LESSON 3 Flashcards

1
Q

It is also known as WWW or W3 introduce by ____________

A

Tim Berners-Lee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It consists of
different pages that are formatted in a markup language called _________

A

HTML (Hypertext
Markup Language)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

linked to each other that contain text, graphics, multimedia
files, hyperlinks and etc.

A

World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The first development of World Wide Web where web pages are static.

A

Web 1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It also
known as flat or stationary page and it cannot be manipulated by users.

A

Web 1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It is a dynamic web page where user can interact with page like creating a user
account, posting comments, uploading files and images, and others.

A

Web 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the features of Web 2.0?

A

-Folksonomy
-Rich User Experience .
-User Participation
-Long Tail
-Software as a service
-Mass Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

users can classify and arrange information by adding tag or
label. Pound sign (#) is used in Facebook, Twitter, Instagram and other social
networking sites.

A

Folksonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

user can have high interaction with the content of the
page and can achieve level of expertise

A

Rich user experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

user can put content on their own in web page like
comment, evaluation, and etc.

A

User Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A site that offers services and brings individual and businesses into
selling different goods and commodities such as shopping site like OLX,
Lazada, Shopee, Zalora and others.

A

Long Tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

users can subscribe to a software when they need it
instead of purchasing them.

A

Software as a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

sharing of diverse information through universal web
access.

A

Mass Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A new paradigm in web interaction extension of led by World Wide Web
Consortium (W3C) where it provides framework that allows data to be shared and

A

Web 3.0 The Semantic Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the trends in ICT?

A

-Convergence
-Social Media
-Mobile Technologies
-Assistive Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

it refers to fusing of technological advancement to work on a
similar task.

A

Convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Give atleast one example of convergence

A

Using smartphone as camera in taking pictures instead of DSLR
camera.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

an application and website where user can communicate,
create and share content, and participate in online communities.

A

Social Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the types of Social Media?

A

-Social Network
- Social News
-Bookmarking sites
-Media Sharing
- Microblogging
-Blogs and forums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A website where people with the same come
together to share information.

A

Social Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Example of a social network?

A

-Twitter, Instagram, Facebook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A website where user can post stories and are
ranked based on the popularity through voting.

A
  • Social news
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Example of a Social news?

A

-Digg, Reddit, Propeller, Slashdot, Fark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A website that allows you to share and store internet bookmarks, articles, posts, blogs, images and others.

A
  • Bookmarking Sites
25
Q

Example of Bookmarking Sites?

A

-Pinterest, StumbleUpon, Dribble

26
Q

A website that allows you to share and store
multimedia files such as video, photos and music.

A
  • Media Sharing
27
Q

Example of media sharing?

A

-Instagram, YouTube, Flickr

28
Q

a website that allows you to broadcast short message.

A

-Microblogging

29
Q

Example of Microblogging?

A

-Twitter, Tumblr, Meetme

30
Q

a discussion website that allows user to ask questions and comments on a journal posted by an individual or group.

A
  • Blogs and Forums
31
Q

Example of Blogs and Forums?

A

-Wordpress, Blogger

32
Q

a technology used in cellular and other devices such netbook, laptop, tablet, smartphones and etc.

A

-Mobile Technologies

33
Q

A platform that assist people with disability. It will guide the individual like a blind person by using an audio recording.

A
  • Assistive Media
34
Q

What are the tips on how to be safe online?

A

➢ Do not share your password with anyone.
➢ Add friends you know in real life.
➢ Do not visit untrusted websites.
➢ Add password to your WIFI at home to make it private.
➢ Install and update antivirus in your computer.
➢ Do not give your personal information to anyone
➢ Think before you click.
➢ Never post about your future vacation.

35
Q

What are the 4 internet risk?

A

-Cyberbullying
-Identity Theft
-Cyber Stalking
-Sexting

36
Q

It happens when someone intentionally abused, harass, and mistreated by

A

-Cyberbullying

37
Q

It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions.

A

-Identity Theft

38
Q

A criminal practice where electronic communication is used to stalk or harass individual or group.

A

-Cyberstalking

39
Q

The act of sending sexually explicit text messages, images, and videos.

A
  • Sexting
40
Q

What are the 5 Interenet threats?

A

-Malware
- Spam
-Phishing
-Cybercrime
- Cybercrime law

41
Q

also known as Malicious Software.

A

-Malware

42
Q

What are the types of Malware?

A

1.Virus
2. Trojan Horse
3. Worm
4. Spyware
5. Adware
6. Keylogger
7. Botnet
8. Rootkit
9. Ransomware

43
Q

a malicious program that replicate itself by copying itself to another program.

A

-Virus

44
Q

a malicious program that disguised as legitimate program
that user will accept and use but take control of your computer.

A
  • Trojan Horse
45
Q

malicious program that copy’s itself and spreads to other
computers.

A

-Worm

46
Q

A malicious program that gathers information from victim’s
computer and send it back to the hacker.

A

-Spyware

47
Q

An unwanted advertisement that will pop-up several times on
victim’s computer then behave abnormally and tedious to close them.

A

-Adware

48
Q

A program that runs in the background and steals user credentials and confidential information and send back to hack by recording every keystroke that a user makes on their computer or device.

A

-Keylogger

49
Q

A collection of infected internet–connected devices such as PCand mobile phone that are controlled by a common type of malware.

A

-Botnet

50
Q

A software tools used by hackers to gain control over a computer on a network without being exposed.

A

-Rootkit

51
Q

A ransom virus that block the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus.

A

-Ransomware

52
Q

Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware.

A

-Spam

53
Q

A cyberattack method using deceptive emails and websites to acquiring sensitive personal information.

A

-Phishing

54
Q

A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others.

A
  • Cybercrime
55
Q

A law that deals with all forms of cybercrime

A

Cybercrime Law

56
Q

It is a word that came from the two words “______” and “________”.

A
  • It is a word that came from the two words “net” and “etiquette”.
57
Q

It is an etiquette applied online that shows proper manner and behavior. If you are a member of an online society through social media you are called netizen. And in interacting with other netizen online, we need to maintain good behavior which is acceptable to others in online community.

A
  • Netiquette
58
Q

What are The Core Rules of Netiquette by Seth T. Ross?

A
  1. Remember the human.
  2. Adhere to the same standards of behavior online that you follow in real life.
  3. Know where you are in cyberspace.
  4. Respect other people’s time and bandwidth.
  5. Make yourself look good online.
  6. Share expert knowledge.
  7. Help keep flame wars under control.
  8. Respect other people’s privacy.
  9. Don’t abuse your power.
  10. Be forgiving of other people’s mistakes