Академический Документы
Профессиональный Документы
Культура Документы
Three factors:
1. ABILITY
- is what you are capable of doing
2. MOTIVATION
- Determines what you do
3. ATTITUDE
- Determines how well you do it
These three factors are according to Lou Holtz (football coach)
Impacts of ICT:
1. Speed
2. Convenience
3. Portability
COMPONENTS OF IT
1. Hardware - Physical Equipment
2. Software - Program/ set of instructions that tells the hardware how to perform task
3. Peopleware - user
4. Communication - connectivity
5. Procedure – methods on how things are done
USES OF ICT
There are six things ICT is good at or six core uses of ICT that make it valuable to organisations:
TRENDS in ICT
1. Convergence – is the synergy of technological advancements to work on a similar goal or task
2. Social Media – a website, application or online channel that enables web users to create, co-create, discuss,
modify and exchange user generated contents
3. Mobile Technologies - used for cellular communication, smartphones and tablets
4. Assistive Media – designed to help people who have visual and reading impairments.
Social Media
• Social Networks- sites that allow you to connect with other people with the same interest or background.
• Bookmarking – sites that allow you to store and manage links to various websites and resources.
• Social News – sites that allow users to post their own news items or links to other news sources.
• Media Sharing – sites that allow you to upload and share media content like images, music, and video.
• Micro blogging – sites that focus short updates from the user.
• Blogs and Forums- these allow users to post their content.
Mobile Technologies
iOS – used in Apple devices
Android – open source operating system developed by Google.
Blackberry OS – used in Blackberry devices
Windows Mobile – developed by Microsoft
Symbian – used by nokia devices
Web 1.0
A static web page (sometimes called a flat page/stationary page) is a web page that is delivered to the user
exactly as stored.
Web 2.0
A dynamic website contains information that changes, depending on the viewer, the time of the day, the time
zone, the viewer's native language, and other factors.
Web 3.0
The Semantic Web provides a common framework that allows data to be shared and reused across application,
enterprise, and community boundaries.
- Movement led by World Wide Web consortium (W3C).
- The term "Semantic Web" was coined by Tim Berners-Lee, the inventor of the World Wide Web and director
of the World Wide Web Consortium ("W3C"), which oversees the development of proposed Semantic Web standards.
He defines the Semantic Web as "a web of data that can be processed directly and indirectly by machines".
What Elements and Practices Can Help Create a Good Working Environment?
Appropriate positioning of monitors, keyboards and adjustable chairs
Use of a mouse mat
Use of a monitor filter
Provision of adequate lighting and ventilation
Frequent breaks away from the computer
Good criteria when choosing a password or setting up password guidelines include the following:
Don't pick a password that someone can easily guess if they know who you are (for example, not your
National Insurance number, birthday, or maiden name)
Don't pick a word that can be found in the dictionary (since there are programs that can rapidly try every
word in the dictionary!)
Don't pick a word that is currently newsworthy
Don't pick a password that is similar to your previous password
Do pick a mixture of letters and at least one number
Do pick a word that you can easily remember
Many networks require that you change your password on some periodic basis
Computer Malware
Malware
short for malicious software, is an umbrella term used to refer to a variety of forms of hostile or intrusive
software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and
other malicious programs.
Trojan horse- is a program in which malicious or harmful code is contained inside apparently harmless
programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the
file allocation table on your hard disk
- A Trojan horse may be widely redistributed as part of a computer virus
Worm - is a self-replicating virus that does not alter files but resides in active memory and duplicates itself
- Worms use parts of an operating system that are automatic and usually invisible to the user
- It is common for worms to be noticed only when their uncontrolled replication consumes system
resources, slowing or halting other tasks
Phishing
Phishing: scam by which an e-mail user is duped into revealing sensitive information such as passwords and
credit card details
Do not open e-mail attachments unless they are from a trusted source
Install a firewall program
Buy anti-virus software that can screen e-mail attachments
Keep anti-virus software up to date on a weekly basis
Schedule regular virus scans of hard drives
Install all the critical Windows updates from Microsoft
Be aware of hoax e-mail warnings