IS117 L1

Cards (53)

  • Digital literacy

    The ability to access, understand, evaluate, and use digital technology effectively. It involves having the skills to navigate the digital world, critically assess digital content, and utilize digital tools for various purposes.
  • Society's reliance on technology has grown significantly due to its convenience and efficiency. Technology is integrated into various aspects of daily life, from communication and work to healthcare and education. People rely on technology for information, entertainment, social interaction, and productivity, shaping modern lifestyles and routines.
  • To protect personal information

    1. Use strong, unique passwords for each online account
    2. Enable two-factor authentication for added security
    3. Be cautious of phishing emails and scam websites
    4. Limit the sharing of personal information on social media
    5. Regularly update security software and applications
    6. Use secure connections (such as VPNs) when accessing sensitive data online
  • Role of technology in the professional world
    • It enhances efficiency, communication, and collaboration. It enables automation of tasks, data analysis, remote work capabilities, and global connectivity. Businesses utilize technology for operations, marketing, customer service, and innovation, leading to increased productivity and competitiveness.
  • To find a career using technology
    1. Use online job search platforms and professional networking sites
    2. Create a strong digital presence with a professional website or LinkedIn profile
    3. Utilize online resources for skill development and career exploration
    4. Attend virtual career fairs and networking events
    5. Consider using career assessment tools and services to identify suitable opportunities
  • Legal and ethical responsibilities of a digital citizen
    • Legal responsibilities include abiding by laws related to data privacy, copyright, cybersecurity, and online behavior. Ethical responsibilities involve practicing digital etiquette, respecting others' rights and privacy, and being mindful of the consequences of online actions. Digital citizens should promote a safe and respectful online environment.
  • Assistive technologies

    Technologies designed to assist individuals with disabilities and improve their quality of life. Examples include screen readers for visually impaired users, voice recognition software for individuals with mobility impairments, communication devices for non-verbal individuals, and sensory aids for those with hearing or sensory impairments. Assistive technologies enhance accessibility, independence, and inclusion for people with diverse needs.
  • Digital literacy
    Acquiring current knowledge and understanding of computers, mobile devices, the web, and related technologies.
  • Digital citizen

    A person familiar with how to use technology to become an educated and productive member of the digital world.
  • Computer
    An electronic device that operates under the control of instructions stored in its memory and can accept and process data to produce information for future use.
  • Memory
    Electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data into information.
  • Internet
    A global collection of millions of computers linked together to share information.
  • Network
    A collection of two or more computers connected to share resources.
  • Wi-Fi
    A wireless data network technology that provides high-speed data connections and is not attached to any device. It is used for mobile devices.
  • Server
    A powerful, high-capacity computer you access using the Internet or other networks; it stores files and "serves" them, that is, makes the files available to users; usually grouped at a location called a data center.
  • Online social network
    An online community where users can share their interests, ideas, stories, photos, music, and videos with other registered users via a social networking website, such as Facebook, Google Plus, Twitter, Instagram, or Snapchat.
  • Big data
    A term that refers to the large and complex data sources that defy easy management with traditional data processing methods.
  • First generation of computers used vacuum tubes cylindrical glass tubes that allow flow of eletron

    • ENIAC (Electronic Numerical Integrator and Computer)
    • UNIVAC (Universal Automatic Computer)
  • Constraints of first generation computers
    • Their large size
    • The amount of power they consumed
    • The heat they generated
    • How quickly they wore out
  • Internet of Things (IoT)
    An environment in which processors are embedded in every product imaginable (things), and these things, in turn, communicate with one another via the Internet or wireless networks. IoT-enabled devices are often referred to as smart devices because of their capability to communicate, locate, and predict.
  • Embedded computer
    A computer that functions as one component in a larger product and has a specific purpose.
  • Uses of IoT
    • Managing devices remotely in your home
    • Monitoring processes and increasing quality in manufacturing
    • Tracking inventory or sending coupons to customers' phones in retail
    • Tracking mileage and location of trucks and monitoring driving times in shipping
    • Connecting to patient's wearable devices, sending prescription updates, and tracking data in healthcare
  • Digital divide
    The gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not.
  • Privacy
    The state or condition of being free from public attention to the degree that you determine.
  • Identity theft
    Using someone's personal information, such as their name, Social Security number, or credit card number, to commit financial fraud.
  • How personal information is stolen
    • Dumpster diving is when someone goes through the trash to find information.
    • Phishing
    • Change of address form
    • Pretexting when someone creates a false scenario or pretext to deceive individuals into providing personal information or data
    • Stealing
    • Data mining -is the process of analyzing large sets of data to discover patterns, trends, and useful information
  • Safeguards to protect privacy
    1. Do not carry a Social Security number in a wallet or write it on a check
    2. Do not provide personal information either over the phone or through an email message
    3. Keep personal information in a secure location in a home or apartment
    4. Give cautious notifications before permitting a website or app request to collect data
    5. Be cautious about what information is posted on social networking sites and who can view your information
    6. Carefully review financial and billing statements each month as soon as they arrive
  • Intelligent workplace
    • Makes use of technology to connect employees to the company's network, communicate with one another, use productivity software and apps, meet via web conferencing, and more.
  • Uses of technology in schools and universities
    • Promoting school events, working cooperatively on group projects, and teaching concepts such as anti-bullying using social networking tools
    • Enabling students to work collaboratively on projects and send the finished assignment to the teacher using online productivity software
    • Using a learning management system to set up web-based training sites where students can check their progress, take practice tests, and exchange messages
  • Mobile health (mHealth)

    Health care professionals using smartphones or tablets to access health records stored on the cloud, and patients using digital devices to monitor their conditions and treatments, thereby reducing the need for visits to the doctor's office.
  • Telemedicine
    The use of telecommunications technology, including secure web-based videoconferencing, to diagnose and treat patients remotely.
  • How to use technology in your job search
    1. Create a professional online presence
    2. Avoid humorous or informal names for your account profiles, blogs, or domain names
    3. Include a photo that shows your best self
    4. Upload a PDF of your resume
    5. Include links to videos, publications, or digital content you have created
    6. Proofread your resume, blog, website, or profile carefully to avoid spelling and grammatical mistakes
  • Telemedicine
    The use of telecommunications technology, including secure web-based videoconferencing, to diagnose and treat patients remotely
  • Professional online presence

    The first thing a recruiter or interviewer will see
  • Online professional networks
    Help you keep up with former coworkers, instructors, potential employers, and others with whom you have a professional connection
  • LinkedIn
    A social networking site designed to provide business and employment-oriented services
  • Creating an online presence
    1. Avoid humorous or informal names
    2. Include a photo that shows your best self
    3. Upload a PDF of your resume
    4. Include links to videos, publications, or digital content you have created
    5. Proofread your resume, blog, website, or profile carefully to avoid spelling and grammatical mistakes
    6. Enable privacy settings on your social media accounts and never post anything online that you would not want a potential employer
  • Netiquette

    The rules of Internet etiquette, including the web, social media, Internet messaging, chat rooms, online discussions, and methods to transfer or store files
  • Digital ethics
    The set of legal and moral guidelines that govern the use of technology, including computers, mobile devices, information systems, and databases
  • Cyberbullying
    A form of bullying that involves digital devices and platforms such as social media sites, online forums, messaging apps, and email