Empowerment Technology Flashcards
Review
is a computer-mediated tools that allow large
group of people to create, share or exchange
information, interest and the information
shared can be in the form of ideas, pictures,
videos or anything that you want to create
and share to virtual communities
Social Media Platform
These are sites that focus on short
updates from the user. Those
subscribed to the user will be
able to receive these updates.
Posts are brief that range
typically from 140 – 200
characters.
MicroBlogging
These sites allow you to connect
with other people with the
same interests or background.
Social Networks
the owner of website is not the only one who is able to put content. Others
are able to place a content on their own by means of comments, reviews,
and evaluation.
User Participation
What does WWW stands for?
World Wide Web
allows users to collectively classify and find information using freely chosen
keywords (
Folksonomy
Most website
that we visit today are Web 2.0.
The Social Web
Who invented the WWW?
Tim-Berners Lee
These are sites that allow users to
post their own news items or
links to other news sources.
Social News
What is the Web 2.0 Called?
The Social Web
the global system of interconnected computer
networks that uses the Internet protocol suite (TCP/IP)
to communicate between networks and devices.
Internet
The World Wide Web is an information system on the
Internet that allows documents to be connected to other
documents by hypertext links, enabling the user to
search for information by moving from one document to
another.
World Wide Web
is deemed any malicious act that attempts to gain access to a computer network without authorization or permission from the owners.
Online Threats
These are websites that allow users
to post their content. Other
users can comment on the
said topic
Blogs and Forums
a specially developed platform using Internet technology.
Online platforms have revolutionized access to any
information.
Online Platform
often deals with the use of different technological inventions like
mobile phones, telephones, computer, Internet, and other
devices, as well as software and applications to locate, save,
send, and manipulate information.
ICT
It is the first stage of World Wide Web Evolution
The Web
What is the Web 3.0 Called?
The Semantic Web
These are sites that allow you to
store and manage links to
various websites and
resources.
Bookmarking Sites
The semantic web provides a framework that allows data to be shared and reuse to deliver web content
specifically targeting the user.
Semantic Web
What is ICT stands for?
Information and Communication Technology
When was the internet was fully commercialized?
1995
What is the Web 1.0 called?
The Web
allows you to present and share presentations,
infographics and videos with other people. It
is used to communicate information clearly
and efficiently.
Presentation or Visualization Platform
In a data gathered by the Annual Survey of
Philippines Business and Industries in 2010, the ICT
industry shares _____
19.3%
dubbed as the “ICT Hub of Asia”
Philippines
dynamic content that is responsive to user input
Rich User Interface
is used for the storing, naming, sorting, and
handling of computer files. Allows you to
convert and manage files without download
in the software tool.
File Management Platform
These are sites that allow you to
upload and share media
content like images, music,
and video. Media sharing sites
can be specific for video
sharing, photo sharing, slide
sharing, social bookmarking,
and gaming.
Media Sharing
is also called as “The cloud.” It is the practice of
using a network of remote servers hosted on
the internet. Instead of using your computer’s
hard drive, you store and access your data
and programs over the Internet
Cloud Computing Platform
It allows the user to interact with the page. They user may be able to comment or create an account.
The Social Web
a transformation taking the points of one space
into the points of the same or another space.
Uses GPS to detect location and used for
navigation.
Mapping Platform
services that are offered on demand rather than on a one-time purchase.
This is synonymous to subscribing to a data plan that charges you for the
amount of time you spent in the Internet, or a data plan that charges you for the amount of bandwidth you used.
Long Tail
also known as spiders, crawlers, and web bots. It is a software application that is programmed to do certain tasks. Bots are automated, which means they run according to their instructions without a human user.
Internet Robots
is a form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to get them back.
Ransomware
happens when a hacker (or “pharmer”) directs an internet user to a fake website instead of a legitimate one. These “spoofed” sites can capture a victim’s confidential information, including usernames, passwords, and credit card data, or install malware on their computer
Pharming
unwanted software designed to throw advertisements up on your screen. Example, pop-up ads and banner ads.
Adware
happens when an email is sent from an internet criminal disguised as an email from a legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or confidential information
Phishing
are malwares that attach to another program and, when executed—unintentionally by the user—replicates itself by modifying other computer programs and infecting them with its own bits of code.
Virus and Worms
happens when someone or something pretends to be something else to gain our confidence, get access to our systems, steal data, steal money, or spread malware.
Spoofing
Users subscribe to a software tool when needed rather than purchasing it.
Software as a service
Enumerate the Online Safety Measure
N
D
N
R
W
K
D
Never give any personal information out about yourself over the internet.
Do not give any banking or sensitive information unless you are sure that it is a reputable business having a secure service. To make sure that you are in a secured network, the website address should begin with “https://’ as opposed to “http://”. Never access your accounts by following an email link, instead type your URL by yourself.
Never open messages or attachments from someone you do not know.
Regularly review your privacy settings in your online accounts to make sure you are not sharing important personal information.
When using a public computer terminal, be sure to delete your browsing data before leaving.
Keep your software updated to avoid security holes.
Do not download or install software or anything on your computer or cell phone that is unknown to you.
is a series of flame posts or messages in a thread that are considered derogatory in nature or are completely off-topic.
Flame Wars
List down the 3 web pages
The Web
The Social Web
Semantic Web
refers to the use of the internet or other electronic device to harass or stalk individuals or organizations.
Cyberstalking
is one of the most dangerous malware types. It usually represents itself as something useful in order to trick you.
Trojan, or Trojan horse
malicious software, is any program or file that is harmful to a computer user.
Malware
Enumerate the social media platforms
Social Networks
Bookmarking sites
Social News
Blogs and Forums
Media Sharing
MicroBlogging
refers to the practices and precautions that should be observed
Netiquette
It is a set of rules for behaving properly online.
Netiquette
generally refers to someone using internet services or software to defraud or take advantage of victims, typically for financial gain.
Internet Scams
unsolicited emails, instant messages coming from recipients that are not granted verifiable permission for the message to be sent.
Spams
refers to the act of tormenting, harassing, or embarrassing another person using the internet.
CyberBullying
is malware that secretly observes the computer user’s activities without permission and reports it to the software’s author. Example is a keylogger.
Spyware
Enumerate the 10 Core Rule Netiquette
R
a
k
r
m
s
h
r
d
b
Remember the Human.
Adhere to the same standards of behavior online that you follow in real life.
Know where you are in cyberspace.
Respect other people’s time and bandwidth.
Make yourself look good online.
Share expert knowledge.
Help keep flame wars under control.
Respect other people’s privacy.
Don’t abuse your power.
Be forgiving of other people’s mistakes.