e tech Flashcards

1
Q

When the World Wide Web was invented, most web pages were static. Static (also known as flat page or stationary page) in the sense that the page is “as is” and cannot be manipulated by the user. The content is also the same for all users. This is referred to as

A

Web 1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

allows users to interact with the page: instead of just reading a page, the user may be be able to comment or create a user account.

A

Web 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Features of Web 2.0
It allows users to categorize and classify/arrange information using freely chosen keywords (e.g., tagging).

A

Folksonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Features of Web 2.0
Content is dynamic and is responsive to user’s input. An example would be a website that shows local content.

A

Rich User Experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Features of Web 2.0
Services are offered on demand rather than on a one-time purchase. In certain cases, time-based pricing is better than file-size-based pricing or vice versa.

A

Long tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Features of Web 2.0
The owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comment, reviews, and evaluation

A

User Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Features of Web 2.0
Users will subscribe to a software only when needed rather than purchasing them. This is a cheaper option if you do not always need to use a software.

A

Software as a Service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Features of Web 2.0
It is a diverse information sharing through universal web access.

A

Mass Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

According to the W3C, “The Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries.’

The aim of Web __ is to have machines (or servers) understand the user’s preferences to be able to deliver web content specifically targeting the user.

A

Web 3.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Several problems of Web 3.0

A
  1. Compatibility
    HTML files and current web browsers could not support Web 3.0.
  2. Security
    The user’s security is also in question since the machine is saving his or her preferences.
  3. Vastness
    The World Wide Web already contains billions of web pages.
  4. Vagueness
    Certain words are imprecise. The words “old” and “small” would depend on the user.
  5. Logic
    Since machines use logic, there are certain limitations for a computer to be able to predict what the user is referring to at a given time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(stands for malicious software) is a set of instruction that run on your computer and make your system do something than an attacker wants to.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of Malware
program designed to replicate itself and transfer from one computer to another

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of Malware
a malicious program that transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself. For example, the ILOVEYOU worm (Love Bug Worm) created by a Filipino.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Types of Malware
a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allow hackers to get your information.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all.

A

Rogue security software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of Malware
a program than runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging.

A

Spyware

17
Q

used to record keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.

A

Keyloggers

18
Q

Types of Malware
a program designed to send you advertisements, mostly as pop-ups

A

Adware

19
Q

unwanted email mostly from bots or advertisers. It can be used to send malware

A

Spam

20
Q

its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information.

A

Phishing

21
Q

a more complicated way of phishing where it exploits the DNS (Domain Name Service) system. DNS is the phonebook of the Internet.

A

Pharming