EMTECH

Cards (210)

  • ICT
    Information and Communication Technology - Deals with the use of different communication technologies such as mobile phones, telephone, Internet to locate, save, send and edit information
  • Computer
    An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
  • Internet
    The global system of interconnected computer networks that use the internet protocol suite (TCP/IP) to link billions of devices worldwide
  • World Wide Web
    An information system on the internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another
  • Web page
    A hypertext document connected to the World Wide Web, suitable for the World Wide Web
  • Stages of World Wide Web
    • Web 1.0 - Web pages connected by hyperlinks
    • Web 2.0 - Dynamic pages, user interaction
    • Web 3.0 - Semantic web, machine understanding of user preferences
  • Static web page
    A flat page or stationary page that cannot be manipulated by the user, with the same content for all users (Web 1.0)
  • Dynamic web page
    Web pages that allow the user to see the website differently than others, e.g. social networking sites, wikis, video sharing sites (Web 2.0)
  • Features of Web 2.0
    • Folksonomy - User categorization and classification using keywords
    • Rich User Experience - Dynamic, responsive content
    • User Participation - Users can contribute content
    • Long Tail - On-demand services
    • Software as a Service - Subscription-based software
    • Mass Participation - Diverse information sharing
  • Convergence
    The synergy of technological advancements to work on a similar goal or task
  • Types of Social Media
    • Social Networks - Connect with people with similar interests
    • Bookmarking Sites - Store and manage links
    • Social News - Post and comment on news
    • Media Sharing - Upload and share media content
    • Microblogging - Short updates
    • Blogs and Forums - Post content and comment
  • Mobile Technologies
    The popularity of smartphones and tablets, capable of high-speed internet and performing tasks originally found in PCs
  • Mobile Operating Systems
    • iOS - Used in Apple devices
    • Android - Open source OS developed by Google
    • Blackberry OS
    • Windows Phone OS
    • Symbian - Original smartphone OS
    • WebOS - Used in smart TVs
    • Windows Mobile - Developed by Microsoft
  • Assistive Media
    A non-profit service designed to help people with visual and reading impairments, using a database of audio recordings
  • Cloud Computing
    Distributed computing on the internet or delivery of computing services over the internet, instead of running software on your own computer
  • Types of Clouds
    • Public Cloud - Easily accessible to the general public
    • Private Cloud - Accessible within an organization
    • Community Cloud - Accessible by a group of organizations
    • Hybrid Cloud - Mixture of public and private cloud
  • Netiquette
    Network etiquette, the do's and don'ts of online communication
  • Ten Rules of Netiquette
    • Remember the human
    • Adhere to the same standards online as in real life
    • Know where you are in cyberspace
    • Respect other people's time and bandwidth
    • Make yourself look good online
    • Share expert knowledge
    • Help keep flame wars under control
    • Respect other people's privacy
    • Don't abuse your power
    • Be forgiving of other people's mistakes
  • Security Requirement Triad
    • Confidentiality - Data confidentiality, privacy
    • Integrity - Data integrity, system integrity
    • Availability
  • Threat Consequences
    • Unauthorized Disclosure - Exposure, interception, inference, intrusion
    • Disruption - Incapacitation, corruption, obstruction
    • Deception - Masquerade, falsification, repudiation
    • Usurpation - Misappropriation, misuse
  • Types of System Intruders
    • Masquerader
    • Hackers
    • Clandestine user
  • Parts of a Virus
    • Infection mechanism
    • Trigger
    • Payload
  • Virus Stages
    • Dormant phase
    • Propagation phase
    • Triggering phase
    • Execution phase
  • Cyber crime
    A crime committed or assisted through the use of the Internet
  • Privacy Policy/Terms of Service (ToS)

    Tells the user how the website will handle its data
  • Types of Malware
    • Virus
    • Worms
    • Trojan
    • Spyware
    • Adware
  • Spam
    Unwanted email mostly from bots or advertisers
  • Phishing
    Acquires sensitive personal information like passwords and credit card details
  • Pharming
    A more complicated way of phishing where it exploits the DNS system
  • Copyright
    Part of the law where you have rights to your work, and anyone who uses it without consent is punishable
  • Fair Use
    Means an intellectual property may be used without consent as long as it is for commentary, criticism, parody, research, etc.
  • Keyloggers
    Used to record the keystrokes done by a user, to steal passwords or other sensitive information
  • Rogue security software
    Malicious software that misleads users into believing there is a virus on their computer and manipulates them into paying for a fake malware removal tool
  • Search Strategies
    • Keyword searching
    • Boolean (AND, OR, NOT)
    • Question
    • Advanced
  • In the professional world, sending out information to convey important information is vital. Because of ICT, things are now sent much faster than the traditional newsletters or postal mail.
  • AND
    Joining different topics (i.e. global warming AND California)
  • OR
    Joining similar or synonymous topics (i.e. global warming OR greenhouse effect)
  • NOT
    Searches for the first term and excludes sites that have the second term (i.e. Washington NOT school)
  • Question
    A question may be entered in the search field of search engine
  • Advanced
    Features are offered on many engines by going to an "Advanced search" page and making selections. Effective in narrowing search returns to a specific topic or phrase.