LESSON 1-3 ETECH

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/77

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

78 Terms

1
New cards

Information and Communication Technology (ICT)

Deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc.

2
New cards

WEB 1.0

This web page is static and the page is 'as is' and cannot be manipulated by the user.

3
New cards

Web 2.0

It is the evolution of Web 1.0 by adding dynamic web pages

4
New cards

Web 2.0

A web page that allows users to interact with the page

5
New cards

Web 2.0

The most ideal websites that we visit today

6
New cards

Folksonomy

It allows users to categorize and classify/arrange information using freely chosen keywords (e.g., tagging).

7
New cards

Rich User Experience

Content is dynamic and responsive to the user's input.

8
New cards

Long Tail

Services are offered on demand rather than on a one-time purchase

9
New cards

User Participation

The owner of the website is not the only one who is able to put content.

10
New cards

Software as a Service

Users only subscribe to software when needed.

11
New cards

Mass Participation

It is a diverse information sharing through universal web access.

12
New cards

Compatibility

One of the several problems of Web 3.0 is the HTML files and current web browsers could not support

13
New cards

Security

One of the several problems of web 3.0 is that the user's security is also in question since the machine is saving his or her preferences.

14
New cards

Vastness

The World Wide Web already billions of web pages.(One of the several problems of web 3.0 )

15
New cards

Vagueness

Certain words are imprecise. The words "old" and "small" would depend on the user.

16
New cards

Logic

There are certain limitations for a computer to be able to predict what the user is referring to at a given time.

17
New cards

Convergence

It is the synergy of technological advancements to work on a similar goal or task. (Combined technologies to create another one)

18
New cards

Social Media

It is a website, application, or online channels that enable web users to create, co-create, discuss, modify, and exchange user generate content

19
New cards

Social Networks

A type of social media that these are sites that allows you to connect with other people with the same interests or background

20
New cards

Bookmarking Sites

A type of social media that these are sites that allow you to store and links to various websites and resources.

21
New cards

Social News

A type of social media that these are sites that allow users to post their own news items or links to other news sources.

22
New cards

Media Sharing

these are sites that allow you to upload and share media content like images, music, and video.

23
New cards

Microblogging

A type of social media that those are sites that focus on short updates from the user.

24
New cards

Blogs and Forums

A type of social media that these websites allow users to post their content.

25
New cards

Mobile Technologies

The popularity of smartphones and tablets has taken a major rise over the years.

26
New cards

IOS, Android, Blackberry OS, Windows Phone OS, Symblan, WebOS, Windows Mobile

Kinds of operating system

27
New cards

Assistive Media

It is a nonprofit service designed to help people who have visual impairments.

28
New cards

Rich user experience

It is a website that you can customized the features

29
New cards

Social Networks, Bookmarking Sites, .Social News, Media Sharing, Microblogging, Blogs and Forums

Types of social media

30
New cards

Folksonomy, Rich-user experience, Long tail, user participation software as a service, mass participation,

What are the features of Web 2.0

31
New cards

Compatibility, Security, Vagueness, Vastness, Logic

Several problems of Web 3.0

32
New cards

Convergence, Social Media, Mobile technologies, Assistive media

Trends In ICT

33
New cards

Semantic web

It is a movement led by the World Wide Web Consortium (W3C).

34
New cards

Web 3.0

the aim of this web is to have machines (or servers) understand the user's preferences to be able to deliver web content specifically targeting the user.

35
New cards

W3C

According to them, the Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries.

36
New cards

World wide web consortium

Complete the acronym W3C whose lead the movement of semantic web

37
New cards

Software as a service

This is a cheaper option if you do not always need to use software.

38
New cards

Identify or choose a topic, topic or task definition, identify methods of search, identify resources of your research, make your research strategies, compiling the research results, evaluate the results of your research, create a list of your references for citation.

Steps to make a contextualized online search

39
New cards

Critical thinking

one must be able to verify the raw data obtained from the internet. it is about drawing conclusions to various ideas and arguments.

40
New cards

Critical thinking

also means the ability to digest, reflect, and conclude from the information researched.

41
New cards

Analytical skill

this requires the ability to look, verbalize, conceptualize, and gather data attuned to the context of the subject. and then, apply synthesis, focus, and critical thinking to extract the useful information in the pile of research.

42
New cards

Problem solving capability

the ability to present solutions or solve problems by presenting a decision based on a given information.

43
New cards

Organized data mining

it is a well planned design of the database of all the research materials either inside the computer or hard copies.

44
New cards

Research presentation

the ability to present ideas and draw conclusions from the research, be able to explain in writing the purpose, steps, goals, and objective of the research.

45
New cards

Creativity and developed imagination

it is the ability to look for alternative solutions to the problems needed to solve in the research and thinking not only within the context but also beyond the usual approaches to the research objectives.

46
New cards

Computer literacy

knowledge of the various computer applications and tools when working with large amounts of data helps the researcher to manage the information. skills in the use of software to write, design, and present are also important.

47
New cards

Satirical sites

are websites that report untrue or false stories meant to amuse or entertain.

48
New cards

satirical sites

these sites take their cue from TV shows that report exaggerated news that is untrue but intriguing and funny.

49
New cards

1. If it is too good to be true, then it must be so, 2. if they are from known satirical sites, 3. if the news did not emanate from reliable news sites.

how do detect satirical news?

50
New cards

Give the top sources of satirical news

adobo chronicles, so what's news, eritas times, the professional heckler

51
New cards

Adobo Chronicles (adobochronicles.com)

It is a site that gives the "best source of up

52
New cards

So, what's news?(sowhatsnews.wordpress.com)

It is a site that gives "satirical and fictional news website'

53
New cards

Eritas times (eritastimes.com)

It is a site that "presents the other side of news'

54
New cards

The professional heckler (professionalheckler.wordpress.com)

It is a site where a "heckler" is defined as someone who harasses and tries to disconcert others with questions, and enges. or mockery.

55
New cards

Heckler

it is defined as someone who harasses and tries to disconcert others with questions, and enges. or mockery.

56
New cards

Gives the American satirical sites

the onion, clickhole, christwire global media

57
New cards

Contextual search

it is an attempt to be more precise in providing the list of documents according to the words used by the users to search the internet.

58
New cards

Internet

is a powerful tool, yet internet is one of the most dangerous places, especially if you do not know what you are doing.

59
New cards

Email spam

also known as "junk email". it is usually unsolicited commercial email sent from one source with identical message sent to multiple recipients. it can be used to send malware.

60
New cards

Spammer

person who creates electronic spam

61
New cards

Email spoofing

this refers to deceitful email practice in which the sender address is changed, so that it would appear to have come from a different source usually someone you know.

62
New cards

Phishing

this is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source. it is usually done by email or other similar means using popular entity such as microsoft, yahoo, google, amazon, and financial institutions to lure you to their website.

63
New cards

Pharming

this is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website. the main object of pharming is to obtain username and passwords, as well as credit card and financial information and use this to steal their money electronically or use the credit card of the victims.

64
New cards

Spyware

this is a computer program that is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the user.

65
New cards

Computer worm

this is a dangerous computer program that replicates itself through network. some worms delete files, others disrupt the network function and still, others send junk mail from infected computer.

66
New cards

Trojan horse

this is a form of a malicious software (malware) fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user's consent. once it is installed, it can disable the computer's defenses opening it to unauthorized entry.

67
New cards

Computer virus

this is a program that duplicates itself and then infects the computer. it spreads like a real biological virus, wherein it attaches itself to a host program and infect other computers if it is received by a computer through the internet. this can also be transferred through removable storage.

68
New cards

Hacker

this is a person who is able to enter and control other people's computer without authorization. firewalls are able to prevent entry by hackers.

69
New cards

Security center

it is the place where you can set additional protection from threats to your computer, especially when using the internet.

70
New cards

Firewall

it helps in protecting your computer from unauthorized entries, viruses, or worms from the internet or network. it is recommended that you keep this setting turned on.

71
New cards

Automatic updates

it is another feature of windows which when turned on will automatically download updates from microsoft website. l feature, secure areas of vulnerability, fix any bugs in the operating system, and others.

72
New cards

Virus protection

it is usually about the current antivirus software installed in your computer; this option is recommended to be turned on always.

73
New cards

Ten Commandments for computer ethics

it is meant as a guide to the right attitude when using the computer

74
New cards

Dr. Ramon C. Barquin

Ten Commandments for Computer Ethics It was written by whom?

75
New cards

1992

The Ten Commandments for Computer Ethics was written for the Computer Ethics Institute. In what year?

76
New cards

10 (be honest)

Enumerate the Ten Commandments for Computer Ethics

77
New cards

Copyright infringement

if you create something an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. this is called intellectual property.

78
New cards

Antivirus software

it is meant to locate, find, and remove virus threats that are already in your computer.