Empowerment Technology – 1st Quarter / 1st Semester

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/31

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key ICT evolution periods, cybersecurity terms, Microsoft Word concepts, and design principles discussed in the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

32 Terms

1
New cards

Information and Communication Technology (ICT)

The collective term for technologies that facilitate the access, processing, storage, and communication of information.

2
New cards

Pre-mechanical Period (3000 BCE – 1450)

Early era of ICT marked by communication via words and pictograms carved in rocks and the invention of the abacus.

3
New cards

Mechanical Period (1450 – 1840)

ICT era featuring purely mechanical devices such as the Pascaline and Charles Babbage’s Analytical Engine.

4
New cards

Pascaline

A mechanical calculator invented by Blaise Pascal during the Mechanical Period.

5
New cards

Analytical Engine

Charles Babbage’s first programmable mechanical computer; earned him the title “Father of Computers.”

6
New cards

Electromechanical Period (1840 – 1940)

Era in which electrical components merged with mechanical devices; saw the invention of the telegraph and telephone.

7
New cards

Telegraph

The first electrical communications device, invented by Cooke & Wheatstone and Samuel Morse.

8
New cards

Telephone

Voice-communication device invented during the Electromechanical Period, allowing real-time speech across distances.

9
New cards

Electronic Period (1940 – present)

ICT era characterized by fully electronic devices such as ENIAC and the integrated circuit (IC).

10
New cards

ENIAC

Electronic Numerical Integrator and Computer; the first general-purpose electronic computer.

11
New cards

Integrated Circuit (IC)

A miniaturized electronic circuit etched onto a semiconductor, revolutionizing computer design.

12
New cards

ICT Hub of Asia

Nickname given to the Philippines due to its strong ICT industry and high mobile-phone penetration.

13
New cards

World Wide Web (WWW)

A system of interlinked hypertext documents created by Tim Berners-Lee.

14
New cards

Web 1.0

“Read-only” web where users can only view static content created by site owners.

15
New cards

Web 2.0

“Read-write” web enabling users to interact with content and contribute (e.g., Facebook, Twitter, YouTube).

16
New cards

Web 3.0

Emerging “executable” web that processes user requests to deliver intelligent solutions; still developing.

17
New cards

Online Safety

Practices and precautions taken to protect users, devices, and personal data while using the internet.

18
New cards

Phishing

Fraudulent emails masquerading as legitimate sources to trick users into revealing sensitive data.

19
New cards

Pharming

Redirecting users to fake websites by manipulating DNS settings to harvest login credentials.

20
New cards

Internet Scam

Deceptive online scheme intended to defraud users of money or property through false promises.

21
New cards

Internet Bots

Networks of compromised computers (zombies) controlled to perform large-scale malicious acts; countered with CAPTCHA.

22
New cards

Malware

Umbrella term for malicious software such as spyware and adware that installs without user consent.

23
New cards

Virus

Self-replicating program that attaches to legitimate files or programs to spread and damage systems.

24
New cards

Worm

Standalone malware that replicates across networks without attaching to files, often via email or USB.

25
New cards

Trojan Horse

Malware disguised as legitimate software to trick users into installation; commonly called a “Trojan.”

26
New cards

ILOVEYOU Virus

Famous 2000 computer worm from the Philippines that infected 10 million PCs via an email attachment.

27
New cards

Computer Bug

An error causing a system malfunction; term originated from a moth found in the Mark II computer by Grace Hopper.

28
New cards

Cyber Stalking

Harassing or intimidating someone online through persistent unwanted contact or monitoring.

29
New cards

Cyber Bullying

Tormenting, threatening, or embarrassing a person via internet or digital devices.

30
New cards

Spam

Unsolicited bulk email or messages that can be annoying or harmful if interacted with.

31
New cards

Spoofing

Impersonation of a person or organization online to steal information or spread malware.

32
New cards

Computer Ethics

Standards guiding computing professionals in making socially and professionally responsible decisions.