Different Types of Social Bookmarking Sites
30 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the system that enables you to access hypertext documents and other files over the Internet?

  • HTML
  • World Wide Web (correct)
  • Internet Protocol Suite
  • TCP/IP
  • Which software allows users to navigate from one web page to another via hyperlinks embedded in the documents?

  • Safari (IOS)
  • Microsoft Edge (correct)
  • Opera Browser
  • Google Chrome
  • What type of website refers to the web that is the same regardless of the user?

  • Interactive
  • Responsive
  • Dynamic
  • Static (correct)
  • Who invented the World Wide Web?

    <p>Tim Berners-Lee</p> Signup and view all the answers

    What markup language is used to format pages on the World Wide Web?

    <p>HTML</p> Signup and view all the answers

    What is a collection of web pages and related content identified by a common domain name?

    <p>Website</p> Signup and view all the answers

    Which type of websites allow users to upload and share media content like images, music, and video?

    <p>Media Sharing sites</p> Signup and view all the answers

    Which type of sites focus on short updates from the user, with posts typically ranging from 140-200 characters?

    <p>Microblogging sites</p> Signup and view all the answers

    What is a key safety tip mentioned for being online?

    <p>Add a password to your home WIFI</p> Signup and view all the answers

    What is the term for the act of sending sexually explicit text messages, images, and videos?

    <p>Sexting</p> Signup and view all the answers

    Which category of websites allows users to store and manage links to various websites and resources?

    <p>Bookmarking sites</p> Signup and view all the answers

    Which internet risk involves someone pretending to be something else to gain confidence or steal data?

    <p>Spoofing</p> Signup and view all the answers

    Where should you be cautious about sharing information according to the text?

    <p>In public posts about vacations</p> Signup and view all the answers

    What is the term used for a malicious program that replicates itself by copying to another program?

    <p>Virus</p> Signup and view all the answers

    Which type of websites allow users to post their own news items or links to other news sources?

    <p>Social News sites</p> Signup and view all the answers

    Which of the following involves using electronic communication to stalk or harass an individual or group?

    <p>Cyber Stalking</p> Signup and view all the answers

    What term describes a crime of stealing personal information to assume someone else's identity?

    <p>Identity Theft</p> Signup and view all the answers

    What is the general term for a software sent by attackers to disrupt a computer's operation?

    <p>Malware</p> Signup and view all the answers

    During which period was the use of electricity for information handling and transfer prominent?

    <p>Electromechanical Period</p> Signup and view all the answers

    What gave rise to the modern-day alphabet according to the text?

    <p>Words, symbols, and pictograms</p> Signup and view all the answers

    Which country has the highest digital population in the world according to the text?

    <p>Philippines</p> Signup and view all the answers

    In terms of online activities in the Philippines, which of the following is NOT mentioned in the text?

    <p>Traditional farming methods</p> Signup and view all the answers

    Which period includes events such as the Late vacuum tubes period and Transistors period?

    <p>Electronic Period</p> Signup and view all the answers

    What is a distinguishing feature of the Electromechanical Period as mentioned in the text?

    <p>Utilization of electricity for information handling</p> Signup and view all the answers

    What is a Trojan Horse?

    <p>A malicious program disguised as a legitimate program to take control of a computer</p> Signup and view all the answers

    What does a keylogger do?

    <p>Steals user credentials and confidential information by recording keystrokes</p> Signup and view all the answers

    What is the main characteristic of adware?

    <p>Displaying unwanted advertisements and behaving abnormally</p> Signup and view all the answers

    What is Ransomware known for?

    <p>Blocking users from accessing programs/files and demanding payment for removal</p> Signup and view all the answers

    What is the purpose of a Botnet?

    <p>To control a collection of infected internet-connected devices</p> Signup and view all the answers

    What is the main feature of Phishing?

    <p>Using deceptive emails and websites to acquire sensitive personal data</p> Signup and view all the answers

    Study Notes

    Internet and the Web

    • The system enabling access to hypertext documents over the Internet is known as the World Wide Web.
    • Web browsers allow users to navigate between web pages using hyperlinks embedded in documents.
    • Static websites refer to pages that display the same content to all users, regardless of their identity or input.
    • Tim Berners-Lee invented the World Wide Web in 1989.

    Web Technology and Formats

    • HTML (HyperText Markup Language) is the markup language used to format pages on the World Wide Web.
    • A website is a collection of web pages and related content identified by a common domain name.

    Social Media and Interaction

    • Social media websites enable users to upload and share media content such as images, music, and videos.
    • Microblogging sites focus on short updates from users, with posts typically ranging from 140-200 characters.

    Online Safety and Risks

    • A key safety tip for being online is to be cautious about sharing personal information.
    • Sexting refers to the act of sending sexually explicit text messages, images, and videos.
    • Bookmarking websites allow users to store and manage links to various websites and resources.
    • Impersonation is a risk involving someone pretending to be someone else to gain trust or steal data.

    Cybercrime Terminology

    • Phishing is characterized by deceitful attempts to obtain sensitive information by disguising as a trustworthy entity.
    • A virus is a malicious program that replicates itself by copying to another program.
    • Content-sharing websites allow users to post their own news items or links to other news sources.
    • Cyberstalking involves using electronic communication to harass or stalk individuals or groups.
    • Identity theft is a crime of stealing personal information to assume someone else's identity.
    • Malware is a general term for software designed to disrupt a computer's operation.

    Historical Context

    • The prominent use of electricity for information handling and transfer occurred during the 20th century.
    • The modern-day alphabet emerged from developments in communication technologies and writing systems.
    • China has the highest digital population in the world.

    Technology Periods

    • The periods including the Late Vacuum Tubes and Transistors periods are significant for advancements in computing technology.
    • The Electromechanical Period is distinguished by the integration of mechanical and electrical components in technology.

    Cyber Threats

    • A Trojan Horse is a type of malware that disguises itself as legitimate software.
    • A keylogger is a malicious tool that records keystrokes made on a device.
    • Adware is primarily characterized by displaying advertisements to users, often with disruptive elements.
    • Ransomware is known for encrypting files on a victim's system and demanding payment for decryption.
    • A botnet refers to a network of compromised computers used to perform automated tasks, typically for malicious purposes.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Explore the categories of social media platforms like social bookmarking sites, social news platforms, and media sharing websites. Discover examples of each category and learn how they function.

    More Like This

    Use Quizgecko on...
    Browser
    Browser