Save
ICT1
ICT1
Save
Share
Learn
Content
Leaderboard
Learn
Created by
brix kumburuhz
Visit profile
Cards (16)
Philippines
is considered as the
ICT Hub
of
Asia
BPO
:
Business Process Outsourcing
/ call centers
Makati City
is considered as the
Rank 1 'Selfiest Cities'
around the world while
Cebu
is at
Rank 9
Philippines
is considered the
ICT HUB OF ASIA
BPO
centers (
Call Centers
) are a form of
Business Process Outsourcing
Makati City
is ranked 1 for
'Selfiest Cities'
globally, while
Cebu
is ranked
9
Terminologies:
WWW stands
for
World Wide Web
USB
stands for
Universal Serial Bus
ICT
stands for
Information
and
Communication Technologies
OS
stands for
Operating Systems
Types of Web:
WEB 1.0
is
static
/
flat
/
stationary
and cannot be manipulated by the user
WEB 2.0
allows user
interaction
, commenting, and creating user
accounts
Features of WEB 2.0:
Folksonomy
allows
categorization
using
keywords
Rich User Experience
with
dynamic
and
responsive content
Long Tail
offers
services
on
demand
User Participation
allows others to
contribute content
Software
as a
Service
(SaaS) involves
subscription
rather than
purchase
Mass Participation
enables
diverse information sharing
WEB 3.0
provides a
common framework
for
data
sharing and aims to understand user
preferences
Problems with WEB
3.0
:
Compatibility
issues
with
HTML files
and
current web browsers
Security
concerns
with
stored information
Vastness
of the
WWW
with
billions
of
websites
Vagueness
and
imprecise
definitions
Logic
limitations
for
computers
to
deliver information
Trends in
ICT
:
Convergence
of technologies for a common goal
Social media
for creating, discussing, and modifying content
Mobile Technologies
with capabilities similar to personal computers
Various Mobile Operating Systems
like IOS, Android, Blackberry OS, Windows Phone OS, Symbian, and WebOS
Assistive Media
provides
non-profit services
/
devices
for
people
with
reading
/
hearing impairments
Dangers in the Internet:
Email Spam is unsolicited commercial email
Email Spoofing
changes sender addresses deceptively
Phishing
tricks users into revealing confidential information
Pharming
redirects traffic to fake websites for data theft
Spyware
collects information covertly
Trojan Horse
performs undesirable functions without user consent
Computer Worm
replicates itself exploiting OS weaknesses
Computer Virus
duplicates and transfers through storage devices
Hacker
gains unauthorized access to control computers
Firewalls prevent hacking attempts
Copyright protects intellectual property rights
Copyright Infringement
is the
unlicensed copying
of
work
Plagiarism
is using
someone else's work without credit
Fair Use
includes
limitations
given by
copyright law
Key Factors Evaluating Information:
Accuracy, Author, Currency, Fairness, Relevance
Search Engines use keywords to find and return documents