mst finals Flashcards
An information space where documents and other web resources are identified by Uniform Resource Locators, which may be interlinked by hypertext, and are accessible over the internet
WORLD WIDE WEB (WWW)
The address of a web page or colloquially termed a web address
URL
Uniform Resource Locator
Text which contains links to the other texts or information
HYPERTEXT
Hypertext which is not constrained to be text, can include graphics, video and sound
HYPERMEDIA
A link from a hypertext file or document to another location or file, usually activated by clicking on a highlighted word or image
HYPERLINK
A small image representation of a larger image, usually intended to make it easier and faster to look at or manage a group of larger images
THUMBNAIL
He invented the World Wide Web in the year 1989.
TIM BERNERS-LEE
Tim Berners-Lee wrote the first web browser in the year ___.
1990
CERN
The ___ ___ ___ ___ ___, where Tim Berners-Lee worked when he invented the World Wide Web
European Organization for Nuclear Research
What year the browser was released outside of CERN?
1991
A link from a hypertext file or document to another location or file, usually activated by clicking on a highlighted word or image
HYPERLINK
The name of the browser that helped to get the World Wide Web popular
MOSAIC
The World Wide Web has been central to the development of the ___ ___ and is the primary tool for billions of people use to interact on the Internet
INFORMATION AGE
The first generation of the world wide web, which is the “read-only web”
WEB 1.0
Web _.0 allowed users to search for information and read it, with very little user interaction or content generation
1.0
Web 1.0 is also known as ___
Static web page
Examples of Internet sites classified as Web 1.0
Britannica Online, personal websites, and mp3.com
Disadvantages of Web 1.0
Read-only web
Limited user interaction
Lack of standards
Without the ___ ___ community, browser makers would be the ones making decisions on what should and shouldn’t be features of the World Wide Web, which could lead to the Web becoming a monopolized commodity
WEB STANDARDS
The second stage/generation of the development of the internet, focused on user-generated content and the __-__ web
READ-WRITE
An improved version of Web 1.0 which focuses primarily on user interactivity, collaboration, enhanced network connection, and a shift from a static to a dynamic approach to the internet
WEB 2.0
An author, web designer and expert in user experience, who coined the term “Web 2.0” in 1999 and predicted the influence it would have on public relations
Darcy DiNucci
A formal set of standards and technical specifications used to define aspects of the world wide web
WEB STANDARDS
Web pages that are affected by user input or preference, where the user can interact with the page instead of just reading it
DYNAMIC PAGE
Examples of Web 2.0
Social Networking
Blogs
Wikis
Video sharing sites
A user-generated system of classifying and organizing online content into different categories by the use of metadata such as electronic tags
TAGGING
A well-designed ___ __ interface draws the user in and encourages the user to interact with it and learn from the application
RICH USER
Synonymous to subscribing to a data plan that charges you for the amount of time you spent on Internet or a data plan that charges you for the amount of bandwidth you used
SUBSCRIPTION-BASED INTERNET
_ _ _ _ (SaaS)
Subscribing to a software only when needed and involving human interactions with digital content facilitated by applications delivered over the web and that free the user from locally installed software
SOFTWARE AS A SERVICE
T or F
Web 2.0’s content is based on people from various cultures
T
T or F
Web 3.0 is also known as Semantic Web
T
Main features that can help define Web 3.0
Semantic Web
Artificial Intelligence
3D Graphics
Connectivity
T or F
Semantic web technologies is a two-way interaction
T
Which is correct about Hypermedia?
A. Hypertext which is not constrained to be text, can include graphics, video, and sound.
B. Hypertext Markup Language, is a coding language used to tell a browser how to place pictures, text, multimedia and links to create a web page.
A
_____ Web technologies enable people to create data stores on the Web, build vocabularies, and write rules for handling data
SEMANTIC
Main features That can Help us Define Web 3.0
Semantic Web
Artificial Intelligence
3D Graphics
Connectivity
Ubiquity
DLT (Distributed Ledger Technology) and Smart Contracts
Combining natural language processing, computers can distinguish information like humans to provide faster and more relevant results. They become more intelligent to fulfill the requirements of users.
ARTIFICIAL INTELLIGENCE
The three-dimensional design is being used widely in websites and services in Web 3.0. Museum guides, computer games, e-commerce, geospatial contexts, etc. are all examples that use 3D graphics
3D GRAPHICS
With Web 3.0, information is more connected thanks to semantic metadata. As a result, the user experience evolves to another level of connectivity that leverages all the available information
CONNECTIVITY
Content is accessible by multiple applications, every device is connected to the web, and the services can be used everywhere
UBIQUITY
With the help of _ _ _, we can have a virtually impossible to hack database from which one can have value to their content and things they can own virtually
DLT
Distributed Ledger Technology
The ___ is the largest computer network in the world that connects billions of computer user
INTERNET
Hypertext
Definition?
Text which contains links to the other texts or information
____ is a collection of computers and devices connected via communication channels and transmission media allow to share resources (hardware, software, data, information).
NETWORK
First version of the internet created as ARPANET
1969
First message sent over ARPANET
1969
Vinton Gray Cerf and Robert Kahn develop TCP/IP
1973
First “free net” created
1986
US government allowed business agencies to connect to internet
1991
Major Components of the Internet
SERVERS
IP ADDRESS (Internet Protocol)
BROWSER
(DOMAIN NAME SYSTEM (DNS)
INTERNET SERVICE PROVIDER (ISP)
Computer programs that provide services to other computer programs and users
servers
___ ___ (Internet Protocol)
Numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication, providing identity to a network device
IP ADDRESS
Application program that provides a way to look information on the web
BROWSER
Browsers
Google chrome, Safari, Internet explorer, Opera, Mozilla
The phonebook of the internet, we access information online through domain names
Domain Name System (DNS)
Domain Name Examples
www.eac.edu.ph
www.facebook.com
sss.gov.ph
https://thenew.org/
2 Types of ISP
National ISP
Regional ISP
ISP Examples
Sky Broadband, PLDT, Converge
A collection of billions of webpages that you can view with a web browser
WEB
The most common method of sending and _ messages online
Websites and apps that allow people to share comments, photos, and videos
SOCIAL MEDIA
Games that allow people to play with and against each other over the Internet
ONLINE GAMING
Operating system and application updates can typically downloaded from the Internet
SOFTWARE UPDATES
a coding language used to tell a browser how to place pictures, text, multimedia and links to create a web page
HTML
HYPERTEXT MARKUP LANGUAGE
To transfer data from your computer to another computer
DOWNLOAD
it indicates the web page has a special layer of encryption added to hide personal information and passwords
HTTPS
HYPERTEXT TRANSFER PROTOCOL SECURE
Hardware device that acts as the traffic cop for network signals arriving at your home or business from your ISP
ROUTER or router modern combination
The mathematical scrambling of data so that it is hidden from eavesdroppers
ENCRYPTION
Programs/applets (macros and intelligent agents) used on the Internet to perform repetitive functions, such as posting messages to multiple newsgroups or doing searches for information
WEB BOT
Specialized software, such as Google and Yahoo, that lets www browser users search for information on the web by using keywords and phrases
SEARCH ENGINE
the etiquette of cyberspace and “etiquette” means the forms of required by good breeding or prescribed by authority to be required in social or official life
NETIQUETTE
Virginia Shea
Dubbed the “_” by the San Jose Mercury News
NETWORK MANNERS GURU
Give Rules of Netiquette
- Remember the Human
- Adhere to the same standards of behavior online that you follow in real life
- Know where you are in cyberspace
- Respect other people’s time and bandwidth
- Make yourself look good online
- Share expert knowledge
- Help keep flame wars under control
- Respect other people’s privacy
- Don’t abuse your power
- Be forgiving of other people’s mistakes
A branch of philosophy that deals with determining what is right and wrong
COMPUTER ETHICS
Main concerns of computer ethics
Internet privacy
Cracking
Copyright infringement
Internet control
Main concerns of computer ethics
Internet privacy
Cracking
Copyright infringement
Internet control
An adjective or prefix which means relating to or characteristic of information technology, virtual reality, and computers
CYBER
T or F
When working on animation films or designing video games, it is the programmer’s responsibility to understand his target audience/users and the effect it may have on them
T
T or F
A computer game for kids should have content that can influence them negatively
F
A ____ ____/development firm should consider the influence their code can have on society at large
SOFTWARE
The ____ we follow in the real world applies to communication over computers as well
COMMUNICATION ETIQUETTE
A crime in which a computer or the internet is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense
CYBERCRIME
Individuals or teams of people who use technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, and generating profit
CYBERCRIMINALS
Republic Act No. 10173 _ _ _ _ _ is an act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a national privacy commission, and for other purposes
DATA PRIVACY ACT OF 2012
Republic Act No. 11449 Access Devices Regulation Act of 1998 is an Act Providing for Additional Prohibitions to and Increasing Penalties for Violations of Republic Act No. _
8484
Illegal Downloading. Obtaining files that you do not have the right to use from the internet. Digital Piracy, Practice of illegally copying and selling digital music, video, computer software, etc. Copyright Infringement
ELECTRONIC THEFT
Republic Act No. 9775 The _ Act of 2009 defines the crime of child pornography, prescribing penalties therefor and for other purposes
ANTI-CHILD PORNOGRAPHY
A type of intellectual property that gives its owner the exclusive right to print, publish, distribute, adapt, display, and perform a creative work
COPYRIGHT
The violation, piracy or theft of a copyright holder’s exclusive rights through the unauthorized use of a copyrighted material or work
COPYRIGHT INFRINGEMENT
Presenting someone else’s work or ideas as your own, with or without their consent, by incorporating it into your work without full acknowledgement
PLAGIARISM
_ applies when ideas are copied; copyright violation occurs only when a specific fixed expression (e.g., sequence of words, use of an image) is copied
PLAGIARISM
COMMON CYBERCRIMES
Hacking
Computer related forgery, fraud and/or identity theft
Electronic theft
Cyberbullying
Cybersex
Child Pornography
Cyber Libel
_
Unauthorized access of or interference with computer systems, servers, or information and communication system or any access in order to corrupt, alter, steal, or destroy electronic data using computers or other information and communication systems without the computer or system owner’s knowledge and consent of the owner of the computer or information communication system, including the introduction of computer viruses and the like resulting in the corruption, destruction, alteration, theft, or loss of electronic data messages or electronic documents
HACKING
The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature
CYBERBULLYING
Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration
CYBERSEX
A form of child sexual exploitation committed through a computer system
CHILD PORNOGRAPHY
An unprivileged false statement of fact which tends to harm the reputation of a person or company
CYBER LIBEL
A threat that makes use of the World Wide Web to disperse, conceal, and update itself to facilitate cybercrime
INTERNET THREAT
Internet Threats
Malware
Spam
Phishing
Pharming
Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, adware, and ransomware
MALWARE
Malicious program designed to replicate itself and transfer from one computer to another either through the internet and local network or data storage (like flash drives and CD’s)
VIRUS
Malicious program designed that transfer from one computer to another by any type of means. Often, it uses a computer network to spread it
WORM
The ___ ___ ___ worm was created by a Filipino destroys all the kinds of files including photographs, audio files and documents. Affected users who didn’t have backup copies lost them permanently
I LOVE YOU
A malicious program disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allow hackers to get information
TROJAN
Trojan files are usually saved as ____. An example of Trojan is Roque Security Software which tricks the user into posing that it is a security software. It asked the user to pay to his/her security. But, in reality they are not protected at all
.EXE.files
Program that runs in the background without knowing it. That’s why it is called “spy”. It has the ability to monitor what are you are currently doing through keylogging. Used to record the keystrokes done by the user. Done to steal password or any other sensitive information. Can record email, messages, any information you type using your keyboard
SPYWARE
Program designed to send you advertisements, mostly as pop ups. You can usually see adware in restricted or unwanted site. Some would tell you that you won a million dollar and you have to claim it before time runs out
ADWARE
A type of malicious software designed to block access to a computer system until a sum of money is paid
RANSOMWARE
The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs
SPAM
The Three Ages of Digital
- Pre-digital Age
- Mid-digital Age
- Post-digital Age
The time before our world became digital can simply be identified as a physical world where media channels were consumed on TV, newspaper, radio, and people loved reading magazines. These were all one-way communication.
PRE-DIGITAL AGE
Computers
In _, the first set of computers for commercial purposes were released but solved only simple arithmetic problems and data handling and were expensive for most people.
1951
In _, laptops with tiny screens were invented.
1981
It took almost a week for pictures to be developed. The process involved taking pictures on film, getting the roll developed, and then printed. It was until 1988 that a fully functional camera with storage of up to 10 photos was released.
CAMERA AND PHOTOGRAPHY
Music was only heard live before LP records. Then there came in 12-inch discs and music was recorded and played by placing the needle on the record. It was long after that the Walkman was a thing and music was recorded on cassettes and movies were recorded on VCRs. Then music was recorded on compact discs and movies on DVD.
DATA AND STORAGE
___________ Age
This was the time when TV didn’t show anything anywhere because of digital rights that were yet not cleared and most of what TV showed were headlines about new discoveries and inventions which were happening fast.
Soon after digitalization started to become more and more accepted and immersed in society, knowledge started becoming vast.
MID-DIGITAL AGE
Mobile Phones
In _ saw the release of a smartphone that not only supported calls but also email and fax.
1994
The concept of digital has far gone out of the conversation by this time as it has become a norm to live in a digital world. In fact, the time before this has become irrelevant and off-topic by this era. In this era, digital technology is the backbone of life and it becomes the elephant in the room only in its absence. On the spot videos, smart homes, and offices, digital news and content are already the essences of life.
POST-DIGITAL AGE
_ is defined as a group of interrelated technologies (electronic devices) for accessing, processing, and disseminating information. It is a system of electronic network activated through a complex hardware and software systems linked by a vast array of technical protocols.
ICT
INFORMATION AND COMMUNICATIONS TECHNOLOGY
refers to a transformation of culture and social organizations / structures over time. We are aware that in a modern world, a society is never static and that of social, political, economic, and cultural changes occurs constantly.
SOCIAL CHANGE
Fulfils a number of important roles for human wellbeing, such as time structure, social contact, a sense of purpose, a valued social position as well as an opportunity for skill use
EMPLOYMENT