ICT1

Cards (16)

  • Philippines is considered as the ICT Hub of Asia
  • BPO: Business Process Outsourcing / call centers
  • Makati City is considered as the Rank 1 'Selfiest Cities' around the world while Cebu is at Rank 9
  • Philippines is considered the ICT HUB OF ASIA
  • BPO centers (Call Centers) are a form of Business Process Outsourcing
  • Makati City is ranked 1 for 'Selfiest Cities' globally, while Cebu is ranked 9
  • Terminologies:
    • WWW stands for World Wide Web
    • USB stands for Universal Serial Bus
    • ICT stands for Information and Communication Technologies
    • OS stands for Operating Systems
  • Types of Web:
    • WEB 1.0 is static/flat/stationary and cannot be manipulated by the user
    • WEB 2.0 allows user interaction, commenting, and creating user accounts
  • Features of WEB 2.0:
    • Folksonomy allows categorization using keywords
    • Rich User Experience with dynamic and responsive content
    • Long Tail offers services on demand
    • User Participation allows others to contribute content
    • Software as a Service (SaaS) involves subscription rather than purchase
    • Mass Participation enables diverse information sharing
  • WEB 3.0 provides a common framework for data sharing and aims to understand user preferences
  • Problems with WEB 3.0:
    • Compatibility issues with HTML files and current web browsers
    • Security concerns with stored information
    • Vastness of the WWW with billions of websites
    • Vagueness and imprecise definitions
    • Logic limitations for computers to deliver information
  • Trends in ICT:
    • Convergence of technologies for a common goal
    • Social media for creating, discussing, and modifying content
    • Mobile Technologies with capabilities similar to personal computers
    • Various Mobile Operating Systems like IOS, Android, Blackberry OS, Windows Phone OS, Symbian, and WebOS
  • Assistive Media provides non-profit services/devices for people with reading/hearing impairments
  • Dangers in the Internet:
    • Email Spam is unsolicited commercial email
    • Email Spoofing changes sender addresses deceptively
    • Phishing tricks users into revealing confidential information
    • Pharming redirects traffic to fake websites for data theft
    • Spyware collects information covertly
    • Trojan Horse performs undesirable functions without user consent
    • Computer Worm replicates itself exploiting OS weaknesses
    • Computer Virus duplicates and transfers through storage devices
    • Hacker gains unauthorized access to control computers
  • Firewalls prevent hacking attempts
    • Copyright protects intellectual property rights
    • Copyright Infringement is the unlicensed copying of work
    • Plagiarism is using someone else's work without credit
    • Fair Use includes limitations given by copyright law
  • Key Factors Evaluating Information:
    • Accuracy, Author, Currency, Fairness, Relevance
    • Search Engines use keywords to find and return documents