Podcast
Questions and Answers
Web 1.0 can be manipulated “as is”.
Web 1.0 can be manipulated “as is”.
False (B)
What does Web 2.0 allow the user to do?
What does Web 2.0 allow the user to do?
Interact with the page, comment, or create a user account
What is Folksonomy?
What is Folksonomy?
Allows user to categorize and classify or arrange information
What is Rich User Experience?
What is Rich User Experience?
What is Long Tail?
What is Long Tail?
What is User Participation?
What is User Participation?
What is Software as a Service (SaaS)?
What is Software as a Service (SaaS)?
What does Web 3.0 provide?
What does Web 3.0 provide?
HTML files and current web browsers can support Web 3.0.
HTML files and current web browsers can support Web 3.0.
The user's security is unquestioned with web 3.0.
The user's security is unquestioned with web 3.0.
Describe the Vastness problem with Web 3.0.
Describe the Vastness problem with Web 3.0.
Describe the Logic problem with Web 3.0.
Describe the Logic problem with Web 3.0.
What is Convergence?
What is Convergence?
What is Social Media?
What is Social Media?
What are Social Networks?
What are Social Networks?
What are Bookmarking Sites?
What are Bookmarking Sites?
What are Social News sites?
What are Social News sites?
What are Media Sharing sites?
What are Media Sharing sites?
What is Microblogging?
What is Microblogging?
What is the impact of Mobile Technologies?
What is the impact of Mobile Technologies?
What is iOS used in?
What is iOS used in?
What is Android?
What is Android?
What is Blackberry OS used in?
What is Blackberry OS used in?
What is Windows Phone OS?
What is Windows Phone OS?
What is Symbian?
What is Symbian?
What is WebOS?
What is WebOS?
What is Assistive Media?
What is Assistive Media?
What should you be mindful of when sharing online?
What should you be mindful of when sharing online?
It is important to just accept terms and conditions without reading it to stay safe online.
It is important to just accept terms and conditions without reading it to stay safe online.
It is unnecessary to check the privacy policy page of a website to learn how the website handles the information.
It is unnecessary to check the privacy policy page of a website to learn how the website handles the information.
It is not important to know the security features of the social networking site you use.
It is not important to know the security features of the social networking site you use.
It is okay to talk to strangers whether online or face-to-face.
It is okay to talk to strangers whether online or face-to-face.
It is okay to log in to public networks/Wi-Fi.
It is okay to log in to public networks/Wi-Fi.
It is okay to share your password with anyone.
It is okay to share your password with anyone.
It is recommended to post about a future vacation.
It is recommended to post about a future vacation.
You should add friends you don't know in real life.
You should add friends you don't know in real life.
It is safe to visit untrusted websites.
It is safe to visit untrusted websites.
It is okay to install and update an antivirus on your computer.
It is okay to install and update an antivirus on your computer.
It is okay to use several anti-virus softwares on your computer to avoid conflicts.
It is okay to use several anti-virus softwares on your computer to avoid conflicts.
It is okay to download anything from untrusted websites
It is okay to download anything from untrusted websites
It is okay to use pirated softwares.
It is okay to use pirated softwares.
It is okay to reply or click links from suspicious emails.
It is okay to reply or click links from suspicious emails.
You should believe everything posted in social networks.
You should believe everything posted in social networks.
What is typically displayed in the title bar of Microsoft Word?
What is typically displayed in the title bar of Microsoft Word?
What is the menu tab in Microsoft Word also called?
What is the menu tab in Microsoft Word also called?
What does the tool bar in Microsoft Word contain?
What does the tool bar in Microsoft Word contain?
The minimize, restore, and close buttons adjust what?
The minimize, restore, and close buttons adjust what?
What is the area primarily used for in the document area of Microsoft Word?
What is the area primarily used for in the document area of Microsoft Word?
What is the vertical scrollbar used for in Microsoft Word?
What is the vertical scrollbar used for in Microsoft Word?
What does the 'undo' command do in Microsoft Word?
What does the 'undo' command do in Microsoft Word?
What is Email Spam AKA Junk mail?
What is Email Spam AKA Junk mail?
What is Email Spoofing?
What is Email Spoofing?
What is Phishing?
What is Phishing?
What is Spyware?
What is Spyware?
What is a Computer Worm?
What is a Computer Worm?
What is a Trojan Horse?
What is a Trojan Horse?
What is a Hacker?
What is a Hacker?
What does the title bar refer to in excel?
What does the title bar refer to in excel?
What is the menu tab area used for in excel?
What is the menu tab area used for in excel?
What does the tools bar hold in excel?
What does the tools bar hold in excel?
What does the cell address display in excel?
What does the cell address display in excel?
What does the formula bar display in excel?
What does the formula bar display in excel?
What does the term 'cell' refer to in excel?
What does the term 'cell' refer to in excel?
What does the term 'cell pointer' refer to in excel?
What does the term 'cell pointer' refer to in excel?
Flashcards
Web 1.0
Web 1.0
Cannot be manipulated; static/flat/stationary page.
Web 2.0
Web 2.0
Allows user interaction, commenting, and account creation.
Web 3.0
Web 3.0
Provides a common framework for data sharing across applications and communities.
Convergence
Convergence
Signup and view all the flashcards
Social Media
Social Media
Signup and view all the flashcards
Social Networks
Social Networks
Signup and view all the flashcards
Bookmarking Sites
Bookmarking Sites
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Computer Worm
Computer Worm
Signup and view all the flashcards
Trojan Horse
Trojan Horse
Signup and view all the flashcards
Study Notes
- The information below is a summary of the provided text.
Web 1.0
- Cannot be manipulated
- Static/flat page/stationary page
Web 2.0
- It allows user interaction enabling users to comment or make accounts.
- Folksonomy: enables users to categorize and classify/arrange information.
- A rich user experience is dynamic and responding to user input.
- Long Tail - Services are offered on demand as needed.
- Users able to put content
- With SaaS (Software as a Service), users subscribe to software when needed.
- Features diverse information sharing through universal web access
Web 3.0
- Contains common framework that allows data to be shared and reused across applications, enterprises, and community boundaries
- Problems include compatibility, security, vastness, vagueness and logic
Trends in Technology
- Convergence: Technological convergence is the synergy of technological advancements to work on a similar goal or task.
- Social Media: Websites or online channels enable users to create, co-create, discuss, modify, and exchange user-generated content.
Types of Social Media
- Social Networks: Sites that connect people with similar interests or backgrounds.
- Bookmarking Sites: Store and manage links to websites and resources.
- Social News: Post news items or links to other news sources.
- Media Sharing: Upload and share media like images, music, and video.
- Microblogging: Short updates from users.
- Blogs and Forums: Post user content.
Mobile Technologies
- Popular smartphones and tablets that have increased use over the years
- iOS: Used in Apple devices like iPhone and iPad.
- Android: Open source OS developed by Google.
- Blackberry OS: Used in Blackberry devices.
- Windows Phone OS: Closed source and proprietary OS by Microsoft.
- Symbian: Original smartphone OS; used by Nokia devices
- WebOS: Originally used in smartphones; now used in smart TVs.
Assistive Media
- A nonprofit service offers visual and reading assistance.
Online Safety Tips
- Be mindful of sharing online and to which sites.
- Read terms and conditions instead of accepting without reading.
- Check a website's privacy policy.
- Know the security features of social networking sites, like keeping profiles private.
- Never share passwords.
- Avoid logging in to public networks/Wi-Fi.
- Don't talk to strangers online or face-to-face.
- Avoid posting about future trips.
- Add real-life friends.
- Avoid untrusted websites.
- Install/update antivirus software, but use only one to avoid conflicts.
- Avoid downloading from untrusted sites.
- Buy software; do not use pirated versions.
- Don't reply/click suspicious email links.
- Verify information posted on social networks.
Microsoft Word Parts
- Title bar: Area where the current document's filename is displayed.
- Menu tab: Ribbon area
- Tool Bar: Contains a stack of runnable icon commands.
- Minimize, Restore, and Close - adjusts the viewing
- Vertical ruler
- Horizontal Ruler
- Document area - where text and images are placed
- Vertical Scrollbar - to navigate the document
Common MS Word Tasks
- Save: command to save
- Undo: command used to undo the current activity.
- Redo: command to redo current activity
Internet Dangers
- Email Spam (Junk mail): Unsolicited commercial email from an unknown sender to multiple recipients.
- Email Spoofing: A deceitful email address is changed.
- Phishing: Illegitimate attempts to get confidential information (passwords, usernames, credit card details) appearing from a trustworthy source.
- Pharming: Hacker attack redirects website traffic to a fictitious site.
- Spyware: A program secretly installed to collect information or control a user’s computer.
- Computer Worm: A program that replicates itself through a network
- Trojan Horse: Malware appears helpful, but covertly performs unwanted or malicious actions without a user's consent.
- Computer Virus: Program duplicates infecting a computer.
- Hacker: Someone unauthorized to enter and control other people's computers
Excel
- title bar: Shows the file name
- menu tab: Area where commands are displayed and run
- tools: Area that has stacked icon commands
- cell address: Displays the current position in the row and column of the cell pointer.
- formula bar: Displays the formula used for a particular cell
- cell: Individual cell
- cell pointer: Current worksheet position for data entry
- column: Cluster of cells in a vertical position, indicated by letters
- row: Cluster of cells in a horizontal position indicated by numbers
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.