Unit 2 ICT

Cards (47)

  • TECHNOLOGY TRENDS AWARENESS -As a talent, technological trend awareness refers to being aware of technology that has lately become popular and is widely recognized in the market or industry.
  • Social Networks:
    • Sites that allow you to connect with other people with the same interests or background
    • Users can set up a profile, add people, share content, etc
    • Examples include Facebook, Twitter, and Instagram
  • Bookmarking Sites:
    • Sites that allow you to store and manage links to various websites and resources
    • Users can create tags for organization
    • Examples include Pinterest, Google, and Reddit
  • Social News:
    • Sites that allow users to post their own news items or links to other news sources
    • Users can comment on posts and comments may be ranked
    • Examples include CNN, BBC, Apple News, and Google News
  • Media Sharing:
    • Sites that allow users to upload and share media content like images, music, and video
    • Examples include TikTok, YouTube, and Spotify
  • Blogs and Forums:
    • Allow users to post their content and others can comment on the topic
    • Examples include Tumblr, WordPress, and Evernote
  • ASSISTIVE TECHNOLOGY -Piece of equipment, software program, or product system, this equipment helps people especially those with disability to increase, to improve and, to maintain their functional capabilities.
  • COLLABORATIVE PLATFORMS -The goal of a collaborative platform is to facilitate communication and interpersonal contact in corporate project work. It is a virtual workspace where resources and tools are centralized.
  • CONVERGENT TECHNOLOGY -An extension of the term convergence, which means “coming together” of two or more separate technologies/ Synergy of technological advancements to work on a similar goal or task. A convergence is when two or more distinct things come together.
  • MOBILE TECHNOLOGY -The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the device's capability to do tasks that were originally found in personal computers.
  • SOCIAL MEDIA -Are computer-mediated tools that allow people or companies to create, share or exchange information, career interest, ideas and even pictures and videos in virtual communities and networks.
  • The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment. But like most things in this world, there is always “another side of the coin.” The Internet is one of the most dangerous places, especially if you do not know what you are doing.
  • The goal of internet safety, also known as online safety, cyber safety, and E-Safety, is to minimize a user's ignorance of the security hazards to their personal safety and property associated with using the internet as well as to protect themselves from computer crime.
  • A made-up word, netiquette is constructed from the words net and etiquette. Thus, netiquette refers to the standards of behavior for polite and appropriate online conversation. Etiquette for the internet is another name for netiquette. These are suggested politeness guidelines rather than laws.
  • Internet Threats -Web-based threats, or online threats, are a category of cybersecurity risks that may cause an undesirable event or action via the internet . Web threats are made possible by end-user vulnerabilities, web service developers/operators, or web services themselves.
  • Malware is any software that is consciously created to disrupt a computer, server, client, or computer network, leak sensitive data, obtain unauthorized access to data or systems, deny users access to information, or unintentionally compromise a user's computer security and privacy.
  • A Trojan Horse Virus is a form of malware that installs into a computer pretending to be a reliable application. In order to try and access consumers' systems, an attacker will frequently utilize social engineering to conceal malicious malware in genuine applications.
  • Rogue security software is a type of malicious software and online fraud that tricks consumers into thinking their computer has a virus and tries to persuade them to pay for a phony malware removal program that in fact installs malware on their computer. It is a type of ransomware as well as scareware, which uses fear to control users. Since 2008, malicious security software has posed a significant security risk to desktop computers. SpySheriff and its clones were a primitive example that became infamous.
  • Worm -After infiltrating a system, a computer worm is a subset of Trojan horse malware that may spread or self-replicate from one computer to another without human activation.
  • Spyware -Malicious software, often known as malware, such as spyware, is placed on a computer without the end user's knowledge. It intrudes, takes private information and internet usage data, and then passes it to third parties like advertising, data companies, or other users. This type of malware is hard to detect.
  • Keylogger -The act of secretly recording the keys pressed on a keyboard such that the person using it is unaware that their actions are being watched is known as keystroke logging, also known as keylogging or keyboard capture. The person running the logging program can then get the data.
  • Adware, commonly referred to as advertising-supported software, makes money for its creators by displaying banner ads on your screen, typically inside of a web browser. Although it is frequently made for desktops, adware can also be discovered on mobile devices. Some types of adware are extremely manipulative and provide a backdoor for dangerous software.
  • Spam -Malspam is an abbreviation for "malware spam" or "malicious spam," which refers to spam messages that include malware. When readers open an email attachment or click on a link, they often download malware such as keyloggers, ransomware, Trojan horses, bots, info-stealers, cryptominers, spyware, and Trojans.
  • Phishing emails can carry worms in corrupt attachments or malicious links
  • Spear-phishing involves targeted attempts that can carry dangerous malware like ransomware crypto worms
  • Networks -Worms can self-replicate across networks via shared access
  • Security Holes -Some worm variants can infiltrate a system by exploiting software vulnerabilities
  • File Sharing -P2P file networks can carry malware like worms
  • Social Networks -Social platforms like MySpace have been affected by certain types of worms
  • Instant Messengers -All types of malware, including worms, can spread through text messages and IM platforms such as Internet Relay Chat (IRC)
  • External Devices -Worms can infect USB sticks and external hard drives
  • Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The most well-known types are copyrights, patents, trademarks, and trade secrets.
  • Intellectual property rights are the rights granted to individuals over their creative works. They often grant the inventor exclusive rights to utilize his or her creation for a set length of time.
  • COPYRIGHT -(also known as author's right) is a legal phrase that describes the rights that authors and artists have over their literary and artistic creations. The time limit should be equal to or longer than 50 years after the creator’s death. Longer periods of protection may however be provided at the national level.
  • TRADE SECRET -are intellectual property (IP) rights on confidential information which may be sold or licensed. Trade secret protection is not limited in time (patents last in general for up to 20 years). It may continue indefinitely as long as the secret is not revealed to the public;
  • TRADEMARK -is a sign capable of distinguishing the goods or services of one enterprise from those of other enterprises. A word or a combination of words, letters, and numerals can perfectly constitute a trademark. But trademarks may also consist of drawings, symbols, three-dimensional features.
  • PATENT -is an exclusive right granted for an invention, which is a product or a process that provides, in general, a new way of doing something, or offers a new technical solution to a problem. To get a patent, technical information about the invention must be disclosed to the public in a patent application. The protection is granted for a limited period, generally 20 years from the filing date of the application.
  • COPYRIGHT INFRINGEMENT -A copyrighted work is generally considered to have been violated when it is copied, distributed, performed, publicly displayed, or transformed into a derivative work without the owner's consent.
  • Plagiarism is using someone else's work or ideas without giving proper credit.
  • Fair Use means that an intellectual property may be used without consent as long as it is used in Fair Uses of Copyrighted Material