You are on page 1of 6

ICT Reviewer

1st Semester, 1st Quarter


11-STEM | PROF. Gilliane | SEM 1 2022

Software As a Services - users will


subscribe to a software only when needed
The Current State of ICT
rather than purchasing them.
Technologies
Mass Participation - diverse information
sharing through universal web access.
According to Blurton 1999, Information
and Communication Technology (ICT) is Web 3.0 - According to W3C, “the
defined as “diverse set of technological semantic web provides a common
tools and resources used to communicate, framework that allows data to be shared
create, disseminate, store, and manage. and reused across application, enterprise,
and community boundaries”
ICT - is the study of computers as tools for
data processing. Several Problems of Web 3.0:
Compatibility - HTML files and current web
“ICT Hub of Asia” - Philippines browsers could not support Web 3.0.
Security - the user’s security is also in
World Wide Web - information system on question since the machine is saving his
the internet that allows documents to be or her preferences.
connected to other documents by Vastness - The WWW already contains
hypertext links, enabling the user to billions of web pages.
search for information by moving from one Vagueness - certain words are imprecise.
document to another. Logic - since machines use logic, there
are certain limitations for a computer to be
Web 1.0 - refers to the first stage in the able to predict what the user is referring to
WWW, which was entirely made up of the at a given time.
Web pages connected by hyperlinks.
Technology Trends Awareness - being
Static Web Page - flat page or stationary aware of technology that has lately
age in the sense that the page is “as is” become popular and is widely recognized
and cannot be manipulated by the user. in the market or industry.

Web 2.0 - evolution of Web 1.0 by adding ASSISTIVE TECHNOLOGY - piece of


dynamic web pages – the user is able to equipment, software program, or product
see a website differently than others. system, this equipment helps people
especially those with disability to increase,
Examples of Web 2.0: to improve and, to maintain their functional
● social networking capabilities.
● sites
● blogs Examples:
● wikis Mobility Aids - wheelchairs, scooters,
walkers, canes, crutches, prosthetic
Features of Web 2.0: devices, and orthodontic devices.
Folksonomy - allows users to categorize Hearing Aids - to help people hear or hear
and classify/arrange information using more clearly.
freely chosen keywords (tagging) Computer software and hardware - voice
Rich User Experience - content is dynamic recognition programs, screen readers, and
and is responsive to user’s input. screen enlargement applications, to help
User Participation - owner of the website people with mobility and sensory
is not the only one who is able to put impairments use computers and mobile
content. devices.
Long Tail - services that are offered on Tools - automatic page turners, book
demand rather than on a one-time holders, and adapted pencil grips to help
purchase.

1
ICT Reviewer
1st Semester, 1st Quarter
11-STEM | PROF. Gilliane | SEM 1 2022

learners with disabilities participate in assistant (among other things) into one
educational activities. device.
Closed Captioning - allow people with Artificial Intelligence: AI is when
hearing problems to watch movies,
machines seem to be “intelligent.”
television programs, and other digital
media. The Internet of Things: IoT is when
Physical modifications in the built physical devices, also called connected
environment - ramps, grab bars, and wider devices or smart devices, have electronics
doorways to enable access to buildings, implanted in them that give them the
businesses, and workplaces. ability to link to the Internet.
Adaptive switches and utensils - allow MOBILE TECHNOLOGY - The popularity
those with limited motor skills to eat, play of smartphones and tablets has taken a
games and accomplish other activities. major rise over the years.
Devices and features of devices - To help
perform tasks such as cooking, dressing,
and grooming; specialized handles and Examples:
grips, devices that extend reach, and ■ Android: Developed by
lights on telephones and doorbells are a Google.
few examples. ■ Blackberry OS: Developed by
Blackberry use in blackberry
COLLABORATIVE PLATFORM - The devices
goal of a collaborative platform is to ■ Firefox OS: Collaborative
facilitate communication and interpersonal project by Firefox for
contact in corporate project work. smartphones
■ KaiOS: For feature phones
Examples: ■ iOS: Developed by Apple, use
Video Conferences: Zoom, Skype, in apple devices such as
Discord, Google Meet, Microsoft Teams iPhone and iPad
■ Symbian: The original
Office Suites: Google Work Space, smartphone OS. Used by
Microsoft Office 365, Adobe Creative Nokia devices
Cloud ■ Web OS: Originally used in
smartphones, now in smart
Online Games: Mobile Legends Bang
TVs.
Bang, League of Legends, DOTA,
■ Windows Phone OS: A closed
Genshin impact
source and proprietary
Educations: Canvas, Edmodo, Google operating system developed by
Classroom Microsoft.

CONVERGENT TECHNOLOGY - An SOCIAL MEDIA - Are computer-mediated


extension of the term convergence, which tools that allows people or companies to
means “coming together” of two or more create, share or exchange information,
separate technology/ Synergy of career interest, ideas and even pictures
technological advancements to work on a and videos in virtual communities and
similar goal or task. networks.
Types of Social Media:
Examples:
Social Networks: These are sites that
Smartphones: which combine the
allow you to connect with other people
functionality of a telephone, a camera, a with the same interests or background.
music player, and a digital personal

2
ICT Reviewer
1st Semester, 1st Quarter
11-STEM | PROF. Gilliane | SEM 1 2022

Bookmarking Sites: Sites that allow RULE NO. 4: RESPECT OTHER


you to store and manage links to PEOPLE’S TIME AND BANDWIDTH
various websites and resources. RULE NO. 5: MAKE YOURSELF LOOK
GOOD ONLINE
Social News: Sites that allow users to
RULE NO. 6: SHARE EXPERT
post their own news items or links to
KNOWLEDGE
other news sources.
RULE NO. 7: HELP KEEP FLAME WARS
Media Sharing: Sites that allow you to UNDER CONTROL
upload and share media content like RULE NO. 8: RESPECT OTHER
images, music, and video. PEOPLE’S PRIVACY
Blogs and Forums: Allow users to RULE NO. 9: DON’T ABUSE YOUR
post their content. POWER
RULE NO. 10: BE FORGIVING OF
INTERNET SAFETY - goal of internet OTHER PEOPLE'S MISTAKE
safety, also known as online safety,
cyber safety, and E-Safety, is to Internet Threats - category of
minimize a user's ignorance of the cybersecurity risks that may cause an
security hazards to their personal
undesirable event or action via the
safety and property associated with
internet.
using the internet as well as to protect
Malware - catch-all term for any type of
themselves from computer crime.
malicious software, regardless of how it
NETIQUETTE - made-up word, works, its intent, or how it’s distributed.
netiquette is constructed from the Virus - specific type of malware that
words net and etiquette. netiquette self-replicates by inserting its code into
refers to the standards of behavior for
other programs.
polite and appropriate online
conversation.
MALWARE - any software that is
INFORMATION YOU MUST LIMIT TO consciously created to disrupt a computer,
SHARE ONLINE:
server, client, or computer network, leak
● Personal Information sensitive data, obtain unauthorized access
● Contact Information to data or systems, deny users access to
● Educational Background
information, or unintentionally compromise
● Financial Account
● Location a user’s computer security and privacy.

TROJAN: trojan horse virus is a form of


THE 10 COMMANDMENTS OF malware that installs into a computer
NETIQUETTE: pretending to be a reliable application.
RULE NO. 1: REMEMBER THE HUMAN ● ROGUE SECURITY SOFTWARE:
RULE NO. 2: ADHERE TO THE SAME Rogue security software is a type
STANDARDS ONLINE THAT YOU of malicious software and online
FOLLOW IN REAL LIFE. fraud that tricks consumers into
RULE NO. 3: KNOW WHERE YOU ARE thinking their computer has a virus
and tries to persuade them to pay
IN CYBERSPACE for a phony malware removal

3
ICT Reviewer
1st Semester, 1st Quarter
11-STEM | PROF. Gilliane | SEM 1 2022

program that in fact installs ● File sharing: P2P file


malware on their computer. networks can carry malware
● WORM: After infiltrating a system, like worms.
● Social networks: Social
a computer worm is a subset of
platforms like MySpace have
Trojan horse malware that may been affected by certain types
spread or self-replicate from one of worms.
computer to another without ● Instant messengers (IMs): All
human activation. types of malware, including
SPYWARE: Malicious software, often worms, can spread through
known as malware, such as spyware, is text messages and IM
platforms such as Internet
placed on a computer without the end
Relay Chat (IRC).
user's knowledge. ● External devices: Worms can
● KEYLOGGER: The act of secretly infect USB sticks and external
recording the keys pressed on a hard drives.
keyboard such that the person
using it is unaware that their Intellectual property rights - category of
actions are being watched is
property that includes intangible
creations of the human intellect.
known as keystroke logging, also
known as keylogging or keyboard 4 types of intellectual property:
capture.
Copyright - legal phrase that describes
ADWARE: commonly referred to as
the rights that authors and artists have
advertising-supported software, makes
money for its creators by displaying over their literary and artistic creations.
banner ads on your screen, typically inside
Trade Secret - confidential information
of a web browser.
which may be sold or licensed.
● SPAM: Malspam is an abbreviation
for "malware spam" or "malicious Trademark - sign capable of
spam," which refers to spam distinguishing the goods or services of
messages that include malware. one enterprise from those of other
enterprises.
HOW DOES A COMPUTER MALWARE
Patent - exclusive right granted for an
SPREAD: invention, which is a product or a
● Phishing: Fraudulent emails process that provides, in general, a
that look authentic can carry new way of doing something, or offers
worms in corrupt attachments.
a new technical solution to a problem.
● Spear-Phishing: Targeted
phishing attempts can carry Copyright Infringement - considered to
dangerous malware like
have been violated when it's copied,
ransomware crypto worms.
● Networks: Worms can distributed, performed, publicly
self-replicate across networks displayed, or transformed into a
via shared access. derivative work without the owner’s
● Security holes: Some worm consent.
variants can infiltrate a system
by exploiting software Plagiarism - using some else’s work or
vulnerabilities. ideas without giving proper credit.

4
ICT Reviewer
1st Semester, 1st Quarter
11-STEM | PROF. Gilliane | SEM 1 2022

Common Types of Plagiarism: credential/expertise and


provides contact
Direct Plagiarism: Is the unattributed, information.
unmarked transcription of a passage ■ Currency: Information is
from another person's work word for current & updated
word. frequently.
■ Fairness: Content is
Self Plagiarism: Occurs when a
balanced, presenting all
student submits their own prior work or
sides of an issue and
combines portions of prior works
multiple points of view.
without getting permission from all of
■ Use of Search Engines:
the teachers concerned.
Search Engines are
Mosaic Plagiarism: When a student programs that look for
uses terms from a source without documents based on
putting them in quotes or finds specified keywords and
synonyms for the author's words while return these documents
adhering to the general format and where the keywords were
content of the original, this is known as found.
mosaic plagiarism. ■ Major Search
Engine: • Google
Accidental Plagiarism: Accidental • Yahoo (uses
plagiarism occurs when a person fails google) •
to mention their sources, incorrectly AltaVista • Bing •
paraphrases them, or unintentionally Lycos
uses similar terms, word groupings, or ■ Relevance: Content is
sentence structures without giving due relevant to your topic or
credit to the original author. research.
Fair Use - used without consent as GOOGLE LIKE A PRO:
long as it is used in Fair Uses of
Copyrighted Material. SITE: Using site: to search with in spe

Contextualized Online Search and ASTERISK: Using * (asterisk) to fill the


Research Skills missing word or phrase specific
website
- utilize the internet as a tool for
reliable information gathering HYPHEN: Using - (hyphen) to exclude
and research to best meet word or phrases
particular class objectives or
QUOTATION: Use " " (quotation) to
solve a situation.
search for exact words or phrases.
EVALUATING INFORMATION
RANGE: Use ... (range) to search
■ Accuracy: Content is within a range of numbers
grammatically correct,
PLUS: Use + to search pages that
verifiable and cited when
contain both words
necessary
■ Author: Defines who LINK: Use link to search for a page
created the content, the that is link to another page
individual or group’s

5
ICT Reviewer
1st Semester, 1st Quarter
11-STEM | PROF. Gilliane | SEM 1 2022

MS Word Shortcut Keys Ctrl+E

Open a Ctrl+O
document
Align the text to Ctrl+L
Create a new Ctrl+N the left
document
Align the text to Ctrl+R
Save the Ctrl+S the right
document
Cancel a ESC
Close the Ctrl+W command
document
Undo the Ctrl+Z
Cut the selected Ctrl+X previous action
content to the
clipboard Redo the Ctrl+Y
previous action,
Copy the Ctrl+C if possible
selected content
to the clipboard Adjust the zoom Alt+W, Q, then use
magnification the Tab key in the
Ctrl+V Zoom dialog box to
Paste the
go to the value you
contents of the want.
clipboard
Split the Ctrl+Alt+S
Select all Ctrl+A
document
document window
content
Remove the Alt+Shift+C or
Apply bold Ctrl+B Ctrl+Alt+S
document
formatting to text window split
Apply italic Ctrl+I
formatting to text

Apply underline Ctrl+U


formatting to text

Decrease the Ctrl+Left bracket ([)


font size by 1
point

Increase the font Ctrl+Right bracket


size by 1 point (])

Center the text

You might also like