🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

itikrev2.docx

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Online Platforms in ICT - Online platforms make it easier for users to interact and collect data from the user\'s interactions. Web Search Engines - A software system designed to search for information on the World Wide Web (WWW). Results are presented in the form of Search Engine Results Pages (SE...

Online Platforms in ICT - Online platforms make it easier for users to interact and collect data from the user\'s interactions. Web Search Engines - A software system designed to search for information on the World Wide Web (WWW). Results are presented in the form of Search Engine Results Pages (SERPs). Communication Services - Enterprise communications solutions outsourced and leased from a single vendor or provider. Communication Service Providers (CSPs) transport information electronically and can include public or private telecom, internet, cable, and satellite services. Payment Systems - Systems used to settle financial transactions through the transfer of monetary value, including people, instruments, rules, procedures, standards, and technologies. Advertising Platforms - Platforms allowing users to create and manage advertising campaigns, generate reports, and retrieve information related to ads and campaigns. Creative Content Outlets - Content that requires creative translation. Cloud Computing: Platforms like Dropbox, Google Drive, and Microsoft OneDrive allow users to store and access files online, enabling collaboration and remote access from any device with internet access. Blogging Tools: Blogger and WordPress are two popular blogging platforms that allow users to publish content online easily. Blogger is typically recommended for beginners due to its simplicity and ease of use. - Presentation Tools: Prezi, Zoho Shows, MS PowerPoint - Newsletter ICT Content Platforms: Dropbox, Tumblr, Wix - Photo Editing Tools: Picasa, Adobe Photoshop, GIMP - Video Editing Tools: Sony Vegas Pro, Windows Movie Maker, Adobe Premiere Pro - Photo Uploading and Hosting Tools: Dropbox, Flickr - Online Collaborative Tools: Google Drive, Viber, Facebook - Cloud Computing: Dropbox, Google Drive, Microsoft One Drive - Blog Tools: Blogger, WordPress, LiveJournal - Mapping Tools: Google Maps, Waze, Wikimapia - Music Production Tools: Sony Vegas Pro, Audacity, Virtual DJ - Survey and Forms Tools: Google Forms - Web Design Platforms: Wix, Weebly, Adobe Dreamweaver - Web Management Platforms: Drupal, WordPress, Joomla Email Spam - AKA Junk mail - Usually unsolicited commercial email sent from an unknown source with identical messages sent to multiple recipients. - Usually not dangerous but can be time and space-consuming. - Dangerous ones can carry viruses and other malicious software (Malware). - A deceitful email practice in which the sender address is changed to appear as though it has come from someone you know. - Used by spammers to hide the origin of spam. - A deceitful practice to acquire confidential information such as passwords and credit card details by pretending to be a trustworthy source. - Usually done via emails or using popular entities like Microsoft, Google, or financial institutions. - A hacker attack where website traffic is redirected to a fake website. - The goal is to steal sensitive information like usernames, passwords, and financial details. - A computer program covertly installed to collect information or take control without the user's knowledge. - Can monitor internet habits and affect the computer's performance. - A dangerous program that replicates itself across networks. - Some delete files, others disrupt networks. - Spread through email and running attachments from suspicious sources. - Malware that pretends to perform a legitimate function while secretly performing harmful actions. - Can disable defenses, erase data, or corrupt files. - A program that duplicates itself and infects the computer. - Spread through removable storage devices. - Can cause damage ranging from mild to severe. - A person who can enter and control other computers without authorization.

Use Quizgecko on...
Browser
Browser