emtech

Subdecks (2)

Cards (78)

  • Information and Communication Technology (ICT)

    Deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send and edit information
  • Web 1.0
    When the World Wide Web was invented, most web pages were static. Static (also known as flat page or stationary page) in the sense that the page is "as is" and cannot be manipulated by the user. The content is also the same for all users.
  • Web 2.0
    The evolution of Web 1.0 by adding dynamic web pages—the user is able to see a website differently than others. Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, and web applications.
  • Web 2.0
    • Allows users to interact with the page: instead of just reading a page, the user may be able to comment or create a user account
    • Allows users to use web browsers instead of just using their operating system. Browsers can now be used for their user interface, application software (or web applications), and even for file storage
  • Most websites that we visit today are Web 2.0
  • Folksonomy
    Allows users to categorize and classify/arrange information using freely chosen keywords (e.g., tagging). Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with the pound sign (#). This is also referred to as hashtag.
  • Rich User Experience
    • Content is dynamic and is responsive to user's input. An example would be a website that shows local content. In the case of social networking sites, when logged on, your account is used to modify what you see in their website.
  • Long Tail
    Services are offered on demand rather than on a one-time purchase. In certain cases, timebased pricing is better than file-size-based pricing or vice versa. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent in the Internet, or a data plan that charges you for the amount of bandwidth you used.
  • User Participation
    • The owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comment, reviews, and evaluation. Some websites allow readers to comment on an article, participate in a poll, or review a specific product (e.g., Amazon.com, online stores).
  • Software as a Service
    Users will subscribe to a software only when needed rather than purchasing them. This is a cheaper option if you do not always need to use a software. For instance, Google Docs is a free web-based application that allows the user to create and edit word processing and spreadsheet documents online.
  • Mass Participation
    It is a diverse information sharing through universal web access. Since most users can use the Internet, Web 2.0's content is based on people from various cultures.
  • Web 3.0 and the Semantic Web
    The Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries. The aim of Web 3.0 is to have machines (or servers) understand the user's preferences to be able to deliver web content specifically targeting the user.
  • Problems of Web 3.0
    • Compatibility: HTML files and current web browsers could not support Web 3.0
    • Security: The user's security is also in question since the machine is saving his or her preferences
    • Vastness: The World Wide Web already contains billions of web pages
    • Vagueness: Certain words are imprecise. The words "old" and "small" would depend on the user
    • Logic: Since machines use logic, there are certain limitations for a computer to be able to predict what the user is referring to at a given time
  • Convergence
    Technological convergence is the synergy of technological advancements to work on a similar goal or task.
  • Social Media
    A website, application, or online channels that enable web users to create, co-create, discuss, modify, and exchange user-generated content.
  • Types of Social Media
    • Social Networks
    • Bookmarking Sites
    • Social News
    • Media Sharing
    • Micro blogging
    • Blogs and Forums
  • Mobile Technologies

    The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices' capability to do tasks that were originally found in personal computers.
  • Kinds of Operating Systems
    • iOS
    • Android
    • Blackberry OS
    • Windows Phone OS
    • Symbian
    • WebOS
    • Windows Mobile
  • Assistive Media
    A nonprofit service designed to help people who have visual and reading impairments. A database of audio recordings is used to read to the user.
  • Online safety, security, and rules of netiquette
    Importance of staying safe online
  • Most of us are 'connected' via our laptops, mobile phones, tablets or personal computer
  • The potential for the internet to be a valuable and a fun resource for entertainment, making friends, keeping in touch and learning is huge
  • If you use the internet, you could be at risk of illegal activity or abuse - be it bullying, fraud or something more serious
  • On the net, people aren't always what they first seem
  • It is important to learn how to stay safe online, as these are skills that will stay with you for life
  • Some golden rules for online safety
    • Don't give out personal information such as your address or phone number
    • Don't send pictures of yourself to anyone, especially indecent pictures
    • Don't open emails or attachments from people you don't know
    • Don't become online 'friends' with people you don't know
    • Never arrange to meet someone in person who you've met online
    • If anything you see or read online worries you, tell someone about it
  • Social networking websites and apps

    Websites and apps such as Facebook, MySpace, Instagram, Viber, Tumblr, SnapChat, Ask.fm and Twitter have become incredibly popular in recent years
  • Most users of social networking sites are genuine, but because it is so easy to hide your real identity, it is possible to come into contact with people you would normally avoid
  • Privacy risks on social networking
    • People might say things on a status update / post / tweet they would never say face to face
    • People might give out personal information about themselves or others (including photos) that they would normally keep private
  • Cyberbullying
    • Cyberbullying can work in the same way as bullying in the playground; the victim feels frightened and alone, while the bully tries to hide from being caught
    • Comments, images and videos about a person can be posted online causing the victim to feel frightened and upset
    • It is even possible for cyber bullies to hack into the victim's personal accounts and harass them from within their own user profile
    • Often cyber bullies feel braver because they can't be seen, but it can be the most traceable form of bullying because there's evidence that it's happened
    • Sometimes people who wouldn't normally bully might do so online
  • Cyberstalking
    • Harassment on the internet can be just as frightening as other forms of stalking
    • Women and girls are usually the victims of this kind of behavior
    • It can begin when a purely online friendship turns sour
    • It can even begin entirely at random, by one online stranger towards another
  • Identity theft
    • The more information you make available online, the greater the risk of identity theft
    • Personal information includes your email address, any banking information, phone number, photos of yourself, and postal address
    • The consequences of fraud can be huge, including stolen money, crimes that could put you or your parents in danger, and crimes that you or your parents could get into trouble for
  • Spam
    • Spam is usually considered to be electronic junk mail or junk newsgroup postings
    • Spam eats up a lot of network bandwidth
    • There are many organizations and individuals who have taken it upon themselves to fight spam with a variety of techniques, but there is really little that can be done to prevent spam
  • Phishing
    • The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft
    • Phishing emails will typically direct the user to visit a website where they are asked to update personal information, such as a password, credit card, social security, or bank account numbers, that the legitimate organization already has
    • The website, however, is bogus and will capture and steal any information the user enters on the page
    • Phishing emails are blindly sent to thousands, if not millions of recipients, counting on a percentage of people who actually have an account with the legitimate company being spoofed
  • Virus
    • A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes
    • Viruses can also replicate themselves
    • All computer viruses are manmade
    • A simple virus that can make a copy of itself over and over again is relatively easy to produce
    • An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems
    • Since 1987, when a virus infected ARPANET, many antivirus programs have become available to periodically check your computer system for the best-known types of viruses
    • A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs
  • Adware
    • Adware is the common name used to describe software that is given to the user with advertisements embedded in the application
    • Adware is considered a legitimate alternative offered to consumers who do not wish to pay for software
    • If you're using legitimate adware, when you stop running the software, the ads should disappear, and you always have the option of disabling the ads by purchasing a registration key
    • Another use of the phrase adware is to describe a form of spyware that collects information about the user in order to display advertisements in the Web browser
  • Malware
    • Malware refers to software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse
    • Types of malware include spyware, keyloggers, computer viruses or worms, and financial malware designed to scan a computer system for information related to financial transactions
    • The standard protection from malware is anti-malware — software tools and programs designed to identify, remove and prevent malicious software from infecting computer systems or electronic devices
  • If you have an e-address, at some point you might receive a message from someone you don't know, which could be selling something, sending an attachment, a virus, or abusive/explicit content
  • The golden rule is, if the email is from someone you don't know, delete it
  • You can avoid unwanted emails by getting the right software, which is something for an adult to sort out, but you might know more about it than them already, so help them out