1/22
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
ICT
refers to a set of concepts, resources, and tools that, when combined, allow people and organizations to create, access, retrieve, send, process, share, and exchange information.
ICT originated
from the creation of the first computers, which were made to compute and solve problems involving vast amounts of data such as the census.
Mobile Technolog
is a technology that goes wherever the user goes."
Social Media
This refers to websites and software applications that allow users to share information and content such as photos, videos, music, events, and opinions to a virtual community in real time
Social Networking Sites (SNS)
Virtual communities where users interact with individuals or groups who share common interests.
Social Bookmarking Sites
Websites that allow users to search, organize, save, and share web content such as articles, photos, and videos.
Social Review Sites
Platforms where users can post reviews and ratings about businesses, products, or services.
Media Sharing Platforms
Websites used for storing and sharing media content.
Blogging
A webpage that contains informational or personal posts by a user
Microblogging
Allows users to post short messages online.
Assistive Technology
Software programs or product systems designed to help people with disabilities.
Artificial Intelligence (AI)
The simulation of human intelligence in machines.
Web 1.0
Also known as static or stationary webpages
Web 2.0
Also called dynamic webpages.
Web 3.0
Also known as the Semantic Web.
Malware (Malicious Software)
Programs designed to damage computers and make systems vulnerable to attacks.
Worms
Exploit software vulnerabilities or flaws.
Can infect the entire system once they enter
Computer Viruses
Spread through infected executable files (.exe).
Commonly downloaded from unknown or unsafe sources.
Trojan Horses
Appear helpful or legitimate (e.g., ads or software).
Cause harm once installed.
Ransomware
Restricts access to files by encrypting them.
Files can only be recovered after paying a ransom (often in cryptocurrency)
Adware
Displays unwanted and irrelevant advertisements.
Often seen as pop-ups on unsecured websites or online games.
Spyware
Runs secretly in the background.
Steals personal and confidential information (e.g., usernames and passwords)