Task 1 ICT
Task 1 ICT
Lesson 2:
Understanding the Basic Concepts in ICT
Task 1
Access Point – a device that allows wireless-equipped computers and other devices to
communicate with a wired network. (https://www.dpsolutions.com/success-center/it-
terminology-glossary)
Bandwidth - a range of frequencies within a given band, in particular that used for transmitting
a signal, the transmission capacity of a computer network or other telecommunication system.
(Definitions from Oxford Languages)
Bits - is a binary digit, the smallest increment of data on a computer. A bit can hold only one
of two values: 0 or 1, corresponding to the electrical values of off or on, respectively. ...
Computer storage and memory is often measured in megabytes (MB) and gigabytes (GB).
(https://kb.iu.edu)
Broadband - is the transmission of wide bandwidth data over a high-speed internet connection.
(https://www.verizon.com)
Bytes - the basic unit of information in computer storage and processing. A byte consists of 8
adjacent binary digits (bits), each of which consists of a 0 or 1. ... The string of bits making up
a byte is processed as a unit by a computer; bytes are the smallest operable units of storage in
computer technology. (https://www.britannica.com)
CAPTCHA - stands for the Completely Automated Public Turing test to tell Computers and
Humans Apart. CAPTCHAs are tools you can use to differentiate between real users and
automated users, such as bots. (https://www.imperva.com)
1|P a g e
Cloud Storage – is an alternative to storing data on a computer’s physical storage. Information
stored “on the cloud” is kept on remote servers that can be accessed anywhere via the internet.
(https://ims.upm.edu.ph/ict-terms)
Cookie - are text files with small pieces of data — like a username and password — that are
used to identify your computer as you use a computer network. (https://www.kaspersky.com)
Disk Space - is an amount of computer storage space on random-access memory devices, such
as on a hard drive, floppy or USB flash drive. (https://educalingo.com)
Firewall - is a network security device that monitors incoming and outgoing network traffic
and decides whether to allow or block specific traffic based on a defined set of
security rules. (https://www.cisco.com)
Malware - short for “malicious software,” refers to any intrusive software developed by
cybercriminals (often called “hackers”) to steal data and damage or destroy computers and
computer systems. (https://www.cisco.com)
Memory - is the electronic holding place for the instructions and data a computer needs to
reach quickly. It's where information is stored for immediate use.
(https://whatis.techtarget.com)
Modem - is a network device that both modulates and demodulates analog carrier signals
(called sine waves) for encoding and decoding digital information for processing.
(https://www.techopedia.com)
Reboot - the act or an instance of shutting down and restarting something (such as a computer
or program). (https://www.merriam-webster.com)
Spam - is digital junk mail: unsolicited communications sent in bulk over the internet or
through any electronic messaging system. (https://www.avast.com)
2|P a g e
Spyware - is a malicious software designed to enter your computer device, gather data about
you, and forward it to a third-party without your consent. Spyware can also refer to legitimate
software that monitors your data for commercial purposes like advertising.
(https://www.kaspersky.com)
Trojan - a type of malware that is often disguised as legitimate software. Trojans can be
employed by cyber-thieves and hackers trying to gain access to users' systems. Users are
typically tricked by some form of social engineering into loading and executing Trojans on
their systems. (https://www.kaspersky.com)
Virus - is a malicious software program loaded onto a user's computer without the user's
knowledge and performs malicious actions. ... It can self-replicate, inserting itself onto other
programs or files, infecting them in the process. (https://economictimes.indiatimes.com)
Web Browser - It’s a program on your computer that allows you to connect to the Internet to
visit websites, download files, and applications. (https://v2cloud.com › glossary)
Worm - is a type of malware that spreads copies of itself from computer to computer. A worm
can replicate itself without any human interaction, and it does not need to attach itself to a
software program in order to cause damage. (https://us.norton.com)
3|P a g e
v
3. Identify three (3) concepts that you learned in this lesson. Write your understanding
and explain how are you going to apply this concept when you become a teacher.
So, this are the following (3) concept that I’ve learned in this lesson:
Educational Technology (EdTech) refers to the use of digital tools, software, and systems to
enhance teaching, learning, and educational management. It integrates technology into
classrooms, online learning, and instructional design to improve student engagement,
accessibility, and effectiveness in education.
Online Digital Tools and Apps are web-based or mobile applications designed to facilitate
various tasks such as communication, collaboration, learning, content creation, and
productivity. These tools enable users to work, learn, and interact remotely or in digital
environments.
E-mail Tools are software applications or features that support the creation, sending, receiving,
organizing, and automation of emails. They help with efficient communication, scheduling,
and email marketing, improving productivity in both personal and professional settings.
In the modern educational landscape, technology plays a crucial role in enhancing the
teaching and learning experience. I will apply those three concepts to help improve
engagement, communication, and efficiency in classrooms. Among these, educational
technology, online digital tools and apps, and e-mail tools stand out as essential resources for
me. The integration of these technologies not only improves classroom instruction but also
streamlines administrative tasks, making teaching more effective and student -centered. I can
use these tools to facilitate group work, create engaging content, and manage my time
effectively. Beyond basic communication, e-mail tools offer automation and scheduling
features that help me to manage workload more effectively. This automation reduces the time
spent on repetitive tasks, allowing me to focus more on instruction and student support.
In conclusion, the integration of educational technology, online digital tools, and e-mail
tools has revolutionized the teaching profession. These technologies enhance lesson delivery,
improve student engagement, and streamline administrative tasks. As education continues to
evolve in the digital age, I must embrace these tools to create a more efficient, inclusive, and
engaging learning environment.
4|P a g e