0% found this document useful (0 votes)
168 views

Pointers To Review For Midterm Examination

The document provides a review of key points for a midterm examination on Information and Communication Technology (ICT). It covers topics such as the definition of ICT, the evolution of the World Wide Web from Web 1.0 to 3.0, trends in ICT including social media and mobile technologies, internet threats like malware and phishing, and copyright infringement. Rules of online etiquette and safety are also summarized, including tips for protecting one's reputation online.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
168 views

Pointers To Review For Midterm Examination

The document provides a review of key points for a midterm examination on Information and Communication Technology (ICT). It covers topics such as the definition of ICT, the evolution of the World Wide Web from Web 1.0 to 3.0, trends in ICT including social media and mobile technologies, internet threats like malware and phishing, and copyright infringement. Rules of online etiquette and safety are also summarized, including tips for protecting one's reputation online.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Pointers to review for Midterm Examination

Lesson 1: Introduction to Information and Communication


Technology
 Information and Communication Technology (ICT) – deals with the use
of different communication technologies such as mobile phones, telephone,
Internet, etc. to locate, save, send and edit information.
 Time Magazine’s – “The Selfiest Cities around the World” of 2013 places
two cities from the Philippines in the top 1 and top 9 spots. The study was
conducted using Instagram, a popular photo sharing application.
 Internet – is the global system of interconnected computer networks that
use the Internet protocol suite (TCP/IP) to link billions of devices
worldwide.
 World Wide Web – Is an information space where documents and other
web resources are identified by URLs, interlinked by hypertext links, and
can be accessed via the Internet. Invented by Tim Berners-Lee.
 Web 1.0 – is a web page that classified as flat or stationary.
 Web 2.0 – Allows users to interact with the page, the user may be able to
comment or create a user account. Most websites that we visit today are
Web 2.0.
 Web 3.0 – The aim of Web 3.0 is to have machines understand the user’s
preferences to be able to deliver web content specifically targeting the user.
Features of 2.0
 Folksonomy – it allows users to categorize and classify/arrange information
using freely chosen keywords (e.g. “tagging”).
 Rich User Experience – dynamic content that is responsive to user input
(e.g. a user can “click” on an image to enlarge it or find out more
information).
 User Participation – the owner of website is not the only one who is able to
put content. Others are able to place a content on their own by means of
comments, reviews, and evaluation.
 Long Tail Service – services that are offered on demand rather than on a
one-time purchase.
 Software as a Service – users will subscribe to a software only when
needed rather than purchasing them.
 Mass Participation – it is a diverse information sharing through universal
web access.
Trends in ICT
 Convergence – is the combination of two or more different entities of
technologies to create a new single device. And a synergy of technological
advancements to work on a similar goal or task.
 Social Media – it is a website, application, or online channel that enables
web users to create, co-create, modify, and exchange user-generated content.
Types of Social Media
1. Social Networks – sites that allow you to connect with other people with
same interests or background.
Examples: Facebook, Google+
2. Bookmarking Sites – sites that allow users to store and manage links to
various websites and resources.
Examples: StumbleUpon, Pinterest
3. Social News – sites that allow users to post their own news items or links to
others news sources.
Examples: reddit, dig
4. Media Sharing – sites that allow you to upload and share media content like
images, music, and video.
Examples: Flickr, YouTube, and Instagram
5. Microblogging – sites that focus on short updates from the user. Those who
are subscribed will receive updates.
Examples: Twitter, Plurk
6. Blogs and Forums – sites that allow users to post their content.
Examples: Blogger, WordPress, and Tumblr

 Mobile Technologies - The popularity of smartphones and tablets has taken


a major rise over the years. This is largely because of the devices’ capability
to do tasks that were originally found in personal computers. Latest mobile
devices use 4G Networking LTE, which is the fastest mobile network.
Different types of Mobile Operating Systems:
1.iOS – used in Apple devices such as the iPhone and iPad.
2.Android – an open source operating system developed by Google.
3.Blackberry OS – used in blackberry devices.
4.Windows Phone OS – a closed source and proprietary operating system
developed by Microsoft.
5. Symbian – the original smartphone OS used by Nokia devices.
6. Web OS – originally used for smartphones; now used for smartTVs.
7. Windows Mobile – developed by Microsoft for smartphones and pocket
PCs.
 Assistive Media - It is a nonprofit service designed to help people who have
visual and reading impairments.

Lesson 2: Rules of Netiquette


 Netiquette – The correct or acceptable way of communicating on the
Internet or showing manners and etiquette on the Internet.
 The Internet is defined as the information superhighway.
Tips to Stay Safe Online
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Know the security features of the social networking site you use. By keeping
your profile private, search engines will not be able to scan your profile.
4. Do not share your password with anyone.
5. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or
private) mode will NOT protect you from hackers.
6. Do not talk to strangers whether online or face-to-face.
7. Never post anything about a future vacation. It is similar to posting, “Rob
my house at this date”.
8. Add friends you know in real life.
9. Avoid visiting untrusted websites.
10. Install and update an antivirus software on your computer. Use only one
antivirus software to avoid conflicts.
11. If you have Wi-Fi at home, make it private network by adding a password.
12. Avoid downloading anything from untrusted websites.
13. But the software, do not use pirated ones.
14. Do not reply or click links from suspicious emails.
15. Make Online Purchases from Secure Sites
Internet Threats
 Malware – or malicious software, is any program or file that is harmful to a
computer user.
 Virus – a malicious program designed to replicate itself and transfer from
one computer to another (internet, local networks, FDs, CDs, etc.).
 Worm – a malicious program that transfers from one computer to another
by any type of means. Also computer to spread itself.
Example: ILOVEYOU Worm - The malware originated in the Pandacan
neighborhood of Manila in the Philippines on May 5, 2000. Created by a
Filipino which is ONEL DE GUZMAN.
 Trojan – a malicious program that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hackers to
get your information.
 Spyware – a program that runs in the background without you knowing it
(thus called “spy”). The ability to monitor what you are currently doing and
typing through keylogging.
Example: Keylogger – used to record keystrokes done by the user. This is
done to steal their password or any other sensitive information. The key
logger software typically uses log file to store its recording.
 Adware – a program designed to send you advertisements, mostly as
popups.
 Spam – Unwanted email mostly from bots or advertisers. It can be used to
send malware.
 Ransomware – or ransom software is a type of malicious software from
cryptovirology that threatens to publish the victim's data or perpetually block
access to it unless a ransom is paid.
 Phishing – its goal is to acquire sensitve personal information like
passwords and credit card details. This is done by sending you an email that
will direct the user to visit a website and be asked to update his/her
username, password, credit card or personal information.
 Pharming – A more complicated way or phishing where it exploits the DNS
(Domain Name Service) system.
Protecting Reputations Online
 Before your post something on the web, ask these questions to yourself:
Would you want your parents or grandparents to see it? Would you want
your future boss to see it?
 If you feel that a post can affect you or other’s reputation, ask the one who
posted it to pull it down or report it as inappropriate.
COPYRIGHT INFRINGEMENT
 An idea or an invention , a form of literary work or a research you have the
right as to how is should be used by others. This called intellectual property.
 It is the use of works protected by copyright law without permission for a
usage where such permission is required.
CRIMINAL COPYRIGHT INFRINGEMENT
 The act of privacy mainly for financial gain. In late 2014, the number one
pirate website is “ThePirateBay”.
Example: Movies, music, games, books, and other pirated software.

Type of Test
 Multiple Choice (50 pts.)

Prepared by:
Sampaga, Paulo A.
ICT Teacher

You might also like