0% found this document useful (0 votes)
39 views2 pages

IT POINTERS TO REVIEW Midterm

Uploaded by

botorlaprincine7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views2 pages

IT POINTERS TO REVIEW Midterm

Uploaded by

botorlaprincine7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

LIVING IN THE IT ERA

Pointers To Review

ADVANTAGES AND IMPORTANCE OF


hard-copy and e-books. They are also used to market
INFORMATION TECHNOLOGY: publications and track sales.
1. It allows access to any information
2. It saves time 9. Arts and Entertainment
3. It fosters innovation They can be used by writers to create and edit. They can be
4. It empowers communication used to make, record, edit, play, and listen to music. They can
5. It enhances learning for students be used to capture, edit and watch videos.
6. It is essential to business success
7. It makes career opportunities easier to find 10. Communication
8. It increases employee productivity Computers have made real-time communication over the
9. It can reduce financial risks internet easy, thanks to software and videoconferencing
10. It has a societal impact services such as Skype.
11. It links to artificial intelligence
11. Banking and Finance
You can use computers to check your account balance, transfer
Applications of ICT (Computers) in Our Daily money, or pay off credit cards. You can also use computer
Lives technology to access information on stock markets, trade stocks,
1. Business and manage investments. Banks store customer account data, as
Store and maintain accounts, personnel records, manage projects, well as detailed information on customer behavior which is used
track inventory, create presentations and reports. They enable to streamline marketing
communication with people both within and outside the business,
using various technologies, including e-mail. 12. Transport
Maintain safety and navigation systems, and increasingly to
2. Education drive, fly, or steer. Computers can be used to customize
Computers can be used to give learners audio-visual packages, settings for individuals, for example, seat setup, air-
interactive exercises, and remote learning, including tutoring conditioning temperatures.
over the internet. They can be used to access educational
information from intranet and internet sources, or via e-books. 13. Navigation
Computer technology has been combined with GPS
3. Healthcare technology. Computers combined with satellites mean that it's
Digitized medical information making it easier to store and now easy to pinpoint your exact location.
access patient data, complex information can also be analyzed
by software to aid discovery of diagnoses, as well as search for 14. Working From Home
risks of diseases. Computers have made working from home and other forms of
remote working increasingly common.
4. Retail and Trade Computers
Can be used to buy and sell products online. They can be used 15. Military
for direct trading and advertising too, using sites such as eBay, Computers are use for training purposes. They are used for
Craigslist, or local listings on social media or independent analyzing intelligence data. They aid communications. They
websites. help tanks and planes to target enemy forces.

5. Government 16. Social and Romance


Various government departments use computers to improve Social media enables people to chat in text or audio in real
the quality and efficiency of their services. Examples include time across large distances, as well as exchange photographs,
city planning, law enforcement, traffic, and tourism videos, and memes.

6. Marketing 17. Booking Vacations


Computers enable marketing campaigns to be more precise Computers can be used by travelers to study timetables,
through the analysis and manipulation of data. They can be examine route options, and buy plane, train, or bus tickets.
used to generate social media campaigns. They can be used to explore and book accommodation.

7. Science 18. Security and Surveillance


Scientists were one of the first groups to adopt computers as a Computers are increasingly being combined with other
work tool. In science, computers can be used for research, technologies to monitor people and goods. Face-recognition
sharing information with other specialists both locally and makes it easier to identify terrorists or criminals in public
internationally. places.

8. Publishing 19. Weather Forecasting


Computers can be used to design pretty much any type of It's impossible for human beings to monitor and process all
publication. Computers are used in the publishing of both the information coming in from satellite and other
LIVING IN THE IT ERA
Pointers To Review
technologies, never mind perform the complex calculations A wiki is any website where various users are able to
that are needed to predict what is likely to happen in the collaborate on content and all make their own tweaks
future. and changes as they see fit.

20. Robotics INTERNET THREATS


Combines computers with science and engineering to produce
1. Hacking - a term used to describe actions taken by
machines that can either replace humans, or do specific jobs
someone to gain unauthorized access to a computer.
that humans are unable to do.

2. Malware - one of the more common ways to infiltrate or


TYPES OF WEBSITE damage your computer. Malicious software that infects your
1. eCommerce Website - is a website people can directly computer, such as computer viruses, worms, Trojan horses,
buy products from you’ve probably used a number of spyware, and adware.
eCommerce websites before, most big brands and plenty of
smaller ones have one. 3. Pharming - a common type of online fraud. A means to
point you to a malicious and illegitimate website by
2. Business Website - is any website that’s devoted to redirecting the legitimate URL. Even if the URL is entered
representing a specific business. It should be branded like the correctly, it can still be redirected to a fake website.
business (the same logo and positioning) and communicate
the types of products and/or services the business offers. 4. Phishing - Fake emails, text messages and websites created
to look like they're from authentic companies. They're sent by
3. Entertainment Website - If you think about your internet criminals to steal personal and financial information from you.
browsing habits, you can probably think of a few websites that This is also known as “spoofing”.
you visit purely for entertainment purposes.
5. Ransomware - restricts access to your computer or your
4. Portfolio Website - This type of website is simpler to build files and displays a message that demands payment in order
than a business website and more focused on a particular task: for the restriction to be removed.
collecting work samples
6. Spam - one of the more common methods of both sending
5. Media Website - collect news stories or other information out and collecting it from unsuspecting people.
reporting.
7. Spyware (Spyware & Adware) - often used by third
6. Brochure Website - are a simplified form of business parties to infiltrate your computer.
websites.A simple brochure site that includes just a few pages Software that collects personal information about you
that lay out the basics of what you do and provide contact without you knowing. They often come in the form of a ‘free'
information may be enough for you. download and are installed automatically with or without your
consent. These are difficult to remove and can infect your
computer with viruses.
7. Nonprofit Website - is the easiest way for many potential
donors to make donations and will be the first place many
8. Trojan Horses - A malicious program that is disguised as,
people look to learn more about a nonprofit and determine if
or embedded within, legitimate software. It is an executable
they want to support it.
file that will install itself and run automatically once it's
downloaded.
8. Educational Website - These websites have the primary
goal of either providing educational materials to visitors or 9. Viruses - Malicious computer programs that are often sent
providing information on an educational institution to them. as an email attachment or a download with the intent of
infecting your computer, as well as the computers of
9. Infropreneur Website - Infopreneurs create and sell everyone in your contact list. Just visiting a site can start an
information products. That could be in the form of courses, automatic download of a virus.
tutorials, videos or eBooks.
10. Wi-Fi Eavesdropping - another method used by cyber
10. Personal Website - This category includes personal criminals to capture personal information. Virtual “listening in”
blogs, vlogs, and photo diaries people share with the on information that's shared over an unsecure (not encrypted)
world. WiFi network.

11. Web Portal - They collect information in different formats 11. Worms - A worm, unlike a virus, goes to work on its own
from different sources into one place to make all relevant without attaching itself to files or programs. It lives in your
information accessible to the people who need to see it. computer memory, doesn't damage or alter the hard drive
and propagates by sending itself to other computers in a
12. Wiki or Community Forum Website - or Community network – whether within a company or the internet itself.
Forum Website Most people are familiar with wikis through
the most famous example of one out there: Wikipedia.

You might also like