E-TECH

Subdecks (2)

Cards (251)

  • Type of information
    • Shared
    • Not shared
  • Online safety
    • How many checks you have for shared
    • How many checks you have for not shared
    • How safe are you when using the internet
  • Online safety
    • Refers to the safety of people and their information when using the internet
    • Refers to the practices and precautions that should be observed when using the internet to ensure that the users as well as their computers and personal information are safe from crimes associated using the internet
  • Online safety measures
    • Use Strong Passwords and Enable Two-Factor Authentication (2FA)
    • Keep Software and Devices Updated
    • Be Cautious with Emails and Phishing Attempts
    • Practice Safe Browsing Habits
    • Protect Personal Information
    • Use Secure Wi-Fi Connections
  • Online security
    Relate to not only internet, often involving browser security and the World Wide Web, but also network security as it applies to other applications or operating systems
  • Security Requirement Triad (CIA Triad)
    • Confidentiality
    • Integrity
    • Availability
  • Types of system intruders
    • Masquerader
    • Hacker
    • Clandestine User
  • Parts of virus
    • Infection Mechanism
    • Trigger
    • Payload
  • Virus stages
    • Dormant Phase
    • Propagation Phase
    • Triggering Phase
    • Execution Phase
  • Netiquette
    Network etiquette, the do's and don'ts of online communication
  • Ten rules of netiquette
    • Remember the human
    • Adhere to the same standards online that you follow in real life
    • Know where you are in cyberspace
    • Respect other people's time and bandwidth
    • Make yourself look good online
    • Share expert knowledge
    • Help keep flame wars under control
    • Respect other people's privacy
    • Don't abuse your power
    • Be forgiving of other people's mistake
  • Web 1.0
    Web pages are static and not interactive. You can't post comments or create an account.
  • Examples of Websites in Web 1.0
    • Static websites without interactivity
  • Web 2.0
    Term used to describe the present generation of the World Wide Web that concentrates on its capability of providing people the means to collaborate and share information online.
  • Web 2.0
    • Dynamic Website
    • The content of the website changes
    • Interactive - The user may be able to comment or create user account
    • Enables an increased user participation in the web
  • Folksonomy
    Allows users to categorize and classify/arrange information using freely chosen keywords (e.g., tagging)
  • Rich User Experience
    Content is dynamic and is responsive to user's input
  • User Participation
    The owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comment, reviews, and evaluation.
  • Web 2.0
    Term coined by information architecture consultant in 1999 article "Fragmented Future", popularized by Tim O'Reilly and Dale Dougherty in 2004
  • Features of Web 2.0
    • Folksonomy - allows users to categorize and classify/arrange information using freely chosen keywords (e.g. tagging)
    • Rich User Experience - content is dynamic and responsive to user's input
    • User Participation - users can contribute content, not just the website owner
    • Software as a Service - users subscribe to software only when needed rather than purchasing
    • Mass Participation - diverse information sharing through universal web access
  • Web 3.0
    Also called Semantic Web, aims to have machines understand user preferences to deliver targeted web content
  • Semantics - ability of Web technologies to understand and interpret human-generated content
  • The Internet is able to predict the best possible answers to your question by learning from your previous choices
  • Trends in ICT
    • Convergence - combination of different technologies into a new single device
    • Social Media - websites/apps that enable user-generated content
    • Mobile Technologies - rise of smartphones and tablets
    • Assistive Media - nonprofit service to help people with visual and reading impairments
  • Social Media Types
    • Social Networks - sites that allow you to connect with others with same interests/background (e.g. Facebook, Google+)
    • Bookmarking Sites - sites that allow you to store and manage links (e.g. StumbleUpon, Pinterest)
    • Social News - sites that allow users to post news items/links (e.g. reddit, digg)
    • Media Sharing - sites that allow you to upload and share media content (e.g. Flickr, YouTube, Instagram)
    • Microblogging - sites that focus on short updates (e.g. Twitter, Plurk)
    • Blogs and Forums - sites that allow users to post content (e.g. Blogger, WordPress, Tumblr)
  • Mobile Operating Systems
    • iOS - used in Apple devices
    • Android - open source OS developed by Google
    • Blackberry OS
    • Windows Phone OS - closed source OS developed by Microsoft
    • Symbian - original smartphone OS used by Nokia
    • WebOS - used for smartTVs
    • Windows Mobile - developed by Microsoft for smartphones and pocket PCs
  • Assistive Media
    Nonprofit service to help people with visual and reading impairments, using a database of audio recordings
    • Software as a Service - users subscribe to software only when needed rather than purchasing
    • Mass Participation - diverse information sharing through universal web access
  • Masquerader - are individuals or entities who gain unauthorized access to a computer system by pretending to be someone else. This often involves using stolen or forged credentials, such as usernames and passwords, to disguise their identity and appear as legitimate users
  • Hacker is someone who gains unauthorized access to computer systems or networks.
  • Clandestine users are individuals who access a computer system without proper authorization while attempting to remain hidden or undetected
  • The infection mechanism of malware is the method it uses to enter and spread within a computer system.
  • The trigger, also known as the activation mechanism or event, is the condition or event that prompts the malware to execute its malicious actions
  • The payload is the actual malicious code or set of actions that the malware carries out once activated
  • ICT
    Information and Communication Technology, deals with the use of different communication technologies such as mobile phones, telephone, Internet to locate, save, send and edit information, is a study of computers as data processing tools, introduces students to the fundamentals of using computer systems in an internet environment
  • Philippines is dubbed as the "ICT Hub of Asia" because of the huge growth of ICT-related jobs, one of which is BPO (Business Process Outsourcing) or call centers
  • The ICT Department in the Philippines is responsible for the planning, development and promotion of the country's information and communications technology (ICT) agenda in support of national development
  • Computer
    An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
  • Internet
    A worldwide system of computer networks- a network of networks in which the users at any one computer can get information from any other computer