Trends and Issues in ICT

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following is the MOST accurate and comprehensive definition of ICT?

  • Technology used for entertainment purposes only.
  • Technology that handles telecommunications and access to information. (correct)
  • Technology limited to broadcast media and management systems.
  • Technology exclusively for network-based control.

How does cloud computing MOST directly benefit users?

  • By providing faster processing speeds for local applications.
  • By storing data only on personal devices.
  • By offering remote access to computing resources and on-demand scalability. (correct)
  • By eliminating the need for internet access.

Which of the following BEST exemplifies the use of the Internet of Things (IoT)?

  • Utilizing cloud storage for backing up personal files.
  • Connecting household appliances to a network for automated control. (correct)
  • Streaming videos on a laptop.
  • Using a smartphone to browse the internet.

What distinguishes 5G technology from its predecessors?

<p>Faster speeds, lower latency, and improved network capacity. (A)</p> Signup and view all the answers

What is the primary difference between data and information?

<p>Information is processed, while data is raw and unorganized. (B)</p> Signup and view all the answers

A hospital uses a system that automatically sends patient health data from wearable sensors to a central database for monitoring and analysis. This is an example of what type of communication technology?

<p>Machine-to-Machine communication. (D)</p> Signup and view all the answers

Which of the following scenarios BEST describes digital transformation?

<p>A business integrates ICT to streamline operations, enhance customer experiences, and foster innovation. (D)</p> Signup and view all the answers

What is the primary function of an operating system?

<p>To manage computer hardware and provide a platform for running other programs. (B)</p> Signup and view all the answers

In the context of web development, what characterized Web 2.0?

<p>User-generated content, social media, and dynamic applications. (D)</p> Signup and view all the answers

What is the primary goal of convergent technologies?

<p>To combine multiple independent technologies into a single device. (C)</p> Signup and view all the answers

Which of the following examples illustrates social use of ICT?

<p>Connecting people around the world instantly through the internet. (A)</p> Signup and view all the answers

What is the main purpose of assistive technologies?

<p>To provide support for mobility, daily tasks, and communication for individuals with disabilities. (B)</p> Signup and view all the answers

What is the primary goal of digital inclusion initiatives?

<p>To ensure equitable access to technology and the internet for marginalized communities. (B)</p> Signup and view all the answers

Which of the following BEST describes the purpose of Artificial Intelligence (AI)?

<p>Emphasizes the creation of intelligent machines that mimic human intelligence and behavior. (C)</p> Signup and view all the answers

How do robotics and AI relate to each other?

<p>AI can be combined with robotics to create intelligent machines that can interact with the world and make decisions. (C)</p> Signup and view all the answers

What is the main purpose of biometrics?

<p>To measure and analyze human body characteristics for identification and authentication purposes. (C)</p> Signup and view all the answers

How does quantum computing differ from traditional computing?

<p>Traditional computers can only encode information in bits that take the value of 1 or 0, while quantum computers use qubits to exist in multiple states. (A)</p> Signup and view all the answers

Why is quantum cryptography considered an ideally secure method of key distribution?

<p>Any attempt to intercept or measure the quantum states would introduce errors that can be detected, making eavesdropping obvious. (C)</p> Signup and view all the answers

What makes blockchain technology secure and reliable?

<p>Decentralized and distributed digital ledger that records transactions in a secure and irreversible manner. (C)</p> Signup and view all the answers

What is the primary purpose of Computer-Assisted Translation(CAT) tools?

<p>To assist translators and reviewers in handling translation and revision tasks faster and more efficiently. (D)</p> Signup and view all the answers

How does holography differ from traditional photography?

<p>Holography uses light to project objects in a three-dimensional way, while traditional photography captures only the intensity of light. (C)</p> Signup and view all the answers

What key element defines virtual reality (VR)?

<p>Creating a three-dimensional, computer-generated environment that users can explore and interact with. (B)</p> Signup and view all the answers

What is the key benefit of 5G standalone (5G SA) networks compared to previous network types?

<p>Greater coverage and a reduced time for latency. (A)</p> Signup and view all the answers

Why is edge computing becoming increasingly important?

<p>It offers the ability to manage big data effectively with potential growth in various industries. (A)</p> Signup and view all the answers

What BEST describes the function of spatial computing?

<p>How people interact with digital content. (D)</p> Signup and view all the answers

How do smart spaces improve efficiency of an area?

<p>They use connected technologies to help monitor a space. (D)</p> Signup and view all the answers

What is the PRIMARY function of homomorphic encryption?

<p>Allows for data processing without first having to decrypt the information. (D)</p> Signup and view all the answers

According to the reading, where does the metaverse take user interactions?

<p>Take place in digital spaces (B)</p> Signup and view all the answers

In the context of internet safety, what does "E-safety" encompass?

<p>Knowing about one's internet privacy and how one's behavior can support a healthy interaction with technology. (B)</p> Signup and view all the answers

What characterizes the 'Dark Web' layer of the internet compared to the 'Surface Web' and Deeep Web'?

<p>Content accessible via specific software or hardware where hackers may be present. (B)</p> Signup and view all the answers

How are Trojan malware programs typically activated?

<p>By disguising as a good system. (A)</p> Signup and view all the answers

What distinguishes a virus from other types of malware?

<p>Viruses can replicate to other devices. (A)</p> Signup and view all the answers

Distinguish the following: Phishing vs. Pharming

<p>Pharming is the same of the act of stealing you identity but more complex. (A)</p> Signup and view all the answers

What is the primary goal of 'Spamming'?

<p>To send unwanted bulk messages indiscriminately. (C)</p> Signup and view all the answers

What does cyberstalking typically involve?

<p>The use of electronic means to harass, intimidate, or threaten someone. (C)</p> Signup and view all the answers

What is the key difference between 'white hat' and 'dark hat' hackers?

<p>White hat hackers aim to improve security, while dark hat hackers exploit vulnerabilities for malicious purposes. (C)</p> Signup and view all the answers

What action is involved with Sextortion?

<p>The act of blackmailing someone by threatening to publicly share intimate images or videos. (D)</p> Signup and view all the answers

What does 'online predation' primarily target?

<p>Vulnerable individuals, often children, for sexual exploitation. (B)</p> Signup and view all the answers

Which of the following is the BEST example of intellectual property?

<p>A brand logo that identifies a company's products. (B)</p> Signup and view all the answers

How does a trade secret protect a business?

<p>By keeping valuable business information confidential and protected from authorized disclosure. (C)</p> Signup and view all the answers

Flashcards

What is ICT?

Technology used to handle telecommunications and access information, including broadcast media and network control, disseminating information.

Modern Definition of ICT

Convergence of technologies, including the internet and wireless mediums, focusing on accessing and sharing information.

Cloud Computing

Remote delivery of computing services (servers, storage, databases, applications) over the internet, accessible on demand.

CLOUD (digital environment)

Digital environment that uses computing to provide scalability (adjustment) and flexibility across devices or platforms.

Signup and view all the flashcards

Intelligent Cloud

Computing resources that use AI, referring to everything from AI connections.

Signup and view all the flashcards

Internet Access

Connection to the global network of computers and information resources, providing connectivity for devices to the internet.

Signup and view all the flashcards

Wi-Fi

Wireless networking technology that enables devices to connect to the internet without physical cables, operating on radio frequencies.

Signup and view all the flashcards

LTE

Cellular network technology that provides high-speed wireless internet access for mobile devices.

Signup and view all the flashcards

5G Technology

Latest generation of cellular network tech that offers very fast speeds, low latency, and improved capacity, enabling new applications and services.

Signup and view all the flashcards

DATA

Collection of raw facts/truths or stats, which can be text, observations, figures, images, numbers, graphs, or symbols.

Signup and view all the flashcards

Communication Technologies

Refers to all equipment and programs used to process and communicate information electronically.

Signup and view all the flashcards

Machine-to-Machine Communication

Direct exchange of data and instructions between sensors and devices without human intervention.

Signup and view all the flashcards

Human-to-Machine Communication

Focuses on how humans interact with their wearables by connecting human and machine.

Signup and view all the flashcards

Transactions (in ICT)

Exchange of information or goods electronically, often involving payment or data transfer.

Signup and view all the flashcards

Hardware

Physical components of an ICT system like computers, network devices and peripherals.

Signup and view all the flashcards

Software

Set of instructions that tells hardware how to perform specific tasks; including computer programs and apps.

Signup and view all the flashcards

Convergent Technologies

Two or more independent technologies that combine to form a new device.

Signup and view all the flashcards

The Internet of Things (IoT)

Everyday objects equipped with sensors and internet connectivity, creating interconnected ecosystems.

Signup and view all the flashcards

Virtual Reality (VR)

Is used to describe a three-dimensional, computer-generated environment that can be explored and interacted with by a person.

Signup and view all the flashcards

E-Governance and Citizen Participation

Aims to provide faster, more interactive communication online, with government services, promoting transparency and inclusivity.

Signup and view all the flashcards

Education and Skills Development

Online learning platforms and digital resources that democratize access to quality education and upskilling opportunities.

Signup and view all the flashcards

Assistive Technologies

Technology used by individuals with disabilities to perform functions that might otherwise be difficult or impossible.

Signup and view all the flashcards

Artificial Intelligence (AI)

Area of CS that emphasizes creation of intelligent machines that work and react like humans, mimicking human intelligence and behavior.

Signup and view all the flashcards

Robotics

Field of CS and engineering concerned with creating devices that can move and react to sensory input, often combined with AI.

Signup and view all the flashcards

Biometrics

Technology used to measure and analyze human body characteristics for authentication purposes.

Signup and view all the flashcards

Quantum Computing

An area of computing focused on developing computer tech based on the principles of quantum theory using quantum bits or qubits.

Signup and view all the flashcards

Quantum Cryptography

Encoding and decoding messages based on principles of physics and information security.

Signup and view all the flashcards

Cryptocurrencies

Digital currencies or tokens that can be use to buy goods and services.

Signup and view all the flashcards

Blockchain

Decentralized and distributed digital ledger technology that records transactions in a secure and irreversible manner.

Signup and view all the flashcards

Computer-Assisted Translation (CAT)

The use of computers that assist in the translation of one or more natural languages into another.

Signup and view all the flashcards

3D Imaging and Holography

Photographic technique using light to project objects in a way that appear 3D.

Signup and view all the flashcards

5G Networks

Users will be able to access to greater coverage and will experience lower latency with development of 5G standalone networks.

Signup and view all the flashcards

Online Predation

The use of internet to target and exploit vulnerable individuals(often children) for sexual purposes.

Signup and view all the flashcards

Cyberstalking

Electronic means threatening, harassing used over internet, social media, email.

Signup and view all the flashcards

Hacking

Access without authorization to steal control/gain data. There are two types.

Signup and view all the flashcards

Cyberbullying

Harmful posted/negative content bully and digital platforms using. Offensive content and abusive messages.

Signup and view all the flashcards

Study Notes

  • ETECH covers Trends and Issues in ICT, Online Safety, Netiquette and Digital Citizenship
  • Information and Communications Technology encompasses technologies for handling telecommunications and accessing info and includes media, management systems, and network control
  • Modern ICT involves the convergence of internet, wireless, computers, radio, TV, phones, hardware/software, connections, satellites, and video conferencing for distance learning.

Components of ICT

  • Cloud computing delivers computing services like servers, storage, and databases over the internet on demand and provides scalability and flexibility to access and use computing resources
  • CLOUD environment enables computing to provide scalability and flexibility across devices
  • Intelligent Cloud uses AI computing resources
  • Internet of Things connects everything
  • Microsoft Azure provides cloud services, including virtual machines, storage, databases, and analytics to businesses & individuals
  • Google Cloud Platform provides computing services such computer engines, storage, big data, and machine learning for businesses
  • Internet access is the connection to the global network of computers and resources
  • Wi-Fi (Wireless Fidelity) wireless networking to connect devices to the internet and each other without cables & operates in radio frequency (2.4 GHz or 5 GHz)

Wireless Access

  • LTE (Long Term Evolution) cellular tech providing wireless internet to smartphones and tablets with faster speeds, lower latency, and improved network capacity
  • 5G Technology is the latest cellular network promising faster speeds, lower latency, and improved network capacity
  • DATA is raw facts/truths or statistics in text, observations, figures, images, numbers, graphs, or symbols
  • INFORMATION is processed data
  • BIG DATA is structured and unstructured that organizations generate daily with sources like sensors, social media, web interactions, and transaction records

Using DATA

  • Medical records are patient data stored electronically for healthcare management.
  • Financial data covers transaction records and customer information for banking and financial services.
  • Communication technologies encompasses equipment and programs to process and communicate information
  • Machine-to-Machine communication facilitates data exchange and instructions between embedded sensors and devices without human intervention
  • Human-to-Machine communication focuses on human interaction with wearables
  • Wearable Technology enables M2M and HMI to create advanced wearable tech

Electronic Activity

  • Machine to Machine (M2M) provides data exchange and intelligence and Human to Machine Interface(HMI) allows humans access and control seamlessly
  • Transactions electronically exchange information or goods, often involving payment or data transfer
  • Online shopping allows for purchasing goods/services through e-commerce platforms
  • Mobile banking supports payments, fund transfers, and account management via mobile apps.

Types of Transactions

  • Mobile Wallets / e-wallets
  • Online Appointments / Reservations
  • Blockchain Technology

Hardware & Software

  • Hardware is physical components of an ICT system and include computers, network devices, and peripherals
  • PC's are desktops or laptops used for work, entertainment, communication
  • Smartphones provide mobile devices with internet, camera, and apps
  • Software is a set of instructions telling hardware to perform tasks
  • Operating systems manages computer hardware and provides a running platform (e.g., Windows, macOS, Linux)
  • Productivity software enables document creation, spreadsheets, presentations, and communication (e.g., Microsoft Office, Google Workspace)

What kind of software

  • System Software
  • Application Software
  • WEB (World Wide Web) has evolved and the Internet is a series of interconnected computer systems where the Web, files, and e-mails function and travel along

Generations of the WEB

  • WEB 1.0 (1991-1995): Static HTML pages with limited interaction
  • WEB 2.0 (2005-PRESENT): User-generated content, social media, and dynamic applications redefined engagement through platforms like YouTube and Wikipedia
  • WEB 3.0 (EMERGING): Immersive and decentralized space fueled by blockchain tech & semantic web concepts, supporting virtual reality experiences and AI content

Convergent Technologies

  • Convergent Technology combines independent technologies into a new device and multiple features serves a blended purpose, collect and use data, and is interconnected with devices for universal access
  • the Internet of Things (IoT): equips objects with sensors and internet for smart homes, cities, & industries
  • Cloud computing provides on-demand remote access to computing resources such as servers, storage, and applications
  • Convergence of Devices and Services creates smartphones, smart TVs blurring the line between TV and computing, and health-monitoring wearables

Social Inclusion

  • Social Use connects people around the world and the internet enables a faster and interactive communication online
  • E-governance & Citizen Participation are online platforms for government services, consultations, and civic engagement
  • Education & Skills Development involves online learning platforms, MOOCs, and digital resources democratizing education and upskilling
  • Healthcare & Wellbeing; telemedicine, patient monitoring, and AI improving healthcare access/delivery.

More Support

  • Assistive Technologies provide support for mobility, tasks, communication, independence, and quality of life for people with disabilities
  • Digital Inclusion Initiatives ensures equitable access for marginalized communities
  • Artificial Intelligence an area of computer science that is focused on creating machines that mimic human intelligence and behavior, including learning, reasoning, and decision-making
  • Robotics is computer science and engineering field creating devices that move and react to sensory input, combining AI with the mechanics of robots

Encryption

  • Biometrics measure and analyze human characteristics like DNA, fingerprints, eye retinas, voice, facial patterns, and hand measurements for authentication
  • Quantum computing develops computer technology based on quantum theory using quantum bits or qubits and harnesses subatomic particles to exist in multiple states
  • Quantum cryptography encodes/decodes information using physics for information privacy and security
  • Cryptocurrencies; digital currencies (tokens) like Bitcoin and Ethereum that use blockchain for online transactions
  • Blockchain is decentralized and distributed digital ledger tech that records transactions securely and irreversibly.

Communication

  • Computer-Aided Translation (CAT) uses computers to translate languages
  • CAT tools makes it easy to handle translation and revisions faster and more efficiently
  • 3D Imaging & Holography uses light to project objects three-dimensionally, creating holograms
  • Virtual Reality is a computer-generated environment that users can explore and interact with and technology immerses users in a realistic synthetic world Current Trends in ICT (January 2024):
    • 5G Networks increase speeds/capacity and reduce latency and the next wave will create stand alone networks
    • Edge Computing may provide computing for the 22 average connected devices owned by each U.S. household.
    • Spatial Computing is improving how we interact with the digital world.
    • Smart Spaces make use of connected technologies improves information and efficiency in the environment,

Security

  • Homomorphic Encryption allows data processing without decryption, enhancing data security without interrupting business processes.
  • Metaverse is gaining traction as more digital interactions take place

What is the Metaverse

  • The metaverse will allow for more connected interactions in virtual space
  • Internet profoundly impacts modern life connecting people and devices globally has transformed the way we live and interact
  • Internet is a high risk area, especially if you do not know what you are doing.
  • Deeper access in the internet = different purposes that lead to threatening situations.

3 Layers of the Internet

  • Surface or open web is indexable & searchable
  • Deep Web is non-indexed and non searchable
  • Dark Web content is only accessible via specific software or hardware and this is where hackers, and black markets reside
  • Internet security is the branch of computer security specifically related to the Internet, involving browser security and network security.
  • Internet safety (E-safety) includes knowing about internet privacy and how behavior affects interaction with technology.

How to Stay Safe Online

  • Be aware of your online behavior
  • Use strong passwords
  • Malware is a code that damages, disrupts, or steals data & disrupts the host or network.

Types of Malware

  • Trojans pretend to be good software but penetrates systems
  • Botnets are automatic bots that disrupt hardware
  • Worms can transfer, penetrate, and multiply but do not destroy
  • Online safety issues include threats, cyberstalking, and hacking

Malware in Detail

  • Cyberstalking is electronic harassment, intimidation, or threats
  • Hacking is unauthorized access to steal data or disrupt operations
  • White hat hackers are hired to check security vulnerabilities
  • Dark hat hackers commit human trafficking or sell exploited items
  • Cyberbullying (Trolling) uses digital platforms to post harmful content and abusive messages.
  • Sextortion is blackmailing by threatening to share intimate images/videos.
  • Obscene/offensive content is morally repugnant or offensive to a significant population segment.
  • Fake news is fabricated or misleading information presented as news
  • Online predation uses the internet to target and exploit vulnerable individuals, often children, for sexual purposes.

Concerns about Online Ethics

  • Data privacy
  • Protection of private information
  • Issues of libel(verbal or written)
  • Limits when expressing freedom
  • Intellectual property rights gives exclusive rights to creative work for reproduction, distribution, display, and adaptation
  • Patents grants the rights to the inventor
  • Trademark protects words, phrases, symbols or designs to identify goods and services.
  • Trade secret gives a competitive advantage and is protected from disclosure.
  • Spreadsheet is an interactive computer application to store data in a horizontal tabular form and has virtual design features

Spreadsheet Structure

  • Workbook: collection worksheets
  • Worksheet: collection of vertical rows and horizontal columns
  • Cells when rows and columns intersect horizontally
  • Formulas calculate automatically
  • Number System (Nx):Binary(N2), Decimal(N10), and .Octal:N8 and has Conversion
  • Data analytics involves inspecting data sets using specialized systems & software to draw conclusions on specific information
  • Spreadsheet use table that contains data
  • Vlookup, Hlookup, and Xlookup are the 3 types of tables
  • Absolute value is used to display and show results

Programming Software

  • System Software: required
  • Application Software: optional
  • Programming Software: exclusive
  • Driver Software: optional
  • Developer design the concept and development

Personnel

  • Engineer / Programmer interprets design into program, focuses on user interface, and Builds the software
  • Utility software is dependent
  • Business, General purpose, and Custom developed apps are types of the utility software
  • Texture provides the quality and appearance of a surface
  • Typography is the carrier of message
  • Space highlights parts of the message
  • Principles of Design include repetition, pattern, and rhythm

Graphics & Design Notes

  • Element is what you add
  • Form can add 3D effect
  • Shape combines areas or combined elements
  • Line creates design modes
  • Color adds a feeling and addition

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Cloud Computing Basics IT2314
37 questions
Introduction to ICT and Cloud Computing
29 questions
Cloud Computing in ICT Industry
5 questions
ICT and Cloud Computing Quiz
13 questions
Use Quizgecko on...
Browser
Browser