring static pages and minimal user interaction.

5

Web 2.0

The interactive era (2000s–present) introducing dynamic sites, social media, and user-generated content.

6

Folksonomy

User-created tagging or hash-tagging system used to classify and organize information online.

7

Rich-User Experience

Website feature that delivers dynamic, responsive content based on user input (e.g., location-aware search results).

8

User Participation

Feature of Web 2.0 where visitors can add content through comments, reviews, or posts.

9

Mass Participation

Wide public ability to share diverse data via universally accessible online platforms.

10

Web 3.0

Next-generation internet focused on delivering smarter, more relevant search results.

11

Convergence

Synergy of technology allowing multiple tasks on one device (e.g., editing documents on a smartphone).

12

Social Media

Online platforms enabling users to create, share, discuss, and collaborate on content.

13

Social Network

Social-media subtype that connects people with shared interests or backgrounds.

14

Bookmarking Site

Service that lets users save, tag, and manage links for easy sharing and retrieval.

15

Social News Site

Platform where users post news articles or links and vote or comment on stories.

16

Media-Sharing Site

Website for uploading and distributing photos, videos, or music.

17

Microblogging

Service oriented around short user updates visible to subscribers (e.g., X/Twitter).

18

Blogs and Forums

Web spaces where individuals publish articles or start discussions for community input.

19

Media Technologies (Mobile)

Portable tech noted for convenience, size, and practicality—usable almost anywhere.

20

iOS

Apple’s proprietary operating system for iPhone and iPad devices.

21

Android

Google-developed open-source operating system for mobile devices.

22

BlackBerry OS

Operating system designed for BlackBerry smartphones.

23

Windows Phone OS

Closed-source mobile operating system developed by Microsoft.

24

Symbian

Original smartphone operating system once used by Nokia devices.

25

WebOS

Operating system primarily used in smart TVs.

26

Windows Mobile

Microsoft operating system created for early smartphones and pocket PCs.

27

Assistive Media

Non-profit service providing audio or alternative formats for people with visual or reading impairments.

28

Malware

Collective term for malicious software designed to damage data, systems, or gain unauthorized access.

29

Virus (Computer)

Malware that replicates itself and spreads via internet, networks, or storage devices.

30

Worm

Self-propagating malware that transfers between computers by various means without user action.

31

Trojan

Malicious program disguised as legitimate software, giving attackers access once installed.

32

Spyware

Stealth program that monitors user activity—often via key-logging—without consent.

33

Adware

Program that delivers unwanted advertisements, commonly in pop-up form.

34

Spam

Unsolicited email, often sent by bots or advertisers, sometimes used to spread malware.

35

Phishing

Fraudulent attempt to acquire sensitive data (passwords, credit-card details) via deceptive emails and sites.

36

AND Operator

Search keyword that narrows results to include all specified terms.

37

Plus Sign (+)

Placed before a word to mark it as required in search results.

38

OR Operator

Search keyword grouping similar words to broaden results.

39

NOT Operator

Search keyword that excludes specific words from results.

40

Quotation Marks (“ ”)

Search syntax used to find exact phrases.

41

Parentheses ( ) in Search

Symbols used to group words or operators, controlling search-query logic.