EMTECH REVIEWER

Cards (119)

  • Information and communication technologies (ICT)
    A tool for curating, contextualizing, collaborating, and creating content and experiences for learning in the professional tracks
  • ICT components
    • Computers
    • Internet
    • Broadcasting technologies
    • Telephony
  • The Philippines is dubbed as the ICT Hub of Asia because of the huge growth of ICT related jobs, one of which is Business Process Outsourcing, or call centers
  • Business Process Outsourcing started in the Philippines with Accenture in 1992 thanks to Frank Holz the Partner responsible for developing and marketing the first Global Resource Center in Manila
  • ICT in the Context of Global Communication

    • Generations of the Internet
    • The Current State
  • ICT supports many industries
  • Industries supported by ICT
    • Science and Research
    • Engineering and Architecture
    • Advertising
    • Teaching and Education
    • Analyzing Business
  • Search engine
    A computer program to find answers to queries in a collection of information, which might be a library catalog or a database but is most commonly the World Wide Web
  • A Web search engine produces a list of "pages"—computer files listed on the Web—that contain or relate to the terms in a query entered by the user into a field called a search bar
  • Search engines
    • Google
    • Microsoft Bing
    • Yahoo
    • Baidu
    • DuckDuckGo
    • Ask.com
    • AOL.com
    • Internet Archive
    • Ecosia
  • Social media platforms
    • Facebook
    • Twitter
    • LinkedIn
    • YouTube
    • Pinterest
  • Chart it! Interview your seatmate regarding the time spent in using social media. Then, create a pie graph to show the reports.
  • Chart it! Observe and Analyze the picture. Then, create a pie graph using the data below.
  • Internet Safety
    Refers to the online security or safety of people and their information when using internet
  • Netiquette
    Combination of the words network and etiquette and is defined as a set of rules for acceptable online behavior
  • Ten Rules of Netiquette
    • Rule no. 1: Remember the human
    • Rule no. 2: Adhere to the same standards online that you follow in real life
    • Rule no. 3: Know where you are in cyberspace
    • Rule no. 4: Respect other people's time and bandwidth
    • Rule no. 5: Make yourself look good online
    • Rule no. 6: Share expert knowledge
    • Rule no. 7: Help keep flame wars under control
    • Rule no. 8: Respect other people's privacy
    • Rule no. 9: Don't abuse your power
    • Rule no. 10: Be forgiving of other people's mistake
  • Rule 1: Remember the Human
    • You need to remember that you are talking to a real person when you are online
    • The internet brings people together who would otherwise never meet
    • Remember this saying when sending an email: Would I say this to the person's face
  • Rule 2: Adhere to the same standards online that you follow in real life

    • You need to behave the same way online that you do in real life
    • You need to remember that you can get caught doing things you should not be doing online just like you can in real life
    • You are still talking to a real person with feelings even though you can't see them
  • Rule 3: Know where you are in cyberspace
    • Always take a look around when you enter a new domain when surfing the web
    • Get a sense of what the discussion group is about before you join it
  • Rule 4: Respect other people's time and bandwidth
    • Remember people have other things to do besides read your email. You are not the center of their world
    • Keep your post and emails to minimum by saying what you want to say
    • Remember everyone won't answer your questions
  • Rule 5: Make yourself look good online

    • Be polite and pleasant to everyone
    • Always check your spelling and grammar before posting
    • Know what you are talking about and make sense saying it
  • Rule 6: Share expert knowledge
    • Ask questions online
    • Share what you know online
    • Post the answers to your questions online because someone may have the same question you do
  • Rule 7: Help keep flame wars under control
    • Netiquette does not forgive flaming
    • Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down
  • Rule 8: Respect other people's privacy
    • Do not read other people's mail without their permission
    • Going through other people's things could cost you, your job or you could even go to jail
    • Not respecting other people's privacy is a bad netiquette
  • Rule 9: Don't abuse your power
    • Do not take advantage of other people just because you have more knowledge or power than them
    • Treat others as you would want them to treat you if the roles were reversed
  • Rule 10: Be forgiving of other people's mistake
    • Do not point out mistakes to people online
    • Remember that you were once the new kid on the block
    • You still need to have a good manners even though you are online and cannot see the person face to face
  • Internet Threats
    • SPAM
    • PHISHING
    • MALWARE
  • SPAM
    Unwanted email mostly from advertisers
  • PHISHING
    Its goal is to acquire sensitive personal information like passwords and credit card details
  • Types of Phishing
    • Spear
    • Whaling
    • Smishing
    • Vishing
  • MALWARE
    Stands for Malicious Software, any program or file that is harmful to a computer user
  • Internet Threats
    • ILOVEYOU (2000) computer worm, spreading thru email, Love-Letter-For-You.txt.vbs
    • Code Red (2001) – Microsoft IIs Server software
    • My Doom (2004) – email targeting government, business across the globe
    • CryptoLocker (2013) - malicious software encrypted the files on a victim's computer demanded a ransom for the decryption key
    • WannaCry (2017) – attacking Microsoft Windows for ransom payments in the Bitcoin cryptocurrency
  • Kinds of Malware
    • VIRUS
    • WORM
    • TROJAN
    • SPYWARE
    • KEYLOGGER
    • ADWARE
  • VIRUS
    A malicious executable code attached to another executable file which can be harmless or can modify or delete data
  • WORM
    A form of malware that replicates itself and can spread to different computers via Network
  • TROJAN
    A malicious program that is disguised as a useful program but once downloaded or installed , leaves your PC unprotected and allows hacker to get you information
  • SPYWARE
    Software that ruins in the background without you knowing it
  • KEYLOGGERS
    Used to record the keystroke done by the user
  • ADWARE
    A program designed to send you advertisements, mostly a pop-ups
  • How can you be smart about online safety, especially nowadays where social media plays a big role in our society?