Rules of Netiquette & Trends in ICT

Rules of Netiquette  
  Image result for the internet
The internet
          The internet, sometimes called simply ‘the Net’ is a worldwide system of computer networks –a network of networks in which users at any one computer can, if they have permission get from any other computer (and sometimes directly to users at other computers)
Operating system (OS)
         An operating system or (OS) is the program that, after being initially loaded into the computer by a boot program manages at the other program of the computer.
Operating system (OS)
        The other programs are called applications or application programs. The application programs make use of the operating system by making request for services through a defined application program interface
(API). In addition, through a user interface such as a command line or a graphical user interface (GUI).

SOFTWARE
     Image result for computer software
Computer software Is a part of computer system that consists of data or computer instructions, in contrast to the physical hardware from which the system is built.
     Computer software includes computer program, libraries and related non-executable data such as online documentation or digital media. Computer hardware and software required each other and neither can be realistically used on its own.


Image result for internet and web threats
Internet/web threats
       A web threat is any threat that uses the world wide web to facilitate cybercrime. Web threats use multiple types of malware and fraud, all of each utilize HTTP or HTTPS protocols but may also employ other protocols and components, such as links in email or IM or malware attachments or on servers that access the web.
Web threats pose a broad range of risks, including financial damage, identity theft, loss of confidential information/data, theft of network resources, damaged brand/personal reputation and erosion of consumer confidence in  e-commerce and online banking.

Image result for cybercrime poster
CYBERCRIME
A crime committed or assisted through the use of internet


Image result for malware
MALWARE
Malware
short for malicious malware, is an umbrella term use to refer to a variety forms of hostile or intrusive software.

Kinds of malware
1.    Virus
2.    Worm
3.    Trojan
4.    Spyware
5.    Adware

Image result for computer virus images

Computer Virus
A computer virus is a type of malicious software program(malware) that, when executed, replicates itself by modifying other computer and inserting its own code. Infected computers programs can include as well data files or the ‘boot’ sector of the hard drive.
I love you virus.
Viruses can be spread through:
Email
Social networks
Text messages
Internet downloads

Computer worm
Image result for computer worm virus
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
Many worms that have been created are designed only to spread and do not attempt to change the systems they pass through. However, as the Morris worm and Mydoom showed, even these ‘payload-free’ worms can cause major disruption by increasing network traffic and other unintended effects.

                                                       Computer Trojan
Image result for computer trojanTrojan horse, or Trojan, is any malicious computer program which misleads users of its true intent. The term is derived from the Ancient Greed story of the deceptive wooden horse that led to the fall of the city of Troy.


Related image
Computer Spyware
Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner’s private information. Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes (also known as keylogging), passwords, and other valuable data.
Adware
The term adware is frequently used to describe a form of malware (malicious software) which presents unwanted advertisements to the user of a computer

                                                              SPAM
Image result for spam computer
Electronic spamming is the use of electronic messaging systems to send an unsolicited message (spam) especially advertising, as well as sending messages repeatedly on the same site.                                                         
It is named after the Spam, a luncheon meat, by way of a Monty Python sketch about a restaurant that has spam in every dish and where patrons annoyingly shout spam over and over again. Junk email

Image result for phishing

Phishing
Is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money0, often for malicious reasons, buy disguising as a trustworthy entity in a electronic communication.
The word is a neologism created as a homophone of fishing due to the similarity of using a bait in an attempt to catch a victim.

Related image
TRENDS IN ICT
Convergence
-         is the synergy of the technological advancements to work on a similar goal or task.
Social media
Is a website, application or online channels that enables web users to create, co- create, discuss, modify and exchange users-generated content.
Image result for types of social media
TYPES OF SOCIAL MEDIA

g_100627_social_network_sm_280x210.jpgSocial networks
These are site that allow you to connect with other people with the same interest or background
Example: Facebook or Friendster

Bookmarking site
Related imagethese are sites that allow you to store and manage links to various website and resources. Most of this sites allow you to create a tag that allow you and other to easily search and share Item.
Example: stumble upon and Pinterest

Image result for social news
Social news
These are sites that allows users to post their own news items or links to other news sources. The users can also comment on the post and comments may also be rated
Example: Rappler


Media sharing
Image result for media sharingThese are sites that allow you to upload and share media content like images, music. And video. Most of these sites have additional social like liking, commenting and Having user profiles
Example: Instagram



Image result for microblogging Microblogging
These are site that focus on short updates from the users. These subscribed to the user will be able to receive these updates
Example: Twitter and Plunk


Image result for blogs and forumsBlogs and forums
These websites allows the user to post their contents. Other user able to comment on the said topic.
Examples: Blogger and WordPress


Related imageMobile technologies
iOS - for iPhone
Black berry OS - for blackberry
Android OS - for android phones
Symbian OS - for Nokia
Web OS - these OS is usually use for TV Like LG
Windows Mobile - the operating system for smartphone and windows Phone

Related imageAssistive media
These media are helping people with visual and reading impairments









Comments

Popular posts from this blog

Mailmerge, Hyperlink and Animation

Layout and graphics