1/77
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Information and Communication Technology (ICT)
Deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc.
WEB 1.0
This web page is static and the page is 'as is' and cannot be manipulated by the user.
Web 2.0
It is the evolution of Web 1.0 by adding dynamic web pages
Web 2.0
A web page that allows users to interact with the page
Web 2.0
The most ideal websites that we visit today
Folksonomy
It allows users to categorize and classify/arrange information using freely chosen keywords (e.g., tagging).
Rich User Experience
Content is dynamic and responsive to the user's input.
Long Tail
Services are offered on demand rather than on a one-time purchase
User Participation
The owner of the website is not the only one who is able to put content.
Software as a Service
Users only subscribe to software when needed.
Mass Participation
It is a diverse information sharing through universal web access.
Compatibility
One of the several problems of Web 3.0 is the HTML files and current web browsers could not support
Security
One of the several problems of web 3.0 is that the user's security is also in question since the machine is saving his or her preferences.
Vastness
The World Wide Web already billions of web pages.(One of the several problems of web 3.0 )
Vagueness
Certain words are imprecise. The words "old" and "small" would depend on the user.
Logic
There are certain limitations for a computer to be able to predict what the user is referring to at a given time.
Convergence
It is the synergy of technological advancements to work on a similar goal or task. (Combined technologies to create another one)
Social Media
It is a website, application, or online channels that enable web users to create, co-create, discuss, modify, and exchange user generate content
Social Networks
A type of social media that these are sites that allows you to connect with other people with the same interests or background
Bookmarking Sites
A type of social media that these are sites that allow you to store and links to various websites and resources.
Social News
A type of social media that these are sites that allow users to post their own news items or links to other news sources.
Media Sharing
these are sites that allow you to upload and share media content like images, music, and video.
Microblogging
A type of social media that those are sites that focus on short updates from the user.
Blogs and Forums
A type of social media that these websites allow users to post their content.
Mobile Technologies
The popularity of smartphones and tablets has taken a major rise over the years.
IOS, Android, Blackberry OS, Windows Phone OS, Symblan, WebOS, Windows Mobile
Kinds of operating system
Assistive Media
It is a nonprofit service designed to help people who have visual impairments.
Rich user experience
It is a website that you can customized the features
Social Networks, Bookmarking Sites, .Social News, Media Sharing, Microblogging, Blogs and Forums
Types of social media
Folksonomy, Rich-user experience, Long tail, user participation software as a service, mass participation,
What are the features of Web 2.0
Compatibility, Security, Vagueness, Vastness, Logic
Several problems of Web 3.0
Convergence, Social Media, Mobile technologies, Assistive media
Trends In ICT
Semantic web
It is a movement led by the World Wide Web Consortium (W3C).
Web 3.0
the aim of this web is to have machines (or servers) understand the user's preferences to be able to deliver web content specifically targeting the user.
W3C
According to them, the Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries.
World wide web consortium
Complete the acronym W3C whose lead the movement of semantic web
Software as a service
This is a cheaper option if you do not always need to use software.
Identify or choose a topic, topic or task definition, identify methods of search, identify resources of your research, make your research strategies, compiling the research results, evaluate the results of your research, create a list of your references for citation.
Steps to make a contextualized online search
Critical thinking
one must be able to verify the raw data obtained from the internet. it is about drawing conclusions to various ideas and arguments.
Critical thinking
also means the ability to digest, reflect, and conclude from the information researched.
Analytical skill
this requires the ability to look, verbalize, conceptualize, and gather data attuned to the context of the subject. and then, apply synthesis, focus, and critical thinking to extract the useful information in the pile of research.
Problem solving capability
the ability to present solutions or solve problems by presenting a decision based on a given information.
Organized data mining
it is a well planned design of the database of all the research materials either inside the computer or hard copies.
Research presentation
the ability to present ideas and draw conclusions from the research, be able to explain in writing the purpose, steps, goals, and objective of the research.
Creativity and developed imagination
it is the ability to look for alternative solutions to the problems needed to solve in the research and thinking not only within the context but also beyond the usual approaches to the research objectives.
Computer literacy
knowledge of the various computer applications and tools when working with large amounts of data helps the researcher to manage the information. skills in the use of software to write, design, and present are also important.
Satirical sites
are websites that report untrue or false stories meant to amuse or entertain.
satirical sites
these sites take their cue from TV shows that report exaggerated news that is untrue but intriguing and funny.
1. If it is too good to be true, then it must be so, 2. if they are from known satirical sites, 3. if the news did not emanate from reliable news sites.
how do detect satirical news?
Give the top sources of satirical news
adobo chronicles, so what's news, eritas times, the professional heckler
Adobo Chronicles (adobochronicles.com)
It is a site that gives the "best source of up
So, what's news?(sowhatsnews.wordpress.com)
It is a site that gives "satirical and fictional news website'
Eritas times (eritastimes.com)
It is a site that "presents the other side of news'
The professional heckler (professionalheckler.wordpress.com)
It is a site where a "heckler" is defined as someone who harasses and tries to disconcert others with questions, and enges. or mockery.
Heckler
it is defined as someone who harasses and tries to disconcert others with questions, and enges. or mockery.
Gives the American satirical sites
the onion, clickhole, christwire global media
Contextual search
it is an attempt to be more precise in providing the list of documents according to the words used by the users to search the internet.
Internet
is a powerful tool, yet internet is one of the most dangerous places, especially if you do not know what you are doing.
Email spam
also known as "junk email". it is usually unsolicited commercial email sent from one source with identical message sent to multiple recipients. it can be used to send malware.
Spammer
person who creates electronic spam
Email spoofing
this refers to deceitful email practice in which the sender address is changed, so that it would appear to have come from a different source usually someone you know.
Phishing
this is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source. it is usually done by email or other similar means using popular entity such as microsoft, yahoo, google, amazon, and financial institutions to lure you to their website.
Pharming
this is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website. the main object of pharming is to obtain username and passwords, as well as credit card and financial information and use this to steal their money electronically or use the credit card of the victims.
Spyware
this is a computer program that is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the user.
Computer worm
this is a dangerous computer program that replicates itself through network. some worms delete files, others disrupt the network function and still, others send junk mail from infected computer.
Trojan horse
this is a form of a malicious software (malware) fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user's consent. once it is installed, it can disable the computer's defenses opening it to unauthorized entry.
Computer virus
this is a program that duplicates itself and then infects the computer. it spreads like a real biological virus, wherein it attaches itself to a host program and infect other computers if it is received by a computer through the internet. this can also be transferred through removable storage.
Hacker
this is a person who is able to enter and control other people's computer without authorization. firewalls are able to prevent entry by hackers.
Security center
it is the place where you can set additional protection from threats to your computer, especially when using the internet.
Firewall
it helps in protecting your computer from unauthorized entries, viruses, or worms from the internet or network. it is recommended that you keep this setting turned on.
Automatic updates
it is another feature of windows which when turned on will automatically download updates from microsoft website. l feature, secure areas of vulnerability, fix any bugs in the operating system, and others.
Virus protection
it is usually about the current antivirus software installed in your computer; this option is recommended to be turned on always.
Ten Commandments for computer ethics
it is meant as a guide to the right attitude when using the computer
Dr. Ramon C. Barquin
Ten Commandments for Computer Ethics It was written by whom?
1992
The Ten Commandments for Computer Ethics was written for the Computer Ethics Institute. In what year?
10 (be honest)
Enumerate the Ten Commandments for Computer Ethics
Copyright infringement
if you create something an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. this is called intellectual property.
Antivirus software
it is meant to locate, find, and remove virus threats that are already in your computer.