The document provides a review of key points for a midterm examination on Information and Communication Technology (ICT). It covers topics such as the definition of ICT, the evolution of the World Wide Web from Web 1.0 to 3.0, trends in ICT including social media and mobile technologies, internet threats like malware and phishing, and copyright infringement. Rules of online etiquette and safety are also summarized, including tips for protecting one's reputation online.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
168 views
Pointers To Review For Midterm Examination
The document provides a review of key points for a midterm examination on Information and Communication Technology (ICT). It covers topics such as the definition of ICT, the evolution of the World Wide Web from Web 1.0 to 3.0, trends in ICT including social media and mobile technologies, internet threats like malware and phishing, and copyright infringement. Rules of online etiquette and safety are also summarized, including tips for protecting one's reputation online.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5
Pointers to review for Midterm Examination
Lesson 1: Introduction to Information and Communication
Technology Information and Communication Technology (ICT) – deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send and edit information. Time Magazine’s – “The Selfiest Cities around the World” of 2013 places two cities from the Philippines in the top 1 and top 9 spots. The study was conducted using Instagram, a popular photo sharing application. Internet – is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide. World Wide Web – Is an information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet. Invented by Tim Berners-Lee. Web 1.0 – is a web page that classified as flat or stationary. Web 2.0 – Allows users to interact with the page, the user may be able to comment or create a user account. Most websites that we visit today are Web 2.0. Web 3.0 – The aim of Web 3.0 is to have machines understand the user’s preferences to be able to deliver web content specifically targeting the user. Features of 2.0 Folksonomy – it allows users to categorize and classify/arrange information using freely chosen keywords (e.g. “tagging”). Rich User Experience – dynamic content that is responsive to user input (e.g. a user can “click” on an image to enlarge it or find out more information). User Participation – the owner of website is not the only one who is able to put content. Others are able to place a content on their own by means of comments, reviews, and evaluation. Long Tail Service – services that are offered on demand rather than on a one-time purchase. Software as a Service – users will subscribe to a software only when needed rather than purchasing them. Mass Participation – it is a diverse information sharing through universal web access. Trends in ICT Convergence – is the combination of two or more different entities of technologies to create a new single device. And a synergy of technological advancements to work on a similar goal or task. Social Media – it is a website, application, or online channel that enables web users to create, co-create, modify, and exchange user-generated content. Types of Social Media 1. Social Networks – sites that allow you to connect with other people with same interests or background. Examples: Facebook, Google+ 2. Bookmarking Sites – sites that allow users to store and manage links to various websites and resources. Examples: StumbleUpon, Pinterest 3. Social News – sites that allow users to post their own news items or links to others news sources. Examples: reddit, dig 4. Media Sharing – sites that allow you to upload and share media content like images, music, and video. Examples: Flickr, YouTube, and Instagram 5. Microblogging – sites that focus on short updates from the user. Those who are subscribed will receive updates. Examples: Twitter, Plurk 6. Blogs and Forums – sites that allow users to post their content. Examples: Blogger, WordPress, and Tumblr
Mobile Technologies - The popularity of smartphones and tablets has taken
a major rise over the years. This is largely because of the devices’ capability to do tasks that were originally found in personal computers. Latest mobile devices use 4G Networking LTE, which is the fastest mobile network. Different types of Mobile Operating Systems: 1.iOS – used in Apple devices such as the iPhone and iPad. 2.Android – an open source operating system developed by Google. 3.Blackberry OS – used in blackberry devices. 4.Windows Phone OS – a closed source and proprietary operating system developed by Microsoft. 5. Symbian – the original smartphone OS used by Nokia devices. 6. Web OS – originally used for smartphones; now used for smartTVs. 7. Windows Mobile – developed by Microsoft for smartphones and pocket PCs. Assistive Media - It is a nonprofit service designed to help people who have visual and reading impairments.
Lesson 2: Rules of Netiquette
Netiquette – The correct or acceptable way of communicating on the Internet or showing manners and etiquette on the Internet. The Internet is defined as the information superhighway. Tips to Stay Safe Online 1. Be mindful of what you share online and what site you share it to. 2. Do not just accept terms and conditions; read it. 3. Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile. 4. Do not share your password with anyone. 5. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode will NOT protect you from hackers. 6. Do not talk to strangers whether online or face-to-face. 7. Never post anything about a future vacation. It is similar to posting, “Rob my house at this date”. 8. Add friends you know in real life. 9. Avoid visiting untrusted websites. 10. Install and update an antivirus software on your computer. Use only one antivirus software to avoid conflicts. 11. If you have Wi-Fi at home, make it private network by adding a password. 12. Avoid downloading anything from untrusted websites. 13. But the software, do not use pirated ones. 14. Do not reply or click links from suspicious emails. 15. Make Online Purchases from Secure Sites Internet Threats Malware – or malicious software, is any program or file that is harmful to a computer user. Virus – a malicious program designed to replicate itself and transfer from one computer to another (internet, local networks, FDs, CDs, etc.). Worm – a malicious program that transfers from one computer to another by any type of means. Also computer to spread itself. Example: ILOVEYOU Worm - The malware originated in the Pandacan neighborhood of Manila in the Philippines on May 5, 2000. Created by a Filipino which is ONEL DE GUZMAN. Trojan – a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. Spyware – a program that runs in the background without you knowing it (thus called “spy”). The ability to monitor what you are currently doing and typing through keylogging. Example: Keylogger – used to record keystrokes done by the user. This is done to steal their password or any other sensitive information. The key logger software typically uses log file to store its recording. Adware – a program designed to send you advertisements, mostly as popups. Spam – Unwanted email mostly from bots or advertisers. It can be used to send malware. Ransomware – or ransom software is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. Phishing – its goal is to acquire sensitve personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card or personal information. Pharming – A more complicated way or phishing where it exploits the DNS (Domain Name Service) system. Protecting Reputations Online Before your post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate. COPYRIGHT INFRINGEMENT An idea or an invention , a form of literary work or a research you have the right as to how is should be used by others. This called intellectual property. It is the use of works protected by copyright law without permission for a usage where such permission is required. CRIMINAL COPYRIGHT INFRINGEMENT The act of privacy mainly for financial gain. In late 2014, the number one pirate website is “ThePirateBay”. Example: Movies, music, games, books, and other pirated software.