Empowerment Technologies Flashcards

1
Q

It is an information spacewhere documents and other web resourcesare identified by Uniform Resource Locators(URLs), interlinked by hypertextlinks, and can be accessed via the Internet.

an information system on the internet which allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.

A

WWW (Word wide web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who invented the WWW?

A

Tim Berners Lee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When does the world wide web invented?

A

1989

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

static websites without interactivity
read only website

A

Web 1.0: Static Web Pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

websites that contain dynamic content

A

Web 2.0: Dynamic Web Pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6 features of web 2.0

A

Folksonomy
Rich User experience
User participation
long tail
software as service
mass participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a feature of web 2.0 that allows users to categorize information using keywords

A

Folksonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a feature of web 2.0 that content is responsive to users input

A

rich user experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a feature of web 2.0 that the owner of the website is not the only one who is able to put content.

A

User participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a feature of web 2.0 that services that are offered on demand rather that on a one-time purchase.

A

Long tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a feature of web 2.0 that users will subscribe to a software only when needed rather than purchasing
them.

A

software as service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a feature of web 2.0 that diverse information sharing through universal web access.

A

mass participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a semantic web and a concept of the world wide web that is designed to cater to the individual user.

A

Web 3.0: Semantic Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange user-generated content.

A

Social Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is the synergy of technological advancements to work on a similar goal or task. Convergence is using several technologies to accomplish a task conveniently.

A

Convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Six types of Social Media
social network

A

Social Network
Bookmarking Sites
Social News
Media Sharing
Microblogging
Blogs and Forums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

4 trends in ICT

A

Social Media
Convergence
Mobile Technologies
Assistive Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what type of Social Media

These websites allow users to post their content.

A

Blogs and forums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what type of Social Media

These are sites that focus on short updates from the user.

A

Microblogging

20
Q

what type of Social Media

These are sites that allow you to upload and share media content like images, music, and video.

A

Media Sharing

21
Q

what type of Social Media

These are sites that allow users to post their own news items or links to other news sources.

A

Social News

22
Q

what type of Social Media

These are sites that allow you to store and manage links to various websites and resources.

A

Bookmarking sites

23
Q

what type of Social Media

These are sites that allow you to connect with other people with the same interests or background.

A

Social Network

24
Q

7 Mobile Operating Systems

A

iOS
Android
Blackberry OS
Window Phone OS
Symbian
Web OS
Windows Mobile

25
is a nonprofit service designed to help people who have visual and reading impairments.
Assistive media
26
10 best rules of netiquette (give at least 5)
-The Golden Rule (treat others as you would like to be treated) -No Flaming (Flame is a personal insult communicated through the internet) -Don’t type in all CAPS (people may misinterpret) -Don’t SPAM (it is any unsolicited e-mail from unknown sources) -Don’t talk with people you do not know (do not arrange to meet anyone you meet online) -Obey Copyright Laws (Don’t steal someone else’s idea, property and rights) -Use proper Grammar and Spelling (errors diminishes the credibility of the message) -Be Honest/Be Yourself (tell the truth, do not pretend to be someone else) -Follow the TOS (TOS – Term of Service) (Rules and Policy of the sites) -SHOP SECURE SITES (these are sites with transport layer security) (TLS or SLS Socket Layer Security)
27
3 Internet Threats
Malware Spam Phishing
28
5 kinds of Malwares
Virus Worm Trojan Spyware Adware
29
stands for malicious software. It is a set of instruction that run on your computer and make your system do something than an attacker wants to.
Malware
30
A malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs.
Virus
31
A malicious program that transfers from one computer to another by any type of means.
Worm
32
A malicious program that is disguised as a useful program, but once downloaded or installed, leaves your PC unprotected and allow hackers to get your information.
Trojan
33
A program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging.
Spyware
34
A program designed to send you advertisements, mostly as pop-ups.
Adware
35
unwanted email mostly from bots or advertisers. It can be used to send malware.
Spam
36
its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information.
Phishing
37
a more complicated way of phishing where it exploits the DNS (Domain Name Service) system
Pharming
38
4 parts of keys on keyboard
Main keys Function keys Numeric Keys Navigational Keys
39
Are special keys programmed to execute commonly used commands. Located at the upper topmost of the keyboard (F1, F2, F3, … F12)
Function keys
40
Are the familiar keys like QWERTY keys (the first letters in the second row, upper left portion of the keyboard)
Main keys
41
keys that has numbers and arithmetic symbols
Numeric Keys
42
when light is ___ these keys can be used to enter numeric data and mathematical symbols
On
43
when light is ___ the numeric keys are used to perform other functions
Off
44
Additional keys that duplicate the cursor movement functions of the numeric keys. it also has, insert, home page up, del end, page down keys
ADDITIONAL or EDITING KEYS or NAVIGATIONAL KEYS
45
3 features of Web 3.0 except 1 Compatibility Security Concise Logic
Concise
46
is a common input device similar to the keyboard of a typewriter but with additional special functions.
KEYBOARD