Podcast
Questions and Answers
What does the term 'Netiquette' refer to?
What does the term 'Netiquette' refer to?
Which of the following is considered a bookmarking site?
Which of the following is considered a bookmarking site?
According to netiquette, what should you consider when sending an email?
According to netiquette, what should you consider when sending an email?
Which social media platform is primarily used for microblogging?
Which social media platform is primarily used for microblogging?
Signup and view all the answers
What does the first rule of netiquette emphasize?
What does the first rule of netiquette emphasize?
Signup and view all the answers
Which one of the following is NOT a feature of media sharing sites?
Which one of the following is NOT a feature of media sharing sites?
Signup and view all the answers
Why should users respect other people's time and bandwidth according to netiquette?
Why should users respect other people's time and bandwidth according to netiquette?
Signup and view all the answers
What is one key characteristic of blogs and forums?
What is one key characteristic of blogs and forums?
Signup and view all the answers
What is a key principle of netiquette regarding online discussions?
What is a key principle of netiquette regarding online discussions?
Signup and view all the answers
What should you do to ensure clear communication in your posts and emails?
What should you do to ensure clear communication in your posts and emails?
Signup and view all the answers
Which of the following is NOT considered a violation of netiquette?
Which of the following is NOT considered a violation of netiquette?
Signup and view all the answers
What defines a 'masquerader' in terms of cybersecurity?
What defines a 'masquerader' in terms of cybersecurity?
Signup and view all the answers
During which stage does a virus copy itself into other programs?
During which stage does a virus copy itself into other programs?
Signup and view all the answers
How is 'cybercrime' defined?
How is 'cybercrime' defined?
Signup and view all the answers
What does 'malware' stand for?
What does 'malware' stand for?
Signup and view all the answers
What is the primary purpose of a Privacy Policy or Terms of Service?
What is the primary purpose of a Privacy Policy or Terms of Service?
Signup and view all the answers
What distinguishes Web 2.0 from Web 1.0?
What distinguishes Web 2.0 from Web 1.0?
Signup and view all the answers
Which of the following best describes the term 'folksonomy' in Web 2.0?
Which of the following best describes the term 'folksonomy' in Web 2.0?
Signup and view all the answers
What does the term 'Long Tail' refer to in the context of Web 2.0?
What does the term 'Long Tail' refer to in the context of Web 2.0?
Signup and view all the answers
How do dynamic web pages in Web 2.0 enhance user experience compared to static web pages?
How do dynamic web pages in Web 2.0 enhance user experience compared to static web pages?
Signup and view all the answers
What is a defining feature of Software as a Service (SaaS)?
What is a defining feature of Software as a Service (SaaS)?
Signup and view all the answers
Which of the following best exemplifies the concept of 'Mass Participation' in Web 2.0?
Which of the following best exemplifies the concept of 'Mass Participation' in Web 2.0?
Signup and view all the answers
Which type of social media allows users to connect based on shared interests?
Which type of social media allows users to connect based on shared interests?
Signup and view all the answers
What is the main focus of Web 3.0 compared to Web 2.0?
What is the main focus of Web 3.0 compared to Web 2.0?
Signup and view all the answers
Study Notes
Introduction to ICT
- Information and communication technology (ICT) involves using various communication technologies like phones, the internet, etc., to process and share information.
- ICT studies computers as tools for processing data and fundamental computer system use in internet environments.
- The Philippines is an ICT hub of Asia due to the growth of ICT-related jobs like Business Process Outsourcing (BPO).
- The ICT department in the Philippines plans, develops, and promotes ICT for national development.
Computers and the Internet
- Computers are electronic devices that process data in binary form using variable programs.
- The Internet is a global network connecting billions of devices using TCP/IP.
- The internet allows connecting computers across the world via routers and servers.
World Wide Web
- The World Wide Web is an information system on the internet.
- Hypertext links connect documents enabling users to navigate information.
Web Pages
- Web pages are hypertext documents connected to the World Wide Web.
- Various versions of webpages exist, including Web 1.0 (static pages), Web 2.0 (dynamic pages with user interaction), and Web 3.0 (semantic web).
Trends in ICT
- Convergence involves combining different technologies for similar tasks (e.g., using smartphones for word processing).
- Social media platforms facilitate user-generated content creation, modification, and exchange.
Types of Social Media
- Social Networks: Sites for connecting people with common interests (e.g., Facebook).
- Bookmarking Sites: Allowing users to store and manage links to websites (e.g., Pinterest).
- Social News: Sites allowing users to post and comment on news items (e.g., Reddit).
- Media Sharing: Sites for uploading and sharing media content (e.g., YouTube).
- Microblogging: Focuses on short updates (e.g., Twitter).
- Blogs and Forums: Platforms for posting and discussing content.
Mobile Technologies
- Smartphones and tablets are increasingly popular, replacing some tasks previously performed on computers.
Online Safety and Netiquette
- Internet safety involves protecting personal information online.
- Netiquette encompasses online communication etiquette (e.g., respectful communication, avoiding flaming).
Internet Security
- Cybercrime refers to crimes committed using the internet.
- Malware includes malicious software like viruses, worms, Trojans, spyware, adware, and spam.
- Phishing involves acquiring personal information through fraudulent means.
- Security measures like strong passwords and updated software are crucial.
Virus stages
- A virus's life cycle includes dormant, propagation, triggering, and execution phases.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on Information and Communication Technology (ICT) including concepts like computers, the internet, and the World Wide Web. This quiz covers the basics of ICT, its significance in the Philippines, and how web pages are structured and navigated.