1/31
Vocabulary flashcards covering key ICT evolution periods, cybersecurity terms, Microsoft Word concepts, and design principles discussed in the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Information and Communication Technology (ICT)
The collective term for technologies that facilitate the access, processing, storage, and communication of information.
Pre-mechanical Period (3000 BCE – 1450)
Early era of ICT marked by communication via words and pictograms carved in rocks and the invention of the abacus.
Mechanical Period (1450 – 1840)
ICT era featuring purely mechanical devices such as the Pascaline and Charles Babbage’s Analytical Engine.
Pascaline
A mechanical calculator invented by Blaise Pascal during the Mechanical Period.
Analytical Engine
Charles Babbage’s first programmable mechanical computer; earned him the title “Father of Computers.”
Electromechanical Period (1840 – 1940)
Era in which electrical components merged with mechanical devices; saw the invention of the telegraph and telephone.
Telegraph
The first electrical communications device, invented by Cooke & Wheatstone and Samuel Morse.
Telephone
Voice-communication device invented during the Electromechanical Period, allowing real-time speech across distances.
Electronic Period (1940 – present)
ICT era characterized by fully electronic devices such as ENIAC and the integrated circuit (IC).
ENIAC
Electronic Numerical Integrator and Computer; the first general-purpose electronic computer.
Integrated Circuit (IC)
A miniaturized electronic circuit etched onto a semiconductor, revolutionizing computer design.
ICT Hub of Asia
Nickname given to the Philippines due to its strong ICT industry and high mobile-phone penetration.
World Wide Web (WWW)
A system of interlinked hypertext documents created by Tim Berners-Lee.
Web 1.0
“Read-only” web where users can only view static content created by site owners.
Web 2.0
“Read-write” web enabling users to interact with content and contribute (e.g., Facebook, Twitter, YouTube).
Web 3.0
Emerging “executable” web that processes user requests to deliver intelligent solutions; still developing.
Online Safety
Practices and precautions taken to protect users, devices, and personal data while using the internet.
Phishing
Fraudulent emails masquerading as legitimate sources to trick users into revealing sensitive data.
Pharming
Redirecting users to fake websites by manipulating DNS settings to harvest login credentials.
Internet Scam
Deceptive online scheme intended to defraud users of money or property through false promises.
Internet Bots
Networks of compromised computers (zombies) controlled to perform large-scale malicious acts; countered with CAPTCHA.
Malware
Umbrella term for malicious software such as spyware and adware that installs without user consent.
Virus
Self-replicating program that attaches to legitimate files or programs to spread and damage systems.
Worm
Standalone malware that replicates across networks without attaching to files, often via email or USB.
Trojan Horse
Malware disguised as legitimate software to trick users into installation; commonly called a “Trojan.”
ILOVEYOU Virus
Famous 2000 computer worm from the Philippines that infected 10 million PCs via an email attachment.
Computer Bug
An error causing a system malfunction; term originated from a moth found in the Mark II computer by Grace Hopper.
Cyber Stalking
Harassing or intimidating someone online through persistent unwanted contact or monitoring.
Cyber Bullying
Tormenting, threatening, or embarrassing a person via internet or digital devices.
Spam
Unsolicited bulk email or messages that can be annoying or harmful if interacted with.
Spoofing
Impersonation of a person or organization online to steal information or spread malware.
Computer Ethics
Standards guiding computing professionals in making socially and professionally responsible decisions.