LESSON 3 Flashcards
It is also known as WWW or W3 introduce by ____________
Tim Berners-Lee.
It consists of
different pages that are formatted in a markup language called _________
HTML (Hypertext
Markup Language)
linked to each other that contain text, graphics, multimedia
files, hyperlinks and etc.
World Wide Web
The first development of World Wide Web where web pages are static.
Web 1.0
It also
known as flat or stationary page and it cannot be manipulated by users.
Web 1.0
It is a dynamic web page where user can interact with page like creating a user
account, posting comments, uploading files and images, and others.
Web 2.0
What are the features of Web 2.0?
-Folksonomy
-Rich User Experience .
-User Participation
-Long Tail
-Software as a service
-Mass Participation
users can classify and arrange information by adding tag or
label. Pound sign (#) is used in Facebook, Twitter, Instagram and other social
networking sites.
Folksonomy
user can have high interaction with the content of the
page and can achieve level of expertise
Rich user experience
user can put content on their own in web page like
comment, evaluation, and etc.
User Participation
A site that offers services and brings individual and businesses into
selling different goods and commodities such as shopping site like OLX,
Lazada, Shopee, Zalora and others.
Long Tail
users can subscribe to a software when they need it
instead of purchasing them.
Software as a service
sharing of diverse information through universal web
access.
Mass Participation
A new paradigm in web interaction extension of led by World Wide Web
Consortium (W3C) where it provides framework that allows data to be shared and
Web 3.0 The Semantic Web
What are the trends in ICT?
-Convergence
-Social Media
-Mobile Technologies
-Assistive Media
it refers to fusing of technological advancement to work on a
similar task.
Convergence
Give atleast one example of convergence
Using smartphone as camera in taking pictures instead of DSLR
camera.
an application and website where user can communicate,
create and share content, and participate in online communities.
Social Media
What are the types of Social Media?
-Social Network
- Social News
-Bookmarking sites
-Media Sharing
- Microblogging
-Blogs and forums
A website where people with the same come
together to share information.
Social Network
Example of a social network?
-Twitter, Instagram, Facebook
A website where user can post stories and are
ranked based on the popularity through voting.
- Social news
Example of a Social news?
-Digg, Reddit, Propeller, Slashdot, Fark
A website that allows you to share and store internet bookmarks, articles, posts, blogs, images and others.
- Bookmarking Sites
Example of Bookmarking Sites?
-Pinterest, StumbleUpon, Dribble
A website that allows you to share and store
multimedia files such as video, photos and music.
- Media Sharing
Example of media sharing?
-Instagram, YouTube, Flickr
a website that allows you to broadcast short message.
-Microblogging
Example of Microblogging?
-Twitter, Tumblr, Meetme
a discussion website that allows user to ask questions and comments on a journal posted by an individual or group.
- Blogs and Forums
Example of Blogs and Forums?
-Wordpress, Blogger
a technology used in cellular and other devices such netbook, laptop, tablet, smartphones and etc.
-Mobile Technologies
A platform that assist people with disability. It will guide the individual like a blind person by using an audio recording.
- Assistive Media
What are the tips on how to be safe online?
➢ Do not share your password with anyone.
➢ Add friends you know in real life.
➢ Do not visit untrusted websites.
➢ Add password to your WIFI at home to make it private.
➢ Install and update antivirus in your computer.
➢ Do not give your personal information to anyone
➢ Think before you click.
➢ Never post about your future vacation.
What are the 4 internet risk?
-Cyberbullying
-Identity Theft
-Cyber Stalking
-Sexting
It happens when someone intentionally abused, harass, and mistreated by
-Cyberbullying
It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions.
-Identity Theft
A criminal practice where electronic communication is used to stalk or harass individual or group.
-Cyberstalking
The act of sending sexually explicit text messages, images, and videos.
- Sexting
What are the 5 Interenet threats?
-Malware
- Spam
-Phishing
-Cybercrime
- Cybercrime law
also known as Malicious Software.
-Malware
What are the types of Malware?
1.Virus
2. Trojan Horse
3. Worm
4. Spyware
5. Adware
6. Keylogger
7. Botnet
8. Rootkit
9. Ransomware
a malicious program that replicate itself by copying itself to another program.
-Virus
a malicious program that disguised as legitimate program
that user will accept and use but take control of your computer.
- Trojan Horse
malicious program that copy’s itself and spreads to other
computers.
-Worm
A malicious program that gathers information from victim’s
computer and send it back to the hacker.
-Spyware
An unwanted advertisement that will pop-up several times on
victim’s computer then behave abnormally and tedious to close them.
-Adware
A program that runs in the background and steals user credentials and confidential information and send back to hack by recording every keystroke that a user makes on their computer or device.
-Keylogger
A collection of infected internet–connected devices such as PCand mobile phone that are controlled by a common type of malware.
-Botnet
A software tools used by hackers to gain control over a computer on a network without being exposed.
-Rootkit
A ransom virus that block the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus.
-Ransomware
Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware.
-Spam
A cyberattack method using deceptive emails and websites to acquiring sensitive personal information.
-Phishing
A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others.
- Cybercrime
A law that deals with all forms of cybercrime
Cybercrime Law
It is a word that came from the two words “______” and “________”.
- It is a word that came from the two words “net” and “etiquette”.
It is an etiquette applied online that shows proper manner and behavior. If you are a member of an online society through social media you are called netizen. And in interacting with other netizen online, we need to maintain good behavior which is acceptable to others in online community.
- Netiquette
What are The Core Rules of Netiquette by Seth T. Ross?
- Remember the human.
- Adhere to the same standards of behavior online that you follow in real life.
- Know where you are in cyberspace.
- Respect other people’s time and bandwidth.
- Make yourself look good online.
- Share expert knowledge.
- Help keep flame wars under control.
- Respect other people’s privacy.
- Don’t abuse your power.
- Be forgiving of other people’s mistakes