ICT

Cards (121)

  • ICT is “diverse set of technologicaltools and resources used to communicate, create,disseminate, store, and manage.
  • ICT is the study of computers as tools for data processing.
  • The Philippines has been dubbed the “ICT Hub of Asia”
  • The DICT is in charge of developing, planning, and promoting the country's ICT agenda in support of national development.
  • DICT stands for DEPARTMENT OF INFORMATION AND COMMUNICATIONS TECHNOLOGY
  • The DICT shall be the primary policy, planning, coordinating, implementing, and administrative entity of the Executive Branch of the government that will plan, develop, and promote the national ICT development agenda.
  • BPO refers to the process of contracting standard business functions to be handled by a party outside of the company.
  • WWW is an information system on the internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.
  • WWW stands for World Wide Web
  • W3 is an information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet and invented by Tim-Berners Lee.
  • In 1994, Tim Berners-Lee founded the World Wide Web Consortium (W3C) at the Massachusetts Institute of Technology
  • The Web versions are the web 1.0, web 2.0 and web 3.0
  • Web 1.0 - Static Web Page is known as a flat page or stationary age in the sense that the page is ‘’as is’’ and cannot be manipulated by the user.
  • Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages—theuser is able to see a website differently than others.
  • Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, and web applications.
  • Web 2.0 allows users to interact with the page: instead of just reading a page, the user may be able to comment or create a user account.
  • Web 2.0 also allows users to use web browsers instead of just using their operating system. Browsers can now be used for their user interface, application software (or web applications), and even for file storage.
  • Features of Web 2.0 are Folksonomy, Rich User Experience, User participation, Long tail, Software as a services, and Mass Participation.
  • (Web 2.0) Folksonomy - It allows users to categorize and classify/arrange information using freely chosen keywords(tagging).
  • (Web 2.0) Rich User Experience: Content is dynamic and is responsive to user’s input.
  • (Web 2.0) User Participation: The owner of the website is not the only one who is able to put content.
  • (Web 2.0) Long Tail: Services that are offered on demand rather than on a one-time purchase.
  • (Web 2.0) Software As a Services: Users will subscribe to a software only when needed rather than purchasing them.
  • (Web 2.0) Mass Participation: Diverse information sharing through universal web access.
  • Web 3.0 - According to the W3C, “The Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries.”
  • The aim of Web 3.0 is to have machines (or servers) understand the user’s preferences to be able to deliver web content specifically targeting the user.
  • Problems of Web 3.0 are Compatibility, Security, Vastness, Vagueness and Logic
  • (Web 3.0) Compatibility: HTML files and current web browsers could not support Web 3.0.
  • (Web 3.0) Security: The user’s security is also in question since the machine is saving hisor her preferences.
  • (Web 3.0) Vastness: The World Wide Web already contains billions of web pages.
  • (Web 3.0)Vagueness: Certain words are imprecise. The words “old” and “small” would depend on the user.
  • (Web 3.0) Logic: Since machines use logic, there are certain limitations for a computer to be able to predict what the user is referring to at a given time.
  • NETIQUETTE is a made-up word, netiquette is constructed from of the words net and etiquette.
  • Netiquette refers to the standards of behavior for polite and appropriate online conversation. Etiquette for the internet is another name for netiquette. These are suggested politeness guidelines rather than laws.
  • INFORMATION YOU MUSTN’T POSTED ONLINE are Personal Information, Contact Information, Educational Background, Financial Account, Location.
  • THE 10 COMMANDMENTS OF NETIQUETTE:• RULE NO. 1: REMEMBER THE HUMAN• RULE NO. 2: ADHERE TO THE SAME STANDARDS ONLINE THATYOU FOLLOW IN REAL LIFE.• RULE NO. 3: KNOW WHERE YOU ARE IN CYBERSPACE• RULE NO. 4: RESPECT OTHER PEOPLE’S TIME AND BANDWIDTH• RULE NO. 5: MAKE YOURSELF LOOK GOOD ONLINE• RULE NO. 6: SHARE EXPERT KNOWLEDGE• RULE NO. 7: HELP KEEP FLAME WARS UNDER CONTROL• RULE NO. 8: RESPECT OTHER PEOPLE’S PRIVACY• RULE NO. 9: DON’T ABUSE YOUR POWER• RULE NO. 10: BE FORGIVING OF OTHER PEOPLE'S MISTAKE
  • All viruses are malware, but not all types of malware are viruses
  • Virus - type of malware, must be triggered by user and Self-replicating
  • Malware- term for malicious software, any malicious code, harms devices and steals data
  • Malware is any software that is consciously created todisrupt a computer, server, client, or computer network,leak sensitive data, obtain unauthorized access to data orsystems, deny users access to information, orunintentionally compromise a user's computer security andprivacy.