Empowerment Technologies Flashcards

1
Q

It is an information spacewhere documents and other web resourcesare identified by Uniform Resource Locators(URLs), interlinked by hypertextlinks, and can be accessed via the Internet.

an information system on the internet which allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.

A

WWW (Word wide web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who invented the WWW?

A

Tim Berners Lee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When does the world wide web invented?

A

1989

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

static websites without interactivity
read only website

A

Web 1.0: Static Web Pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

websites that contain dynamic content

A

Web 2.0: Dynamic Web Pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6 features of web 2.0

A

Folksonomy
Rich User experience
User participation
long tail
software as service
mass participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a feature of web 2.0 that allows users to categorize information using keywords

A

Folksonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a feature of web 2.0 that content is responsive to users input

A

rich user experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a feature of web 2.0 that the owner of the website is not the only one who is able to put content.

A

User participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a feature of web 2.0 that services that are offered on demand rather that on a one-time purchase.

A

Long tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a feature of web 2.0 that users will subscribe to a software only when needed rather than purchasing
them.

A

software as service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a feature of web 2.0 that diverse information sharing through universal web access.

A

mass participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a semantic web and a concept of the world wide web that is designed to cater to the individual user.

A

Web 3.0: Semantic Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange user-generated content.

A

Social Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is the synergy of technological advancements to work on a similar goal or task. Convergence is using several technologies to accomplish a task conveniently.

A

Convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Six types of Social Media
social network

A

Social Network
Bookmarking Sites
Social News
Media Sharing
Microblogging
Blogs and Forums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

4 trends in ICT

A

Social Media
Convergence
Mobile Technologies
Assistive Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what type of Social Media

These websites allow users to post their content.

A

Blogs and forums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what type of Social Media

These are sites that focus on short updates from the user.

A

Microblogging

20
Q

what type of Social Media

These are sites that allow you to upload and share media content like images, music, and video.

A

Media Sharing

21
Q

what type of Social Media

These are sites that allow users to post their own news items or links to other news sources.

A

Social News

22
Q

what type of Social Media

These are sites that allow you to store and manage links to various websites and resources.

A

Bookmarking sites

23
Q

what type of Social Media

These are sites that allow you to connect with other people with the same interests or background.

A

Social Network

24
Q

7 Mobile Operating Systems

A

iOS
Android
Blackberry OS
Window Phone OS
Symbian
Web OS
Windows Mobile

25
Q

is a nonprofit service designed to help people who have visual and reading impairments.

A

Assistive media

26
Q

10 best rules of netiquette (give at least 5)

A

-The Golden Rule (treat others as you would like to be treated)
-No Flaming (Flame is a personal insult communicated through the internet)
-Don’t type in all CAPS (people may misinterpret)
-Don’t SPAM (it is any unsolicited e-mail from unknown sources)
-Don’t talk with people you do not know (do not arrange to meet anyone you meet online)
-Obey Copyright Laws (Don’t steal someone else’s idea, property and rights)
-Use proper Grammar and Spelling (errors diminishes the credibility of the message)
-Be Honest/Be Yourself (tell the truth, do not pretend to be someone else)
-Follow the TOS (TOS – Term of Service) (Rules and Policy of the sites)
-SHOP SECURE SITES (these are sites with transport layer security) (TLS or SLS Socket Layer Security)

27
Q

3 Internet Threats

A

Malware
Spam
Phishing

28
Q

5 kinds of Malwares

A

Virus
Worm
Trojan
Spyware
Adware

29
Q

stands for malicious software. It is a set of instruction that run on your computer and make your system do something than an attacker wants to.

A

Malware

30
Q

A malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs.

A

Virus

31
Q

A malicious program that transfers from one computer to another by any type of means.

A

Worm

32
Q

A malicious program that is disguised as a useful program, but once downloaded or installed, leaves your PC unprotected and allow hackers to get your information.

A

Trojan

33
Q

A program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging.

A

Spyware

34
Q

A program designed to send you advertisements, mostly as pop-ups.

A

Adware

35
Q

unwanted email mostly from bots or advertisers. It can be used to send malware.

A

Spam

36
Q

its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information.

A

Phishing

37
Q

a more complicated way of phishing where it exploits the DNS (Domain Name Service) system

A

Pharming

38
Q

4 parts of keys on keyboard

A

Main keys
Function keys
Numeric Keys
Navigational Keys

39
Q

Are special keys programmed to execute commonly used commands.
Located at the upper topmost of the keyboard (F1, F2, F3, … F12)

A

Function keys

40
Q

Are the familiar keys like QWERTY keys (the first letters in the second row, upper left portion of the keyboard)

A

Main keys

41
Q

keys that has numbers and arithmetic symbols

A

Numeric Keys

42
Q

when light is ___ these keys can be used to enter numeric data and mathematical symbols

A

On

43
Q

when light is ___ the numeric keys are used to perform other functions

A

Off

44
Q

Additional keys that duplicate the cursor movement functions of the numeric keys.
it also has, insert, home page up, del end, page down keys

A

ADDITIONAL or EDITING KEYS or NAVIGATIONAL KEYS

45
Q

3 features of Web 3.0 except 1

Compatibility
Security
Concise
Logic

A

Concise

46
Q

is a common input device similar to the keyboard of a typewriter but with additional special functions.

A

KEYBOARD