Summary

This document titled "ICT102 Reviewer" by Naithan P. Bundajon covers various aspects of information and communication technology. It discusses online systems, the internet including web evolution, cybersecurity, online safety, applied productivity tools and web design.

Full Transcript

5.​ Entertainment ICT102 Reviewer -​ Individuals can experiment with a variety Prepared by: ASEC (Naithan P. Bundajon) of activities, including watching movies,...

5.​ Entertainment ICT102 Reviewer -​ Individuals can experiment with a variety Prepared by: ASEC (Naithan P. Bundajon) of activities, including watching movies, playing online games, and listening to music. Unit I. Exploring ICT Technologies Evolution of the Internet Lesson 1: Online Systems, Functions, and Platforms 1.​ WEB 1.0 -​ Allows information to be displayed on Information and Communication websites. Technologies -​ Suitable for personal websites. -​ Charges the user based on the number 1.​ Information Technology of pages viewed. -​ The use of technology to solve problems -​ Allows users to search for specific information. -​ Four Design Elements for WEB 1.0: 2.​ Information and Communication 1.​ Pages that are static. Technologies 2.​ The server’s file system is used -​ Focused on those that allow you to to serve the content. communicate with others using 3.​ Pages created with Server Side telecommunications like the Internet and Cellular Includes (SSI) or the Common Phones Gateway Interface (CGI). 4.​ The items on a page are Internet positioned and aligned using frames and tables. -​ A vast network that connects computers all over the world. 2.​ WEB 2.0 -​ People can share information and communicate from anywhere with an Internet connection. -​ Refers to global websites that -​ World Wide Web (WWW) emphasizes user generated content, usability, and interoperability. -​ Refers to a social network that is Uses of Internet participatory. -​ Key Features of WEB 2.0: 1.​ Online Banking and Cashless Transactions 1.​ Folksonomy - Allows users to -​ Online banking to securely transfer categorize and classify funds between accounts, change their information using chosen ATM pin, apply for physical or virtual keywords. credit cards, and among other things. 2.​ Rich User Experience - Content is dynamic and is 2.​ Education and Research responsive to user’s input. -​ Conduct research on a particular subject 3.​ User Participation - Allowing by spending a few minutes on the users to place a content of their internet. own by means of comments, reviews, and evaluation. 3.​ Electronic Mail (Email) Allowing users to comment. -​ Internet’s first significant use. 4.​ Long Tail - Services that are -​ Enables people to communicate more offered on demand rather than quickly over the internet and can easily on a one time purchase. share information, data files via email, 5.​ Software of a Service - Users and including other things. will subscribe to a software only when needed rather than 4.​ Social Networking purchasing them. -​ Brought people all over the world 6.​ Diverse Participation - Diverse together. information sharing through -​ Share information, thoughts, and ideas universal web access. about anything in the world 3.​ WEB 3.0 System -​ Refers to the evolution of web use and -​ A set of principles of procedures according to interaction, that transforms Web into a which something is done, in other words, it is database. organized scheme or method -​ Refers to a number of distinct evolutions -​ Online System Functions: of web usage and interaction. 1.​ Storing -​ Data is not owned, rather it is shared. 2.​ Managing -​ Also called the “Semantic Web” that 3.​ Using promises to organize the world’s 4.​ Gathering of Data information in a more logical manner. -​ Key Features of WEB 3.0: Internet of Things (IoT) 1.​ Semantic Web - Allowing creation, sharing, and -​ The cast assemblage of physical objects connection of content via search equipped with sensors and software that enable and analysis based on the them to interact with little human intervention by ability to comprehend the collecting and exchanging data via a network. meaning of words rather than on keywords or numbers. Lesson 2: Cybersecurity, 2.​ Artificial Intelligence (AI) - Computers in WEB3.0 can Netiquettes, and Online Research distinguish data in the same Skills way that humans do in order to provide more relevant and timely results. Develops greater Cybersecurity intelligence as a result of user -​ Process of preventing harmful assaults on requirements. computers, servers, mobile devices, electronic 3.​ 3D Graphics - Makes use of systems, networks, and data. 3-dimensional design. Used ink -​ Categories of Cybersecurity: contexts of museum guides, 1.​ Network Security - Involves preventing computer games, ecommerce, unwanted access, abuse, and theft of etc. the underlying networking infrastructure. 4.​ Connectivity - Information is 2.​ Application Security - A collection of more connected in WEB3.0 as a controls intended to guard against the result of semantic metadata. theft or manipulation of data or code at User experience advances to a the application level. Covers security new level of connectivity that both before and after the program is takes advantage of all available deployed. data. 3.​ Information Security - Known as 5.​ Ubiquity - Multiple applications InfoSec, a collection of security can access the same content, practices and tools that serve to every device is connected to the safeguard critical business data against web, and the services are unauthorized access, abuse, available from anywhere. interruption, and destruction. 4.​ Operational Security (OPSEC) - A Platform security and risk management method and strategy that classifies data before deciding what needs to be done to -​ “If you can program it, then it is a platform. If you safeguard it and keep it out of the wrong cannot, then it is not.” - Marc Andreessen hands. -​ Online Platform Categories: 5.​ Disaster Recovery and Business 1.​ Social Media Continuity - How an organization 2.​ Search Engines responds to a cyber-security incident or 3.​ Communication Services any other event that causes the loss of 4.​ Service Payment operations or data, to return the same 5.​ Systems Advertising Platforms operating capacity as before an incident. 6.​ Creative Content Outlets 6.​ End-User Education - Employee awareness is increased by end-user education, which provides them with the knowledge and abilities to safeguard their own data and that of the firm from any incident or harm. -​ These are only suggestions in being polite, Importance of Cybersecurity rather than laws. -​ Protects all aspects of data from theft and Netiquettes Golden Rules damage. 1.​ Respect people’s privacy -​ Your firm or organization cannot survive on its 2.​ Be mindful of your language own, it needs a cybersecurity program. 3.​ Don’t be sarcastic -​ Safeguarding organizations and individuals 4.​ Choose your emojis carefully against the potentially disastrous repercussion 5.​ Respect others views of a security breach. Lesson 3: Applied Productivity Common Cyber Threats Tools with Advanced Application 1.​ Malware - Malicious software that provides Techniques unauthorized access or causes damage to computers. Review of Basic Computer Navigations 2.​ Ransomware - Locks down files, data, systems, 1.​ Windows / Tabs and threatens to destroy data unless ransom is 2.​ Menu Bar paid to the cyber attackers. 3.​ Navigation Button 3.​ Phishing - Includes online scams, emails, or 4.​ Function Buttons text messages that appear to come from 5.​ Dropdown Menu / Options legitimate companies but are asking for sensitive 6.​ Hover Options information. 7.​ Sidebar / Toolbar 4.​ Insider Threats - Current or former members of 8.​ Workspace an organization who still have access to 9.​ Clickable Data information and happen to abuse these access rights. Essential Productivity Applications 5.​ Man-in-the-Middle Attacks - An attack where a 1.​ Word Processing (Google Docs / Microsoft cybercriminal intercepts. Word) 2.​ Spreadsheet (Microsoft Excel / Google Sheets) Cookies (Internet Cookies) 3.​ Google Forms 4.​ Schedule Management (Google Calendar) -​ Small files of information that a web server 5.​ Community Profiling (Google Earth) generates and sends to a web browser. -​ Used to identify your computer as you use a network. Lesson 4: Imaging and Design for -​ Cookies are also used to identify specific users Online Environment and improve their web browsing experience. -​ Data that is stored in a cookie is created by the Image server upon your connection, which is labeled -​ A binary representation of visual information, with an ID unique to your computer. When such as drawings, pictures, graphs, etc. exchanged between computers and the network server, the server reads the ID and knows what information to specifically give you. Graphics -​ Refers to a design or visual image displayed on various surfaces, including canvas, walls, signs, 5 Basic Online Safety Tips or a computer monitor. 1.​ Make sure you are using a secure internet Layout connection -​ Part of a graphic design that deals in the 2.​ Choose strong passwords arrangement of visual elements on a page. 3.​ Enable multi-factor authentication 4.​ Keep software and operating systems updated 5.​ Check the website’s reliability Image -​ A binary representation of visual information, such as drawings, pictures, graphs, etc. Netiquette (Also called as “Etiquette for the Internet”) Image Background Removal -​ A new term that is made-up from the combined -​ The process of eliminating or altering the terms “Net” and “Etiquette”. backdrop of an image or video. -​ Standards of behavior for polite and proper online conversation. Color Correction -​ Process of fixing the color properties of an image to make it consistent with how human eyes see things in the real world. Color Grading -​ A process of setting the mood or ambiance of a piece. Nine Image Manipulation Techniques 1.​ Cropping 2.​ Color Balance 3.​ Brightness and Contrast 4.​ Compression and Resizing 5.​ Filters 6.​ Cloning 7.​ Changing the Background 8.​ Removing the Color 9.​ Combining Text, Graphics, and Image Web Design -​ Refers to the design of the website. -​ Refers to the user experience aspects of website development rather than software development. -​ Two Ways on How to Design a Website: 1.​ Responsive Web Design - Adapts to the device’s resolution. 2.​ Adaptive Web Design - It may have similarities with the responsive web design, the key difference is in the way the information is tailored. Infographics -​ Visual representations of information, designed to make complex data more accessible and engaging. -​ A combination of visuals, text, and data—this effectively communicates complex ideas making them ideal for simplifying heavy information. Rules of Infographics 1.​ Clear and Concise Message -​ Identify the Main Point -​ Keep it Simple 2.​ Visual Hierarchy -​ Prioritize Information 3.​ Effective Use of Color -​ Color Psychology -​ Color Palette 4.​ Typography -​ Font Choice -​ Font Size and Style 5.​ Data Visualization -​ Choose the Right Chart Type -​ Data Accuracy 6.​ Maintain Consistency

Use Quizgecko on...
Browser
Browser