0% found this document useful (0 votes)
7 views6 pages

EmTech Reviewer

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views6 pages

EmTech Reviewer

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

EmTech (Q1 Reviewer)

C: Isaiah Salgado
Information and Technology Communication (ICT)
– Deals with the use of different communication technologies such mobile phones,
telephones, internet, etc. to locate, save, send and edit information.

Communication Technology
– also known as information technology, refers to all equipment and programs that are
used to process and communicate information.

Types of Communication Technologies:


1. Bluetooth – uses packet-based transmission over short range radio signals.
• Originally conceived by Dr. Jaap Haartsen at Ericsson in 1994.
• Came from King Harald “Bluetooth” Gormsson.
• Formed from the initials of Harald Bluetooth, “H” and “B” written in ancient
letters used by Vikings called “runes.”
• King Harald was known for uniting Denmark and Norway, and his dark blue
tooth which earned him the nickname Bluetooth.
Difference between Infrared and Bluetooth:
Infrared does not travel very far and is generally used for controlling close objects;
Bluetooth uses wireless frequencies which travel far greater distances.

2. Wi-Fi (Wireless Fidelity) – a wireless networking technology that uses radio


waves to provide wireless high-speed Internet and network connections.

3. Data Networking Services – a system that transfers data between network access
points through data switching, system control, and interconnection transmission
lines.
4. Network Generation
• Defined as a set of telephone or mobile network standards, which detail
the technological implementation of a particular mobile phone system.
• The speed increases and the technology used to achieve that speed also
changes.

5. Dial-up Services – data networking services using modems and telephone lines.

6. Virtual Private Networks (VPN)


• Provides a secure access to a private network
• Protects its users by encrypting their data and masking their IP addresses.

When the World Wide Web was invented, most pages were static (also known as flat or
stationary page)
Types of Web Pages:
1. Web 1.0 – refers to the state of the World Wide Web, when a set of static Websites
were used, providing no interactive content.

2. Web 2.0 – the addition of dynamic web pages, the user is able to see a website
differently than others; allows users to interact with the page.
Key features of Web 2.0:

• Folksonomy – allows user to categorize and classify/arrange information using


freely chosen keywords.
• Rich User Experience – content is dynamic and is responsive to users input.
• User Participation – owner of the website is not the only one who is able to put
content.
• Long Tail – services that are allowed on demand rather than on a one-time
purchase.
• Software as a service – users will subscribe to a software only when needed
rather than purchasing them; hosted by a service provider and made available to
customers over the internet.
• Mass Participation – diverse information sharing through universal web access.

3. Web 3.0 / Semantic Web – a movement led by the World Wide Web Consortium
(W3C). The W3C standard encourages web developers to include semantic
content in their web pages. The term is coined by the inventor of the World Wide
Web, Tim Berners-Lee.

Web 3.0 is yet to be fully realized because of these problems:


1. Compatibility
2. Security
3. Vastness
4. Vagueness
5. Logic
ONLINE PLATFORMS AND SITES:
1. Presentation or Visualization – allows you to present and share presentations,
infographics and videos with other people.

2. Cloud Computing Platform – the practice of using a network of remote servers


hosted on the internet.

3. File Management Platform – used for the storing, naming, sorting, and handling of
computer files.

4. Mapping Platform – a transformation taking the points of one space into the points
of the same or another space.

5. Social Media Platform – computer-mediated tools that allow large group of people
to create, share or exchange information, interest and the information can be in
the form of ideas, pictures, videos or anything that you want to create and share to
virtual communities.

Six Types of Social Media:


a. Social Networks – sites that allow you to connect with other people with the same
interests or background.

b. Bookmarking Sites – sites that allow you to store and manage links to various
websites and resources.

c. Social News – sites that allow users to post their own news items or links to other
news sources.
d. Media Sharing – sites that allow you to upload and share media content like
images, music and video.

e. Microblogging – sites that focus on short updates from the user.

f. Blogs and Forums – sites that allow users to post their content.

MOBILE TECHNOLOGIES:
a. IOS (iPhone operating system) – used in Apple devices such as the iPhone and iPad

b. Android – an open-source operating system developed by Google.

c. Blackberry OS – used in Blackberry OS

d. Windows Phone OS – a closed source and proprietary operating system developed


by Microsoft.

e. Symbian – the original smartphone OS; used by Nokia Users.

f. WebOS – originally used for smartphones, now used for Smart TVs.

g. Windows Mobile – developed by Microsoft for smartphones and pocket PCs.

TRENDS IN ICT:
1. Mobile Technologies – the popularity of smartphones and tablets has taken a
major rise over the years.

2. Social Media – a website application, or online channel that enables web users to
create, co-create, discuss, modify, and exchange user-generated content.

3. Assistive Media – a non-profit service designed to help people who have visual and
reading impairments.

ONLINE SAFETY AND MEASURES:


1. Never give any personal information out about yourself over the internet.

2. Do not give any banking or sensitive information unless you are sure that it is a
reputable business having a secure service.

3. Never open messages or attachments from someone you do not know.


4. Regularly review your privacy settings in your online accounts to make sure you
are not sharing important personal information

5. When using a public computer, delete your browsing data before leaving.

6. Keep your software updated to avoid security holes.

7. Do not download or install software on your device that is unknown to you

Netiquette – a made-up word from the words “net” and “etiquette”; Describes the rules of
conduct for respectful and appropriate communication on the internet.

10 Rules of Netiquette:
Rule 1: Remember The Human
Rule 2: Adhere to the Same Standards of Behavior Online That You Follow in Real Life
Rule 3: Know Where You Are in The Cyber Space
Rule 4: Respect Other Peoples’ Time and Bandwidth
Rule 5: Make Yourself Look Good Online
Rule 6: Share Expert Knowledge
Rule 7: Help Keep the Flame Wars Under Control
Rule 8: Respect Other Peoples’ Privacy
Rule 9: Don’t Abuse Your Power
Rule 10: Be Forgiving of Other People’s Mistake

Online Threats – any malicious act that attempts to gain access to a computer network
without authorization or permission from the owners.

Kinds of Internet Threats:


1. Phishing – its goal to acquire sensitive information like passwords and credit card
detail.

2. Pharming – happens when an email is sent from an internet criminal disguised as


an email from a legitimate source.
3. Internet Scam - generally refers to someone using internet services or software to
defraud or take advantage of victims, typically for financial gain.

4. Internet Robots - Other bots are "bad" and are programmed to break into user
accounts, scan the web for contact information for sending spam, or perform other
malicious activities.

5. Malware - Stands for malicious software.


Types of Malware:
a. Virus - a malicious program designed to replicate itself and transfer from one
computer to another either through the internet and local networks.

b. Worm - a malicious program that transfers from one computer to another by any
type of means.

c. Trojan - a malicious program that is disguised as useful program but once


downloaded or installed, your PC unprotected and allows hackers to get your
information.

d. Rogue security software - tricks users into posing that is a security software.

e. Spyware – a program that runs in the background without you knowing it (thus
called “spy”).

f. Keyloggers - used to record the keystore done by the users.

g. Adware - a program designed to send your advertisements, mostly as pop up.

6. Spams - Unwanted email mostly from bots or advertisers. It can be used to send malware.

7. Cyberstalking - refers to the use of the internet or other electronic device to harass
or stalk individuals or organizations.

8. Cyberbullying - refers to the act of tormenting, harassing, or embarrassing another


person using the internet.

9. Spoofing - happens when someone or something pretends to be something else to


gain our confidence, get access to our systems, steal data, steal money, or spread
malware.

Copyright Infringement
Intellectual Property – if you can create something, an idea, an invention, a form of literary
work, or a research, you have the right as to how it should be to others.

You might also like