Podcast
Questions and Answers
Which technology relies on principles of physics, rather than mathematics, for encoding and decoding information to ensure privacy and security?
Which technology relies on principles of physics, rather than mathematics, for encoding and decoding information to ensure privacy and security?
- Biometrics
- Quantum cryptography (correct)
- 3D imaging and holography
- Computer-assisted translation
A company wants to enhance its online presence by creating interactive, three-dimensional models of its products. Which technology would be most suitable for this purpose?
A company wants to enhance its online presence by creating interactive, three-dimensional models of its products. Which technology would be most suitable for this purpose?
- E-commerce
- Computer Assisted Translation
- Virtual Reality (correct)
- Social Media
A school aims to provide a comprehensive digital learning environment for teachers, students, and parents. This environment should include tools for delivering educational content, managing student progress, and facilitating communication. Which platform would best suit these needs?
A school aims to provide a comprehensive digital learning environment for teachers, students, and parents. This environment should include tools for delivering educational content, managing student progress, and facilitating communication. Which platform would best suit these needs?
- Online video platform
- E-commerce platform
- Social Media platform
- Online learning platform (correct)
Which of the following actions constitutes cyberstalking?
Which of the following actions constitutes cyberstalking?
Which of the following scenarios best describes identity theft?
Which of the following scenarios best describes identity theft?
Which scenario is the clearest example of cyberbullying?
Which scenario is the clearest example of cyberbullying?
A user receives an email that appears to be from their bank, requesting them to update their personal information by clicking on a provided link. Upon closer inspection, the user notices that the email address is slightly different from the bank's official address and the link seems suspicious. What type of internet threat does this scenario likely represent?
A user receives an email that appears to be from their bank, requesting them to update their personal information by clicking on a provided link. Upon closer inspection, the user notices that the email address is slightly different from the bank's official address and the link seems suspicious. What type of internet threat does this scenario likely represent?
A person discovers that someone has created a fake social media profile using their name and photo, and is posting inappropriate content that damages their reputation. This situation is an example of:
A person discovers that someone has created a fake social media profile using their name and photo, and is posting inappropriate content that damages their reputation. This situation is an example of:
Which type of malware disguises itself as a legitimate program to gain access and control of a user's computer?
Which type of malware disguises itself as a legitimate program to gain access and control of a user's computer?
A user's computer is displaying numerous unwanted advertisements that are difficult to close. This is most likely caused by which type of malware?
A user's computer is displaying numerous unwanted advertisements that are difficult to close. This is most likely caused by which type of malware?
Which of the following best describes the primary function of ransomware?
Which of the following best describes the primary function of ransomware?
What is the main purpose of 'netiquette' guidelines?
What is the main purpose of 'netiquette' guidelines?
Which of the following activities is explicitly covered and prohibited by Republic Act 10627, also known as the Anti-Bullying Act of 2013?
Which of the following activities is explicitly covered and prohibited by Republic Act 10627, also known as the Anti-Bullying Act of 2013?
Which cyberattack method involves using deceptive emails and websites to acquire sensitive personal information?
Which cyberattack method involves using deceptive emails and websites to acquire sensitive personal information?
Which of the following scenarios best exemplifies the use of ICT in education?
Which of the following scenarios best exemplifies the use of ICT in education?
A small business owner in the Philippines wants to expand their reach to international customers. Which ICT application would be MOST beneficial for achieving this?
A small business owner in the Philippines wants to expand their reach to international customers. Which ICT application would be MOST beneficial for achieving this?
How do worms primarily spread from one computer to another?
How do worms primarily spread from one computer to another?
How might Artificial Intelligence (AI) be integrated into the banking and finance sector to improve customer service?
How might Artificial Intelligence (AI) be integrated into the banking and finance sector to improve customer service?
Which of the following is an accurate description of Republic Act 10175, also known as the Cybercrime Prevention Act of 2012?
Which of the following is an accurate description of Republic Act 10175, also known as the Cybercrime Prevention Act of 2012?
Considering the Philippines' status as the 'ICT Hub of Asia,' which of the following is the MOST likely reason for this designation?
Considering the Philippines' status as the 'ICT Hub of Asia,' which of the following is the MOST likely reason for this designation?
A marketing company wants to understand how Filipinos spend their time online. Based on the provided data, which online activity should they prioritize when creating targeted advertisements?
A marketing company wants to understand how Filipinos spend their time online. Based on the provided data, which online activity should they prioritize when creating targeted advertisements?
A hospital wants to improve its patient care using ICT. Which of the following options would contribute MOST to achieving this goal?
A hospital wants to improve its patient care using ICT. Which of the following options would contribute MOST to achieving this goal?
A local government unit (LGU) aims to use ICT to improve transparency and citizen engagement. What is the MOST effective strategy to accomplish this?
A local government unit (LGU) aims to use ICT to improve transparency and citizen engagement. What is the MOST effective strategy to accomplish this?
In what way do robotics and artificial intelligence (AI) differ in their primary function?
In what way do robotics and artificial intelligence (AI) differ in their primary function?
Flashcards
ICT (Information and Communication Technology)
ICT (Information and Communication Technology)
Technologies (hardware and software) enabling communication.
ICT in Education
ICT in Education
Using ICT for teaching and learning.
ICT in Business
ICT in Business
Using ICT to facilitate trade, customer relations, and internal operations.
ICT in Government
ICT in Government
Signup and view all the flashcards
ICT in Medicine
ICT in Medicine
Signup and view all the flashcards
ICT Hub of Asia
ICT Hub of Asia
Signup and view all the flashcards
Artificial Intelligence (AI)
Artificial Intelligence (AI)
Signup and view all the flashcards
Robotics
Robotics
Signup and view all the flashcards
Biometrics
Biometrics
Signup and view all the flashcards
Quantum cryptography
Quantum cryptography
Signup and view all the flashcards
Computer assisted translation
Computer assisted translation
Signup and view all the flashcards
3D imaging and holography
3D imaging and holography
Signup and view all the flashcards
Virtual Reality
Virtual Reality
Signup and view all the flashcards
Social Media
Social Media
Signup and view all the flashcards
E-commerce
E-commerce
Signup and view all the flashcards
Online safety
Online safety
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Worm
Worm
Signup and view all the flashcards
Trojan
Trojan
Signup and view all the flashcards
Spyware
Spyware
Signup and view all the flashcards
Adware
Adware
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Spam
Spam
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Study Notes
- ICT stands for information and communication technology.
Introduction to ICT
- This chapter covers the nuances of online platforms, sites, and content.
- This chapter goes over online safety, security, ethics, and etiquette standards when using ICT.
- This chapter covers using the internet for credible research and information.
What is ICT?
- The term information and communication technology (ICT) refers to the technologies, both hardware and software, that enables humans to communicate with one another.
- ICT includes the use of computers, radio, television, cellular or mobile phones, network hardware and software, internet connection, satellite systems, and application needed for video conferencing and distance learning in education.
Components of ICT
- Cloud computing is a term generally used to describe data centers available to many users over the internet.
- Software is a set of instructions, data, or programs used to operate computers and execute specific tasks.
- Hardware refers to the physical elements that make up a computer or electronic system including the monitor, hard drive, memory, and the CPU.
- Digital transactions are online or automated transactions that occur between people and organizations without the use of paper.
- Communications technology, also known as information technology, refers to all equipment and programs that are used to process and communicate information.
- Digital data represents other forms of data using specific machine language systems that can be interpreted by technologies.
- Internet access involves connecting to the internet using personal computers, laptops, or mobile devices by users or enterprises, and is subject to data signaling rates.
Uses of ICT
- ICT is used in Education
- ICT is used in Business
- ICT is used in Government
- ICT is used in Medicine
- ICT is used in Banking & Finance
- ICT is used in Entertainment
- ICT is used in Transportation
ICT in the Philippines
- There are 119 million mobile phone subscriptions in the Philippines.
- There are 47 million active Facebook accounts in the Philippines.
- Filipinos spend 3.2 hours online on mobile and 5.2 hours online on desktop/tablet.
- The Philippines is the fastest-growing app market in Southeast Asia and has the highest digital population in the world.
- The top online activities are social media, videos, online mobile games, location-based search, and online shopping.
- Filipinos have a fundamental need to stay connected with loved ones, friends, and relatives.
- The Philippines is dubbed the "ICT Hub of Asia" because of the huge growth of ICT-related jobs.
- One ICT-related job is Business Process Outsourcing, or call centers.
Emerging Technologies
- Artificial Intelligence (AI) makes computers work and act like humans.
- Robotics computer science and engineering creates devices that move and react to sensory input.
- Biometrics is a technology used to measure and analyze human body characteristics such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns, etc.
- Quantum cryptography is the science of encoding and decoding information or messages which depends on physics, not mathematics and is used for information privacy and security.
- Computer Assisted Translation uses computers to assist in the translations of one or more natural languages into another or others, and vice versa.
- 3D imaging and holography is a photographic technique that uses light to project objects in a way that appears three dimensional.
- Virtual reality describes a three-dimensional computer-generated environment that can be explored and interacted with by a person.
Common Online Platforms
- Social media is an application and website where users can communicate, create and share content, and participate in online communities.
- E-commerce is a collection of software technologies that allows merchants to create a storefront on the internet.
- An online learning platform is an incorporated set of interactive online services that provides the teachers, learners, parents, and others involved in the education sector with tools and resources to support and enhance the delivery management of education through the internet.
- An online video platform is a service providing end-to-end tools used to create, customize, publish, and manage videos online.
Online Safety
- Online safety refers to the practices and precautions that should be observed when using the internet to ensure that users, their computers, and personal information are safe from crimes associated with using the internet.
- Internet safety refers to the online security or safety of people and their information when using the internet.
Internet Risk
- Cyber bullying happens when someone is intentionally abused, harassed, and mistreated by another person using electronic communication.
- Sexting is the act of sending sexually explicit text messages, images, and videos.
- Cyber stalking is a criminal practice where electronic communication is used to stalk or harass an individual or group.
- Identity theft is a crime of stealing personal information to assume a person's name or identity in order to make any form of transactions.
Internet Threats
- Malware is any malicious software, program, or file that is harmful to a computer user.
- A virus is a malicious program designed to replicate itself and transfer from one computer to another via the internet, local networks, FDs, CDs, etc.
- Worms are a malicious program that copy itself and spreads to computers; an Example is the I Love You virus.
- Onel de Guzman, 24 years old, studied at AMA computer college in Manila and created the "I LOVE YOU" virus/worms.
- A trojan is a malicious program accepted by the user as it disguises itself as a legitimate program but takes control of the user's computer.
- Spyware is a malicious program that gathers information from the victim's computer and sends it back to the hacker.
- Adware is an unwanted advertisement that pop ups several times on the victim's computer, then behave abnormally and becomes tedious to close.
- Ransomware is a ransom virus that blocks the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus.
- Spam, also known as junk email, is an unwanted email sent by an advertiser or bot and can be used to spread malware.
- Phishing is a cyberattack method using deceptive emails and websites to acquire sensitive personal information.
- Cybercrime is a crime in which a computer is used as an object and tool in hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief, and others.
Cyber Laws
- Republic Act 10627, or the Anti-Bullying Act of 2013, aims to protect children enrolled in kindergarten, elementary, and secondary schools and learning centers (collectively, "Schools") from being bullied.
- Republic Act 10175 OR Cybercrime Prevention Act of 2012, protects individuals from unwanted online cyber acts that may harm or evade one's privacy or integrity.
Netiquette
- Netiquette are the guidelines of acceptable behavior while using internet resources.
- Ten Rules of Netiquette:
- Remember the human.
- Adhere to the same standards of behavior online that you follow in real life.
- Know where you are in cyberspace.
- Respect other people's time and bandwidth.
- Make yourself look good online.
- Share expert knowledge.
- Help keep flame wars under control.
- Respect other people's privacy.
- Don't abuse your power.
- Be forgiving of other people's mistakes.
Online Search
- Online search is the process of interactively searching for and retrieving requested information via a computer from databases that are online.
- Interactive searches became possible in the 1980s with the advent of faster databases and smart terminals.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.