Information and Communication Technology Overview
40 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What characterizes convergence in technology?

  • Synergy of technological advancements for a common purpose (correct)
  • Isolation of devices from network interactions
  • Connectivity to multiple networks only
  • Ability to perform a single function efficiently
  • What is the primary aim of Web 3.0?

  • To eliminate all human-generated content
  • To make web content generic for all users
  • To allow machines to understand user preferences (correct)
  • To restrict access to certain web pages
  • Which of the following is NOT a type of social media?

  • Social Networks
  • Search Engines (correct)
  • Bookmarking Sites
  • Media Sharing
  • What are the four types of user-generated content (UGC)?

    <p>Audio, Images, Videos, and Texts</p> Signup and view all the answers

    What is the primary function of microblogging sites?

    <p>To allow users to post short, quick updates</p> Signup and view all the answers

    Which statement about mobile technologies is true?

    <p>They have significantly increased in popularity over the years.</p> Signup and view all the answers

    What do social news sites enable users to do?

    <p>Post items or links to other news sources</p> Signup and view all the answers

    What is a distinguishing feature of blogs as compared to forums?

    <p>Blogs are focused on one user’s opinions and thoughts.</p> Signup and view all the answers

    What characteristic distinguishes Web 1.0 from Web 2.0?

    <p>Static content</p> Signup and view all the answers

    Which of the following best defines 'Folksonomy' in the context of Web 2.0?

    <p>A method for users to categorize information using chosen keywords</p> Signup and view all the answers

    Tim Berners-Lee is credited with which of the following innovations?

    <p>The World Wide Web</p> Signup and view all the answers

    Which statement about dynamic websites is correct?

    <p>They allow for easy content editing by users.</p> Signup and view all the answers

    What is a significant attribute of Web 2.0 that allows user engagement?

    <p>Ability to publish content and engage with others</p> Signup and view all the answers

    Which of these features is NOT associated with Web 2.0?

    <p>Static web pages</p> Signup and view all the answers

    How did the definition of web pages change from Web 1.0 to Web 2.0?

    <p>Web 2.0 enabled users to see different content based on interaction.</p> Signup and view all the answers

    What role does 'User Participation' play in the evolution of the web?

    <p>Users can now contribute through comments and reviews.</p> Signup and view all the answers

    What is the primary objective of online security?

    <p>To protect against malicious harm</p> Signup and view all the answers

    Which of the following is NOT a rule in online etiquette?

    <p>Share passwords with trusted friends</p> Signup and view all the answers

    What is a key aspect of online ethics?

    <p>Following a personal code of behavior in the online environment</p> Signup and view all the answers

    What is the main goal of phishing?

    <p>To acquire sensitive personal information</p> Signup and view all the answers

    Which field does not primarily utilize MS Word?

    <p>Cryptovirology</p> Signup and view all the answers

    Which of the following actions can compromise your online safety?

    <p>Accepting terms and conditions without reading</p> Signup and view all the answers

    What information should you be cautious about sharing online?

    <p>Your home address</p> Signup and view all the answers

    Which of the following is a reason hackers hack?

    <p>For self-fulfillment</p> Signup and view all the answers

    What should you do if you are unsure about a website's trustworthiness?

    <p>Avoid visiting the site altogether</p> Signup and view all the answers

    What is cryptography primarily concerned with?

    <p>Achieving security by encoding messages</p> Signup and view all the answers

    Which of the following is not a tip to avoid copyright infringement?

    <p>Copy but do not share without permission</p> Signup and view all the answers

    Why is it important to keep your social media profile private?

    <p>To prevent search engines from indexing your profile</p> Signup and view all the answers

    What should you do before connecting to public Wi-Fi?

    <p>Avoid logging in to sensitive accounts</p> Signup and view all the answers

    In which of the following contexts is MS Word NOT used?

    <p>Playing video games</p> Signup and view all the answers

    Which option best describes copy infringement?

    <p>Using works protected by copyright without permission</p> Signup and view all the answers

    What is NOT a usage area of MS Word?

    <p>Learning programming languages</p> Signup and view all the answers

    What should you do first to insert a chart into your document?

    <p>Click where you want to insert the chart.</p> Signup and view all the answers

    Which action is necessary to delete an illustration from your document?

    <p>Select the illustration you want to delete.</p> Signup and view all the answers

    What happens when you click the More drop-down arrow in the Picture Styles group?

    <p>You can choose from additional Picture Styles.</p> Signup and view all the answers

    Which method is NOT used to format pictures?

    <p>Changing the text alignment.</p> Signup and view all the answers

    What should you do after selecting the illustration you wish to resize?

    <p>Click and drag the sizing handles.</p> Signup and view all the answers

    What is the purpose of the rotating handle that appears after selecting an illustration?

    <p>To rotate the illustration.</p> Signup and view all the answers

    What is required to insert a screen clipping?

    <p>Click the Screenshot button in the Illustrations group.</p> Signup and view all the answers

    To edit the data after inserting a chart, which application opens?

    <p>MS Excel.</p> Signup and view all the answers

    Study Notes

    Information and Communication Technology (ICT)

    • Deals with using communication technologies like cell phones, telephones, and the internet to locate, save, send, and edit information.

    Tim Berners-Lee

    • Invented the World Wide Web (WWW) which was released in 1993.

    Web 1.0: Static Web Pages (1996 - 2004)

    • Also known as the Hypertext Web, Static Web, or Read-only Web.
    • Web pages were "as is" and couldn't be manipulated by the user.
    • Content was the same for all users.

    Web 2.0: Dynamic Web Pages (2004 - 2016)

    • Also known as the Social Web.
    • Users could see websites differently based on their interactions.
    • Examples: Social networking sites, blogs, wikis, video sharing sites, hosted services, and web applications.
    • People could publish their own content.

    Web 1.0 vs. Web 2.0

    • Static Website:
      • Easy to build.
      • Cheap to host.
      • Fixed content.
    • Dynamic Website:
      • Slightly harder to build.
      • More costly to host than static websites.
      • Users could edit website content.

    Features of Web 2.0

    • Folksonomy:
      • Users could categorize and classify information using freely chosen keywords (e.g., tagging).
      • Popular social networking sites like Twitter, Instagram, and Facebook use hashtags (#) for tagging.
    • Rich User Experience:
      • Content is dynamic and responsive to user input.
      • Websites can show local content.
      • Social networking sites use user accounts to customize what users see.
    • User Participation:
      • Website owners aren't the only ones who can post content.
      • Others can contribute through comments, reviews, and evaluations.
      • Websites like Amazon.com allow users to comment on articles, participate in polls, or review products.
    • Software as a Service (SaaS):
      • Users subscribe to software only when needed instead of purchasing it.
      • A cheaper option when software isn't used regularly.
      • Also known as "Long Trail" services.
    • Mass Participation:
      • Diverse information sharing through universal web access.
      • Content is based on people from various cultures since most users have internet access.

    Web 3.0: Semantic Web Pages/Executable Pages

    • Also known as the Semantic Web.
    • Semantics: Web technologies' ability to understand and interpret human-generated content.
    • Aim of Web 3.0: Machines understand user preferences to deliver web content specifically targeted to individual users.
    • The internet can predict the best possible answers to a user's questions by "learning from previous choices."
    • Convergence: Synergy of technological advancements working together for a common goal.
      • Devices can execute multiple functions, collect and use data in various formats, and connect to networks/other devices.
    • Social Media: Websites, applications, or online channels allowing users to create, co-create, discuss, modify, and exchange user-generated content.
      • Social Networks: Connect people with shared interests or backgrounds (e.g., Facebook, Instagram).
      • Bookmarking Sites: Users can store and manage links to websites and resources (e.g., Twitter, Pinterest).
      • Social News: Users can post their own items or links to other news sources (e.g., Reddit, Facebook).
      • Media Sharing: Users can upload and share media (e.g., Youtube, Instagram).
      • Microblogging: Users focus on short updates (e.g., Twitter).
      • Blogs and Forums: Users post content.
        • Blogs: Express personal opinions/thoughts.
        • Forums: Users interact around a specific topic.
    • Mobile Technologies:
      • The popularity of smartphones and tablets has increased significantly due to their ability to perform tasks typically done on computers.
    • Assistive Media:
      • Founded in 1996.
      • The first internet-based spoken-word audio reading service for people with print reading barriers.
      • Provides accessibility for individuals with cognitive, physical, and communication disabilities.

    Online Safety, Security, Ethics, and Etiquette

    • Online Safety: Protecting against potential harm caused by malicious intentions.
    • Security: Methods, technologies, and processes to protect the confidentiality, integrity, and availability of computer systems, networks, and data against cyberattacks or unauthorized access.
    • Ethics: Set of moral rules or a code of behavior in the online environment.
    • Etiquette: Unofficial code of policies encouraging good behavior online, regulating respect and polite behavior on social media platforms.

    7 Rules of Online Etiquette

    • Be respectful.
    • Be aware of the language you use.
    • Be careful with sarcasm.
    • Proper grammar and spelling matter.
    • Cite your sources.
    • Don't post or share inappropriate material.
    • Be forgiving.

    Types of Information and Associated Risks

    • First name.
    • Last name.
    • Middle name.
    • Current and previous schools.
    • Cellphone number.
    • Parents' names.
    • Siblings' names.
    • Address.
    • Home phone number.
    • Birthday.

    15 Tips to Stay Safe Online

    • Remember the internet is a public place; protect yourself.
    • Be mindful of what you share online and with whom.
    • Don't just accept terms and conditions; read them carefully.
    • Know the security features of the social networking sites you use.
    • Keep your profile private.
    • Don't share passwords with anyone.
    • Avoid logging into public networks/Wi-Fi.
    • Browsing in "incognito (or private) mode" doesn't protect you from hackers.
    • Don't talk to strangers online or in person.
    • Never post about future vacations.
    • Add friends you know in real life.
    • Avoid visiting untrusted websites.
    • Install and update antivirus software on your computer.
    • Be cautious about what links you click.
    • Be wary of unsolicited messages or emails.

    Online Threats

    • Phishing: Goal is to acquire sensitive personal information like passwords and credit card details.
    • Cryptovirology: Study of how to build malicious software using cryptography.
    • Cryptography: Art or science of achieving security by encoding messages.
    • Copyright Infringement: Using copyrighted works without permission.
    • Always assume that the work is copyrighted.
    • Don't copy, share, or alter without permission.
    • Review and retain licensing agreements.
    • Consider buying content if you plan to use it.
    • Give credit to the original author.

    Why do Hackers Hack?

    • Self-fulfillment:
      • Steal/leak information.
      • Disrupt services.
      • Make a point.
      • Money.
      • Driven by purpose: Hacktivism, idealism, political motives.

    Microsoft Word

    • Word processing program used to create, format, save, and print documents like letters, manuals, contracts, proposals, reports, newsletters, card flyers, invitations, certificates, forms, envelopes, blog posts, webpages, signs, manuscripts, or books.

    Uses of MS Word

    • Education: Simplifies work for teachers and students.
      • Creating notes is easier using MS Word as they can be made more interactive with shapes and images.
      • Convenient to create assignments.
    • Workplace:
      • Submitting letters, bills, creating reports, letterheads, sample documents.
    • Creating and Updating Resumes:
      • An essential tool with easy editing options to adjust your resume based on experience.

    Microsoft Word Features

    • Insert SmartArt:
      • Select a SmartArt graphic type from the list and click "OK."
      • Enter text by clicking "[Text]" in the Text pane and typing.
    • Insert Chart:
      • Click where you want to insert the chart in your document.
      • Go to the "Illustrations" group on the "Insert" tab and click "Chart."
      • Choose the desired chart type and click "OK."
      • An MS Excel window will appear with the chart.
      • Edit data in MS Excel and close Excel after editing.
    • Insert Screen Clipping:
      • Click the "Screenshot" button.
      • Select the whole program window or use the "Screen Clipping" tool to choose part of a window.
      • Click the window you want to clip from.
      • Click where you want to insert the screen clipping in your document.
    • Delete Illustrations:
      • Select the illustration you want to delete.
      • Press the Delete key.

    Formatting Illustrations

    • Resize Illustrations:
      • Select the illustration you want to resize.
      • Sizing handles will appear.
      • Click and drag any of the sizing handles.
      • The arrow circle above the illustration is the rotating handle for rotating the object.
    • Format Pictures and Clip Art/Icons:
      • Select the picture you want to format.
      • Go to the "Format" tab under "Picture Tools."
      • Use "Corrections" to adjust brightness, contrast, and sharpness.
      • Use "Color" to adjust color quality.
      • Use "Artistic Effects" to add artistic effects.
      • Use "Picture Styles" to add borders or effects.
    • Format Shapes:
      • Select the shape you want to format.
      • Go to the "Format" tab under "Drawing Tools."
      • Use the various options to adjust the shape's appearance.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers the basics of Information and Communication Technology (ICT), focusing on the evolution of the web from Web 1.0 to Web 2.0. It includes key concepts like static and dynamic web pages, and the role of Tim Berners-Lee in creating the World Wide Web. Test your understanding of how communication technologies have developed over time.

    More Like This

    Use Quizgecko on...
    Browser
    Browser