Web 1.0, 2.0, and 3.0

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which Web version is characterized by users being able to interact with the page and view content differently from others?

  • Web 4.0
  • Web 2.0 (correct)
  • Web 1.0
  • Web 3.0

What is a key characteristic of Web 1.0?

  • Users can freely manipulate content on web pages.
  • It is also known as the Semantic Web.
  • It consists of static web pages connected by hyperlinks. (correct)
  • Web pages are dynamically generated based on user preferences.

Which term describes the practice of users categorizing and classifying information using freely chosen keywords?

  • Folksonomy (correct)
  • Dynamic web
  • Semantic Web
  • Static web

Which characteristic is most indicative of a rich user experience in Web 2.0?

<p>Content that is dynamic and responds to user interaction. (C)</p> Signup and view all the answers

Which feature distinguishes Web 2.0 through user participation?

<p>Users can contribute content through comments, reviews, and evaluations. (B)</p> Signup and view all the answers

What does the 'Long Tail' concept refer to in the context of web services?

<p>Services offered on demand rather than as a one-time purchase. (A)</p> Signup and view all the answers

What best exemplifies the concept of 'Software as a Service'?

<p>Subscribing to software only when needed. (D)</p> Signup and view all the answers

Which of the following best describes 'Mass Participation' in the context of Web 2.0?

<p>Diverse information sharing through universal web access. (A)</p> Signup and view all the answers

What is a primary limitation of Web 3.0 regarding compatibility?

<p>HTML files and current web browsers may not fully support Web 3.0. (B)</p> Signup and view all the answers

Which of the following concerns is associated with Web 3.0 regarding user data?

<p>User's security is in question, since the machine is saving his or her preferences. (A)</p> Signup and view all the answers

What does the term 'Vastness' refer to, regarding challenges within the World Wide Web?

<p>The immense scale and volume of web pages. (D)</p> Signup and view all the answers

Why is 'Vagueness' a noted problem in the context of web technologies?

<p>Certain words are imprecise and depend on the user's interpretation. (D)</p> Signup and view all the answers

What limitation is implied when discussing 'Logic' as a challenge for machines interacting with web content?

<p>Machines have limitations in predicting what the user is referring to, even when using logic. (D)</p> Signup and view all the answers

What is the primary purpose of assistive technology?

<p>To help people, especially those with disabilities, to increase, improve, and maintain their functional capabilities. (B)</p> Signup and view all the answers

Which of the following items would be classified as mobility aids?

<p>Wheelchairs, walkers, and prosthetic devices. (B)</p> Signup and view all the answers

Which category of assistive technology is specifically designed to aid individuals with challenges related to memory and attention?

<p>Cognitive Aids (A)</p> Signup and view all the answers

What is the function of computer software and hardware designed as assistive technology?

<p>To help people with mobility and sensory impairments use computers and mobile devices (A)</p> Signup and view all the answers

What is the purpose of tools, like automatic page turners and adapted pencil grips, in assistive technology?

<p>To help learners with disabilities participate in educational activities. (D)</p> Signup and view all the answers

What are physical modifications in the built environment intended to achieve?

<p>To enable persons with disabilities to play sports and be physically active. (C)</p> Signup and view all the answers

What is the primary goal of collaborative platforms in a corporate setting?

<p>To facilitate communication and interpersonal contact in corporate project work. (D)</p> Signup and view all the answers

Which type of social media is characterized by allowing users to connect with others who share similar interests or backgrounds?

<p>Social networks (C)</p> Signup and view all the answers

What is the primary function of bookmarking sites?

<p>To store and manage links to various websites and resources. (B)</p> Signup and view all the answers

Which type of social media platform allows users to post their own news items or links to other news sources?

<p>Social News (D)</p> Signup and view all the answers

What is a key characteristic of media sharing social media platforms?

<p>Allowing users to upload and share media content such as images, music, and video. (A)</p> Signup and view all the answers

What is one of the core tenets of Netiquette?

<p>Remember the human on the other side of the communication. (C)</p> Signup and view all the answers

What is the encompassing definition of malware?

<p>A catch-all term for any type of malicious software. (C)</p> Signup and view all the answers

How does a Trojan typically infiltrate a computer system?

<p>By pretending to be a reliable application. (A)</p> Signup and view all the answers

What is the primary deceptive tactic used by rogue security software?

<p>Tricking consumers into thinking their computer has a virus. (A)</p> Signup and view all the answers

How does a computer worm typically spread from one computer to another?

<p>Spreads or self-replicates from one computer to another without human activation. (D)</p> Signup and view all the answers

Which of the following is the primary function of spyware?

<p>To take private information and internet usage data and passes it to third parties. (D)</p> Signup and view all the answers

What is the main activity associated with a keylogger?

<p>Secretly recording the keys pressed on a keyboard. (D)</p> Signup and view all the answers

How does adware generate revenue for its creators?

<p>By displaying banner ads on your screen. (C)</p> Signup and view all the answers

What action is most likely to lead to the download of malware through spam?

<p>Opening an email attachment or clicking on a link in a spam message. (D)</p> Signup and view all the answers

What do intellectual property rights primarily protect?

<p>Rights granted to individuals over their creative works. (A)</p> Signup and view all the answers

What defines direct plagiarism?

<p>The unattributed, unmarked transcription of another person's work word for word. (A)</p> Signup and view all the answers

What is considered self-plagiarism?

<p>Submitting your own prior work or combining portions of it without permission. (A)</p> Signup and view all the answers

What is the key characteristic of mosaic plagiarism?

<p>Using terms from a source without putting them in quotes or finding synonyms for the author's words. (C)</p> Signup and view all the answers

What is the defining factor of accidental plagiarism?

<p>Failing to mention sources, incorrectly paraphrasing them, or unintentionally using similar terms. (C)</p> Signup and view all the answers

When evaluating information, what does 'Accuracy' primarily refer to?

<p>Content is grammatically correct, verifiable, and cited when necessary. (C)</p> Signup and view all the answers

What aspect of information evaluation does the 'Author' criterion address?

<p>Defines who created the content, the individual ,or the group's credential/expertise and provides contact information. (D)</p> Signup and view all the answers

In the context of evaluating information, what does 'Currency' imply?

<p>Information is current and updated frequently. (B)</p> Signup and view all the answers

What does 'Fairness' refer to when evaluating information?

<p>Content is balanced, presenting all sides of an issue and multiple points of view. (D)</p> Signup and view all the answers

What is the primary function of search engines?

<p>Search Engines are programs that look for documents based from specified keywords and return these documents where the keyword were Found. (D)</p> Signup and view all the answers

Flashcards

WEB 1.0

First stage of the World Wide Web. Web pages connected by hyperlinks that are static and cannot be manipulated by users.

WEB 2.0

A dynamic web where users can interact with the page, including networking sites, blogs, wikis, video sharing, and web applications.

WEB 3.0

Also referred to as the Semantic Web. Allows data to be shared and reused across applications, enterprises, and communities.

FOLKSONOMY

Allows users to categorize and classify/arrange information using freely chosen keywords (tagging).

Signup and view all the flashcards

RICH USER EXPERIENCE

Content is dynamic and responsive to the user's input, such as websites that show local content.

Signup and view all the flashcards

USER PARTICIPATION

The owner of the website isn't the only one able to add content; others can contribute through comments, reviews, and evaluation.

Signup and view all the flashcards

LONG TAIL

Services offered on demand rather than a one-time purchase; synonymous with subscribing to a data plan.

Signup and view all the flashcards

SOFTWARE AS A SERVICE

Users subscribe to software only when needed rather than purchasing; e.g., Google Docs.

Signup and view all the flashcards

MASS PARTICIPATION

Diverse information sharing through universal web access; Web 2.0's content is based on people from various cultures.

Signup and view all the flashcards

COMPATIBILITY (Web 3.0)

HTML files and current web browsers could not support Web 3.0.

Signup and view all the flashcards

SECURITY (Web 3.0)

The user's security is in question since the machine is saving their preferences.

Signup and view all the flashcards

VASTNESS (Web 3.0)

The World Wide Web already contains billions of web pages, and continues to grow.

Signup and view all the flashcards

VAGUENESS (Web 3.0)

Certain words are imprecise; words like 'old' and 'small' depend on the user.

Signup and view all the flashcards

LOGIC (Web 3.0)

Since machines use logic, there are limitations for a computer to predict what a user is referring to.

Signup and view all the flashcards

ASSISTIVE TECHNOLOGY

Equipment, software, or products that help people, especially those with disabilities, to increase, improve, and maintain functional capabilities.

Signup and view all the flashcards

MOBILITY AIDS

Wheelchairs, scooters, walkers, canes, crutches, prosthetic devices, and orthotic devices.

Signup and view all the flashcards

COGNITIVE AIDS

Computer or electrical assistive devices that help people with memory, attention, or other challenges in their thinking skills.

Signup and view all the flashcards

COMPUTER SOFTWARE & HARDWARE (Assistive)

Voice recognition programs, screen readers, and screen enlargement applications that help people with mobility and sensory impairments use computers and mobile devices.

Signup and view all the flashcards

TOOLS (Assistive)

Automatic page turners, book holders, and adapted pencil grips to help learners with disabilities participate in educational activities.

Signup and view all the flashcards

COLLABORATIVE PLATFORMS

To facilitate communication and interpersonal contact in corporate project work; virtual workspace where resources and tools are centralized.

Signup and view all the flashcards

SOCIAL NETWORKS

Sites allowing connections with others sharing interests or backgrounds, like Facebook, Twitter, and Instagram.

Signup and view all the flashcards

BOOKMARKING SITES

Sites that allow you to store and manage links to various websites and resources, e.g., Pinterest, Google, Reddit.

Signup and view all the flashcards

SOCIAL NEWS

Sites allowing users to post their own news items or links to other news sources.

Signup and view all the flashcards

MEDIA SHARING

Websites that allow the distribution of audio and video digital media

Signup and view all the flashcards

BLOGS AND FORUMS

Allow users to post their content.

Signup and view all the flashcards

MALWARE

Malicious software, regardless of how it works, its intent, or how it's distributed. A virus is a specific type that self-replicates.

Signup and view all the flashcards

TROJAN

Installs pretending to be a reliable application; attackers use social engineering to conceal it in genuine applications.

Signup and view all the flashcards

ROGUE SECURITY SOFTWARE

Tricks consumers into thinking their computer has a virus and persuades them to pay for a phony removal program that installs malware.

Signup and view all the flashcards

WORM

Subset of Trojan horse malware that spreads from one computer to another without human activation.

Signup and view all the flashcards

SPYWARE

Intrudes, takes private information and internet usage data, and passes it to third parties.

Signup and view all the flashcards

KEYLOGGER

Secretly recording keys pressed on a keyboard such that the person is unaware.

Signup and view all the flashcards

ADWARE

Makes money by displaying banner ads on your screen, often manipulative, and may provide a backdoor for dangerous software.

Signup and view all the flashcards

SPAM

Spam messages that include malware; opening attachments or clicking links can download malware.

Signup and view all the flashcards

INTELLECTUAL PROPERTY RIGHTS

Rights granted to individuals over their creative works, granting exclusive rights to utilize their creation for a set length of time.

Signup and view all the flashcards

DIRECT PLAGIARISM

The unattributed transcription of a passage from another person's work word for word.

Signup and view all the flashcards

SELF PLAGIARISM

Occurs when a student submits their own prior work or combines portions of prior work without permission.

Signup and view all the flashcards

MOSAIC PLAGIARISM

Using terms from a source without quotes or finding synonyms while adhering to the original content.

Signup and view all the flashcards

ACCIDENTAL PLAGIARISM

Failing to mention sources, incorrectly paraphrasing them, or unintentionally using similar terms or word groupings.

Signup and view all the flashcards

Search Engines

Programs that look for documents based on specified keywords and return these documents.

Signup and view all the flashcards

XLOOKUP FUNCTION

The command in MS Excel that allows you to search for specific values in a table.

Signup and view all the flashcards

Study Notes

  • ICT refers to Information and Communications Technology

The Web and Its Versions

  • Web 1.0 marked the first stage of the World Wide Web
  • Web 1.0 consists of web pages connected by hyperlinks
  • Web 1.0 is a static web page that cannot be manipulated by users
  • Web 2.0 known as dynamic web allows the user to interact with page
  • Web 2.0 allows the user to see differently than others
  • Web 2.0 includes networking sites, blogs, wikis, hosted services, video sharing sites, and web applications
  • Web 3.0 is known as Semantic Web
  • Web 3.0 allows data to be shared and reused across application, enterprise, and community boundaries.

Features of Web 2.0

  • Folksonomy is a feature of Web 2.0
  • Folksonomy allows users to classify/arrange information using freely chosen keywords through tagging
  • Rich user experience is a feature of Web 2.0
  • Rich user experience means that content is dynamic and responsive to user's input.
  • Websites that show local content are examples of rich user experience
  • User participation means that anyone can add comments, reviews, and evaluations to a website
  • Lazada, Shopee, and Amazon are examples where anyone can participate on the website
  • Long tail provides services that are offered on demand rather than on a one-time purchase.
  • Long tail is synonymous to subscribing to a data plan that charges you for the amount of time you spent in the internet.
  • Software as a service allows users to subscribe to software only when needed
  • Google Docs is an example of software as a service used to create and edit word processing and spreadsheets
  • Mass participation has diverse information sharing through universal web access and content is based on people from various cultures

Problems of Web 3.0

  • Compatibility issues exist since HTML files and current web browsers cannot support Web 3.0
  • There are security concerns because the machine is saving user preferences.
  • The vastness of the World Wide Web is a problem as it contains billions of web pages.
  • Vagueness is a problem because certain words are imprecise depending on the user
  • Logic is a problem because there are limitations for a computer to predict what the user is referring to
  • Assistive Technology helps people, especially those with disabilities, increase, improve, and maintain their functional capabilities through equipment, software programs, or product systems
  • Mobility aids include wheelchairs, scooters, walkers, canes, crutches, prosthetic devices, and orthotic devices
  • Hearing aids
  • Cognitive aids include computer or electrical assistive devices to help people with memory, attention, or other challenges in their thinking skills
  • Computer software and hardware includes voice recognition programs, screen readers, and screen enlargement applications to help people with mobility and sensory impairments use computers and mobile devices
  • Tools such as automatic page turners, book holders, and adapted pencil grips help learners with disabilities participate in educational activities
  • Close captioning (CC)
  • Physical modifications in the built environment enable persons with disabilities to play sports and be physically active
  • Adaptive switches and utensils
  • High-performance mobility devices
  • Devices and features of devices help perform tasks such as cooking, dressing, and grooming with specialized handles and grips, devices that extend reach, and lights on telephones and doorbells

Collaborative Platforms

  • Collaborative platforms aim to facilitate communication and interpersonal contact in corporate project work and serve as a virtual workspace where resources and tools are centralized.

Types of Social Media

  • Social networks are sites that allow connection with others sharing common interests or backgrounds, like Facebook, Twitter, and Instagram.
  • Bookmarking sites are platforms for storing and managing links to various websites and resources; examples include Pinterest, Google, and Reddit
  • Social news sites allow users to post their own news items or links to other news sources in forums.
  • Media sharing sites allow users to upload and share media content such as images, music, and videos
  • Blogs and forums allow users to post content

10 Commandments of Netiquette

  • Remember the human
  • Adhere to the same standards online that you follow in real life
  • Know where you are in cyberspace
  • Respect other people's time and bandwidth
  • Make yourself look good online
  • Share expert knowledge
  • Help keep flame wars under control
  • Respect other people's privacy
  • Don't abuse your power
  • Be forgiving of other people's mistakes

Malware

  • Malware is an all-encompassing term for any type of malicious software
  • A virus is a malware that self-replicates by inserting its code into other programs.
  • A Trojan is a form of malware that installs into a computer pretending to be a reliable application
  • Attackers use social engineering to conceal a trojan in genuine applications, in order to try and access consumers' systems
  • Rogue security software is malicious software and online fraud that tricks consumers into thinking their computer has a virus
  • Rogue security software tries to persuade consumers to pay for a phony malware removal program that installs malware
  • Since 2008, malicious security software has posed a significant security risk to desktop computers and is considered a type of ransomware and uses scareware to control users
  • SpySheriff and its clones were a primitive example that became infamous.
  • A computer worm is a subset of Trojan horse malware that may spread or self-replicate from one computer to another without human activation, often through an Internet or LAN (Local Area Network) connection
  • Spyware intrudes by taking private information and Internet usage data, and passes the information to advertising, data companies, or other users.
  • Spyware is hard to detect
  • A keylogger secretly records the keys pressed on a keyboard, such that the person is unaware their actions are being watched
  • Keystroke logging is also known as keylogging or keyboard capture
  • The person running a keylogger program can then get the data.
  • Adware makes money for its creators by displaying banner ads on your screen, typically inside a web browser.
  • Some adware types are extremely manipulative and provide a backdoor for dangerous software.
  • Spam refers to spam messages that include malware.
  • When readers open an email attachment or click on a link, they often download malware such as keyloggers, ransomware, Trojan horses, bots, info-stealers, cryptominers, spyware, and Trojans.

Intellectual Property Rights

  • Intellectual property rights grant individuals rights over their creative works, often giving the inventor exclusive rights to utilize his or her creation for a set length of time.

Types of Plagiarism

  • Direct plagiarism is the unattributed, unmarked transcription of a passage from another person's work word for word
  • Self-plagiarism when a student submits their own prior work or combines portions of prior works without getting permission from all of the teachers concerned
  • Mosaic plagiarism uses terms from a source without putting them in quotes or finds synonyms for the author's words while adhering to the general format and content of the original
  • Accidental plagiarism fails to mention sources, incorrectly paraphrases them, or unintentionally uses similar terms, word groupings, and etc

Evaluating Information

  • Accuracy indicates content is grammatically correct, verifiable, and cited when necessary.
  • Author defines who created the content, the individual or group's credential/expertise, and provides contact information
  • Currency indicates information is current and updated frequently.
  • Fairness indicates content is balanced, presenting all sides of an issue and multiple points of view
  • Search engines are programs that look for documents based from specified keywords and return these documents where found
  • Major search engines include Google, Yahoo, AltaVista, Bing, and Lycos
  • Relevance signifies content is relevant to the topic or research.

MS Word Shortcut

  • Ctrl+A: Select all contents of the page
  • Ctrl+B: Bold highlighted selection
  • Ctrl+C: Copy selected text
  • Ctrl+D: Open the font preferences window
  • Ctrl+E: Aligns the line or selected text to the center of the screen
  • Ctrl+F: Open find box
  • Ctrl+I: Italic highlighted selection
  • Ctrl+J: Aligns the selected text or line to justify the screen
  • Ctrl+K: Insert a hyperlink
  • Ctrl+L: Aligns the line or selected text to the left of the screen
  • Ctrl+M: Indent the paragraph
  • Ctrl+N: Opens new, blank document window
  • Ctrl+O: Opens the dialog box or page for selecting a file to open
  • Ctrl+P: Open the print window
  • Ctrl+R: Aligns the line or selected text to the right of the screen
  • Ctrl+S: Save the open document
  • Ctrl+T: Create a hanging indent
  • Ctrl+U: Underline the selected text
  • Ctrl+V: Paste
  • Ctrl+W: Close the currently open document
  • Ctrl+X: Cut selected text
  • Ctrl+Y: Redo the last action performed
  • Ctrl+Z: Undo last action
  • Save
  • Undo
  • Redo
  • Paste
  • Cut
  • Copy
  • Format Painter
  • Font Face
  • Font Size

MS PowerPoint Shortcut

  • Ctrl+N: Create new presentation
  • Ctrl+M: Add a new slide
  • Ctrl+B: Make selected text bold
  • Alt+H, F, S: Change the font size for selected text
  • Alt+W, Q: Open the Zoom dialog box
  • Ctrl+X: Cut selected text, object, or slide
  • Ctrl+C: Copy selected text, object, or slide
  • Ctrl+V: Paste cut or copied text, object, or slide
  • Ctrl+Z: Undo the last action
  • Ctrl+S: Save the presentation
  • Alt+N, P, D: Insert a picture from your device
  • Alt+N, S, H: Insert a shape
  • Alt+G, H: Select a theme
  • Alt+H, L: Select a slide layout
  • Page Down: Go to the next slide
  • Page Up: Go to the previous slide
  • Alt+H: Go to the Home tab
  • Alt+N: Go to the Insert tab
  • F5: Start the slide show
  • Esc: End the slide show
  • Ctrl+Q: Close PowerPoint

MS PowerPoint Menu and Toolbars Overview

  • The Home tab contains the cut and paste features, font and paragraph options, and tools for adding and organizing slides.
  • The Insert tab is where you add something to a slide like pictures, shapes, charts, links, text boxes, video and more.
  • Design covers themes, color schemes, and slide background formatting
  • Transitions sets up how slides change from one to the next on the Transitions tab.
  • Animation choreographs the movement of things on slides.
  • Slideshow sets up the way a presentation is shown to others
  • Review adds comments, run spell-check, or compare one presentation with another
  • View allows you to look at your presentation in different ways depending on where you are in the creation or delivery process.
  • File covers opening, saving, sharing, exporting, printing and managing presentations.
  • Tools tab becomes available when clicking on certain parts of slides, such as pictures, shapes, SmartArt, or text boxes.

Microsoft Excel Parts

  • The title bar displays the workbook name followed by a program name.
  • The menu bar provides access to commands for tasks like opening/closing files, printing, formatting, and other operations
  • Ribbon/Toolbar contains commands for common tasks, organized into tabs with groups of commands
  • Group of commands
  • The name box displays the address of the current selection or active cell
  • The formula bar displays information entered in the current or active cell and can be used to edit cell contents
  • Modern Excel versions have 16,384 columns
  • Column headings are indicated by letters or combinations of letters
  • Modern Excel contains 1,048,576 rows, each named by a number
  • A cell is an intersection of a column and row with a unique address.
  • A darkened border, called the cell pointer, identifies it
  • Navigation buttons allow you to move to another worksheet in an Excel workbook; they display the first, previous, next, and last worksheets.
  • A workbook is made up of three worksheets and labeled Sheet1, Sheet2, Sheet3
  • Excel worksheets are made up of columns and rows, and to access a worksheet, click the tab that says Sheet#.

Worksheets Views

  • Three ways to view a worksheet: normal view, page layout view, and page break preview

Excel Formulas Overview

  • The XLOOKUP function finds things in a table or range by row, looking in one column for a search term and returning a result from the same row in another column
  • The VLOOKUP function finds things in a table or range by row
  • The COUNTIF function counts the number of cells that meet a criterion
  • The IF function makes logical comparisons between a value and what you expect
  • The SUMIF function sums the values in a range that meet specified criteria
  • The SUMIFS tests multiple conditions and return a value based on those conditions
  • The MATCH function searches for a specified item in a range of cells, and then returns the relative position of that item in the range.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Web Evolution and Characteristics Quiz
40 questions
Web 2.0 ve Web 3.0 Farkları
10 questions
Web 1.0 vs Web 2.0 vs Web 3.0
10 questions

Web 1.0 vs Web 2.0 vs Web 3.0

PoliteHeliotrope3275 avatar
PoliteHeliotrope3275
Use Quizgecko on...
Browser
Browser