EmpTech

Subdecks (3)

Cards (148)

  • Technology is the application of scientific knowledge for practical purposes, especially in industry
  • Machinery and equipment are developed from the application of scientific knowledge
  • Dependence on technology has increased
  • Our dependence on technology is likely to increase in the near future
  • ICT stands for Information and Communications Technology
  • It is an extended term of Information Technology (IT)
  • ICT stresses the role of unified communications and the integration of telecommunications, computers, enterprise software, middleware, storage, and audio-visual systems
  • These components enable users to access, store, transmit, and manipulate information
  • Coined to differentiate the First stage of the World Wide Web (www) from the present stage of internet technology
  • Webpages were static and called read-only web
  • Only available feedback mechanism was private emails
  • Users can interact, contribute, and create their own internet space and content
  • Coined by Time Berners-Lee as the read-write-execute web
  • Semantic web or data-driven web content and response
  • User search context is processed by a programming language to present options based on user interests
  • Evolution of technological developments merging into a new system with different types of applications and media
  • Collection of internet-based communication tools and channels for users to interact, communicate, and share information in a virtual community and network
  • Range of handheld devices like mobile phones, tablets, e-readers, and game consoles used as personal, interactive, Internet-enabled, and user-controlled portable platforms for exchanging information
  • Nonprofit organization founded in 1996 in Michigan, USA by David H. Harvey
  • First internet-based reading service for persons with visual and reading impairments
  • Produces and publishes voice-recorded written materials on cassettes, CDs, and the internet
  • Examples of Assistive technologies include magnifiers, talking devices, Braille displays, screen reading software, text-to-speech systems using OCR, large print materials, and phones with large tactile buttons
  • Online Safety:
    • Practices and precautions to ensure safety when using the internet
    • Delinquencies that can be committed online: stalking, identity theft, privacy violations, harassment
  • Online Safety Measures:
    • Never give personal information over the internet
    • Do not give banking or sensitive information unless sure of a reputable business with a secure service
    • Check for "https://" in the website address for a secure network
    • Avoid accessing accounts through email links
    • Never open messages or attachments from unknown sources
    • Regularly review privacy settings
    • Delete browsing data on public computers
    • Keep software updated
    • Avoid downloading unknown software
  • Types of Threats:
    • Phishing: email from a criminal to gather sensitive information
    • Pharming: malicious website to gather usernames and passwords
    • Internet Scam: misleading scams to cheat targets
    • Malware: spyware and adware to gather private information without permission
    • Adware: delivers advertisements
    • Spyware: spies on user activity without their knowledge
  • Virus & Worm:
    • Virus: replicates by attaching to other programs or files
    • Worm: injected into a network through various means
    • Trojan Horse: disguises as a normal file to install malware
    • Iloveyou Virus: infected millions of computers in 2000, created by Onel De Guzman and Reonel Ramones
  • Other Types of Threats:
    • Computer Bug
    • Cyber Stalking
    • Cyber Bullying
    • Cyber Harassment
    • Spam
    • Spoofing
  • Netiquette:
    • Rules and norms for acceptable online behavior
  • Computer Ethics:
    • Concerned with professional and social conduct in computing
  • Privacy:
    • Refers to the right of individuals to restrict information collection and use
  • Authentication:
    • Process of verifying user identity
    • Four common authentication methods: user identification, possessed objects, biometric device, callback system
  • User Identification
    • Possessed Objects
    • Biometric Device
  • Keyboard shortcuts:
    • Ctrl+A: Select all text
    • Ctrl+B: Bold text
    • Ctrl+C: Copy text
    • Ctrl+D: Open font formatting window
    • Ctrl+E: Center text
    • Ctrl+F: Find a phrase
    • Ctrl+G: Go to a specific page
    • Ctrl+H: Replace text with another text
    • Ctrl+I: Italicize text
    • Ctrl+J: Justify text
    • Ctrl+K: Open insert hyperlink window
    • Ctrl+L: Left align text
    • Ctrl+M: Indent a paragraph from the left
    • Ctrl+N: Open new document or file
    • Ctrl+O: Open an existing document or file
  • Keyboard shortcuts:
    • Ctrl+P: Print a document
    • Ctrl+Q: Remove paragraph formatting
    • Ctrl+R: Right align text
    • Ctrl+S: Save the document or file
    • Ctrl+T: Create a hanging indent
    • Ctrl+U: Underline selected text
    • Ctrl+V: Paste any text or object that has been copied
    • Ctrl+W: Close open tab in a browser or a document in Word
    • Ctrl+X: Cut text or object
    • Ctrl+Y: Redo any undo action
    • Ctrl+Z: Undo any action
  • Online search is the process of interactively searching and retrieving requested information via computer databases that are online or by using the internet
  • URL stands for Universal Resource Locator, which is the address of a worldwide web page or website
  • Definition of a database: a structured set of data held in a computer, especially one that is accessible in various ways
  • Keyboard shortcuts:
    • Ctrl+P: Print a document
    • Ctrl+Q: Remove paragraph formatting
    • Ctrl+R: Right align text
    • Ctrl+S: Save the document or file
    • Ctrl+T: Create a hanging indent
    • Ctrl+U: Underline selected text
    • Ctrl+V: Paste any text or object that has been copied
    • Ctrl+W: Close open tab in a browser or a document in Word
    • Ctrl+X: Cut text or object
    • Ctrl+Y: Redo any undo action
    • Ctrl+Z: Undo any action
  • Vocabulary List:
    • Online Search: the process of interactively searching and retrieving requested information via computer databases that are online or by using the Internet
    • URL: Universal Resource Locator; the address of a World Wide Web page or website
    • Smartphone: a mobile phone that performs many computer functions, typically having a touchscreen interface, Internet access, and an operating system capable of running downloaded applications
    • Database: a structured set of data held in a computer, especially one that is accessible in various ways
  • Vocabulary List:
    • Copyright: the exclusive legal right given to an originator, an assignee, or an authorized other to print, publish, perform, film, or record a literary, artistic, or music material
    • Copyright Infringement: a violation of copyright law; the use of works protected by copyright law without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder
    • Fair Use: refers to the limitation of copyright; intellectual property may be used without consent as long as it is used in commentaries, criticisms, search engines, parodies, news reports, research, library archiving, teaching, and in education