E-TECH Flashcards
an umbrella term which covers any communication
ICT
Who invented World wibe web
Sir Tim Berners- LEE in 1989
are what make up the world wide
web and it can either be static or dynamic.
Web pages
, the user cannot manipulate or edit the
content of the page, as well as, the content is same for all
the users.
WEB 1.0 (STATIC WEB)
most of the websites contain dynamic
content or has interactive characteristics.
WEB 2.0 (DYANAMIC WEB)
WHAT ARE THE SIX FEATURES OF WEB 2.0
FOLKSONOMY, RICH USER EXPERIENCE, USER PARTICIPATION, LONG TAIL SERVICES, SOFTWARE AS A SERVICE, MASS PARTICIPATION
This feature allows user to
categorize and classify/arrange
information (ex.: hashtag like
#NewNormal).
FOLKSONOMY
This feature deals with how a
site uses user information for a
personalized content (ex.:
blog/vlog, social media accounts,
et cetera)
RICH USER EXPERIENCES
This means that those who view
the website can also put their
own information (ex.: the
comment section and/or the
reaction button of Facebook)
user participation
These services offer services on
demand as opposed to a one-time
purchase (ex.: the Netflix user must pay
the monthly subscription fee to enjoy
binge-watching)
LONG TAIL SERVICES
This feature deals with diverse
information sharing through universal
web access (ex.: regardless your
nationality, gender, et cetera, you can
share information online, but make
sure, it is not fake).
MASS PARTICIPATION
It contains how users would subscribe
to a software as opposed to
purchasing them (Ex.: thesis group
members can collaborate online
through Google Docs,
SOFTWARE AS SERVICE
It aims to produce machine that can understands the user’s
preferences. This machine can serve better by “learning”
from the previous choices of the user.
WEB 3.0 (SEMANTIC WEB)
ability of Web technologies to understand and
interpret human-generated content
EXAMPLE: Apple’s Siri
Semantics
WHO COINED WEB 3.0?
JOHN MARKOFF IN 2006
HTML FILES AND CURRENT WEB BROWERS COULD NOT SUPPORT
COMPABILITY
IT MIGHT NOT UNDERTSAND SARCASM
LOGIC
SAVING USERS PREFERANCE IS THE MAIN IDEA OF WEB3.0. IT IS ACHIEVABLE WITH THE CURRENT STATE OF ICT
SECURITY
WEB 3.0 MACHINE MUST CATER ALL LANGUAGES AS THIS THIRD GENERATION OF WEB AIMS TO SEARVE DIVERSE USERS.
VAGUENESS
INFORMATION COMES FROM BILLIONS OF WEB PAGES IS THE MEAIN FEATURE OF THE INTERNET
VASTNESS
WHAT ARE THE ICT TRENDS?
SOCIAL MEDIA, CONVERGENT MEDIA, M,OBILE TECHNOLOGIES, ASSSISTIVE MEDIA
THESE WEBSITES THAT LLOWAS THE NETIZENS TO CREATE, DISCUSS, AND EXCHANGE USER GENERATED CONTENT
SOCIAL MEDIA
WHAT ARE THE 6 TYPES OF SOCIAL MEDIA?
SOCIAL NETWORKS, BOOKMARKING SITE, SOCIAL MEDIA NEWS,MEDIA SHARING, MIRCO BLOGGING, BLOGS AND FORUMS
ENABLES THE USERS TO CONNECT WITH OTHER USERS EX: FB GOOTGLE
social networks
ALLOWS USER TO STORE AND MANAGE LINKS TO VARIOUS WEBSITES AND RESOURCES EX: PINTE
BOOKMARKING SITE
THIS SITE PROMOTES SHARING BETWEEN THE NEWS PROVIDER AND THE USER, BECOMES A CENTRAL HUB FOR NEW STORIES FROM VARIOUS OTHER THIRD PARTY EC: REDDIT
SOCIAL MEDIA NEWS
ENABLE USERS TO UPLOAD AND SHARE MEDIA CONTENT LIKE IMAGE, VIDEO, MUSIC TO LIKE ex: TIKTOK, YT, INSTA
MEDIA SHARING
FOCUSES ON SHORT UPDATES FROM USERS EX: TWITTER
MICROBLOGGING
USER POST THEIR OWN WRITE UPS, JOURNAL, DIARY. FORUM IS A PART OF CERTAIN WEBSITES WHEREIN USERS CAN HOLD AN ONLINE DISCUSIION ABOUT CERTAIN TOPIC
EX: BLOGGER. WORD PRESS
BLOGS AND FORUMS
THE COMBINATION OF TWO OR MORE DIFFERENT ENTITIES OF TECHNOLOGO=IES TO CRATE A NEW SINGLE DEVICE
CONVERGENT MEDIA
NON PROFIT SERVICE DESIGNED TO HELP VISUAL AND READING IMPAIRMENTS. `
ASSISTIVE MEDIA
the process of and tools for
storing, managing, using, and gathering of
data and communications in an
organization.
ONLINE SYSTEM
It is a category of business software that
adds
broad social networking capabilities to work
processes.
COLLABORATIVE PLATFORM
platforms are any hardware or software to
host an
application. These platforms come with the
different functions.
EX: COLLABORATIVE AND WEB SEARCH ENGINE
PLATFORMS
like
Google, Bing, and Yahoo
WEBSEACRH ENGINES
-This term came from the blended words
“malicious” and “software”
-It is an umbrella term with 5 different types:
Virus, Worm, Trojan, Spyware, Adware
MALWARE
It is malicious program that usually
transfer from one device to
another with the aid of the
Internet and local networks, but
commonly through data storage
such as flash drives or hard drive
VIRUS
Unlike Virus, this malware
replicates itself and can transfer by
any type of means, but more often
through computer network.
* Example: ILOVEYOU worm
WORM
This is known as Love Bug, that infected 45
million machines across the globe, including
Pentagon, within 24 hours last May 4, 2000
* When the victim opens the attachment, an email entitled LOVE-LETTER-FOR-YOU, the
malware automatically send itself to all the
victim’s Microsoft Outlook contact
ILOVEYOU WORM
Tracing its name origin, it can be link to the
mythology story about how Trojan fell because
of Greek’s wooden horse
* Like the Odysseus’ strategy; this malicious
program disguised as a useful program,
however when you left your devices
unprotected and become vulnerable to other
malwares once you accessed or downloaded it
TROJAN
A malicious program that monitors
the device, and the actions of the
user without its knowledge
* Example: the keylogger steals
sensitive information using the
recorded user’s keystrokes
SPYWARE
- This program automatically sends
pop-ups advertisements
ADWARE
Used to record the keystroke done
by the users
* This is done to steal their password,
or any other sensitive information
* It can record email, messages, or
any information you type using your
keyboard
KEYLOGGERS
A CYBERCRIME
Like fishing, criminals steals sensitive personal
information like account passwords and
banking details by sending out an alarming email as a bait.
Usually they ask you to click a link, or input
your username, password, or any personal info
PHISHING
r UNWANTED EMAILS contains bots
and advertisements
SPAM MESSSAGES
Defined as the Illegal act done using
Internet
CYBERCRIME
A more complicated way of phishing where it
exploits the DNS (Domain Name Service
system)
PHARMING
Defined as the information
superhighway
INTERNET
UNAUTHORIZED ACCESSING OF DATA FROM A COMPUTER NETWORK. MOSTLY HACKERS ATTACK COMMERCIAL AND GOVERMENT SITES TO CAUSE AN ALARM OR TO TRAT SOMEON
HACKING
an illegal act of gambling on any sports event that happened over the internet
SPORT BETTING
deceiving act which the culprit posted a product or service on the internet. ONCE THE VICTIM PLACED ITS PAYMENT, THE CULPRIT DOES NOT GIVE THE ITEM OR SERVICE
NON- DELIVERY OF MERCHANDISE
anonymous criminal who harass, abuse threat or annoy people. ex: cyberbully
electronic harassmenT
R.A. no. 9775 or knowm as Anti-Child porno act of 2009, it is an act of real or simulated explicit sexual activities
CHILD PORNOGRAPHY
an illegfal act engage in any sexaul activities
PROSTITUTION
an authorized use of stealing of intellectua; property
CRIMINAL COPYRIGHT INFRIGEMENT
TIPS
THAT COULD HELP YOU
AVOID COPYRIGHT
INFRINGEMENT:
- UNDERSTAND, BE RESPONSIBLE, BE CREATIVE, KNOW THE LAW
you can express something using your own
words, but you should give credit to the source.
- UNDERSTAND