Trends in Ict

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

TRENDS IN ICT

Convergence- technological convergence is the synergy of technological advancements to work on


similar goal or task. Convergence is using several technologies to accomplish a task conveniently.
Social media- is a website, application, or online channel that enables web users to create, co-create,
discuss, modify, and exchange user-generated content.
There are six types of social media
Social networks- these are sites that allow you to connect with other people with the same interest or
background. Examples: Facebook and Google
Bookmarking sites- These are sites that allow you to store and manage links to various websites and
resources. Examples: StambleUpon and Pinterest
Social news- these are sites that allow users to post their own news items or links to other news sources.
Examples: reddit and digg
Media sharing- These are sites that allow you to upload and share media content like images, music, and
video. Most of these sites have additional social features like liking, commenting, and having user
profiles. Examples: Flicker, YouTube, and Instagram
Microblogging- These are sites that focus on short updates from the user. Those subscribed to the user
will be able to receive these updates. Examples: Twitter and Plurk
Blogs and Forums- These websites allow users to post their content. Other users are able to comment on
the said topic. There are several free blogging platforms like blogger, wordpress, and Tumblr. On the
other hand, forums are typically part of a certain website or web service.

Mobile Technologies
iOS
Android
Blackberry OS
Windows Phone OS
Symbian
WebOS
Windows Mobile
Assistive media
Is a nonprofit service designed to help people who have visual and reading impairments. A database of
radio recordings is used to read to the user.
Internet threats
Malware- stands for malicious software.
Virus- a malicious program designed to replicate itself and transfer from one computer to another either
through the Internet and local networks or data storage like flash drives and CDs.
Worm- example: the ILOVEYOU worm (Love Bug Worm) created by a Filipino.
Trojan- a malicious program that is disguised as a useful program but once downloaded or installed,
leaves your PC unprotected and allows hackers to get your information.
Rogue security software- tricks the user into posing that it is a security software.
Spyware- a program that runs in the background without you knowing it (thus called “spy”). It has the
ability to monitor what you are currently doing and typing through keylogging.
Keyloggers- used to record the keystroke done by the users. This is done to steal password or any
sensitive information. It can record email, messages, or any information you type using keyboard.
Adware- a program designed to send you advertisements, mostly as pop-ups
Spam- unwanted email mostly from bots or advertisers. It can be used to send malware
Phishing- its goal is to acquire sensitive personal information like passwords and credit card details. This
is done by sending you an email that will direct the user to visit a website and be asked to update his/her
username, password, credit card or personal information.
Pharming- a more complicated way of phishing where it exploits the DNS (Domain Name Service)
System.
MULTIMEDIA CONTENT
1. VIDEOS- Through video hosting sites, you can take a video and show it to the entire world.
Example (YouTube)
2. Sound, Music, or Audio- If videos are too much for you, you can always record sounds. You can
now share your sound bites to the entire world. (Soundcloud)
3. Online games- Game developers now create what is called (“browser-based games”) You do not

You might also like