Web 2.0 and ICT: Key Concepts

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which action exemplifies the use of Information and Communication Technologies (ICT)?

  • Sending a text message to coordinate a meeting. (correct)
  • Cooking a traditional meal using a family recipe.
  • Building a house using traditional tools.
  • Planting rice in a paddy field.

What is Folksonomy in the context of Web 2.0?

  • A way for users to classify information using self-chosen keywords. (correct)
  • A legal framework governing the sharing of online content.
  • A method of website design that prioritizes user experience.
  • A system where websites are categorized by professional editors.

Which of the following is the MOST accurate description of 'Rich User Experience' in Web 2.0?

  • Website owners frequently update content to keep users engaged.
  • Users modify website content solely through their own accounts. (correct)
  • Users can access websites without needing an individual account.
  • Websites are designed with minimal graphics to ensure fast loading times.

How does 'Long Tail' relate to data plans and online services?

<p>It involves paying a recurring fee for continuous access based on usage. (D)</p> Signup and view all the answers

What is the defining characteristic of 'Mass Participation' in the context of Web 2.0?

<p>Content reflects contributions from a globally diverse user base. (A)</p> Signup and view all the answers

Consider a scenario where a user needs a video editing software for a short-term project. Which Web 2.0 feature would best suit their needs?

<p>Software as a Service, enabling them to subscribe temporarily. (A)</p> Signup and view all the answers

A company wants to establish an online presence that allows for maximum user engagement, content contribution, and diverse cultural representation. Which combination of Web 2.0 features should they prioritize to achieve this?

<p>User Participation and Mass Participation. (A)</p> Signup and view all the answers

Which of the following operating systems was developed by Microsoft for smartphones and pocket PCs?

<p>Windows Mobile (B)</p> Signup and view all the answers

What is the primary function of 'Assistive Media' as described?

<p>Providing non-profit services for individuals with visual and reading impairments. (B)</p> Signup and view all the answers

Why is it important to read the terms and conditions before accepting them on a website?

<p>To understand how the website handles your information. (B)</p> Signup and view all the answers

What is the main benefit of browsing in 'incognito mode'?

<p>It protects you from hackers. (C)</p> Signup and view all the answers

Which of the following best describes convergence in the context of Information Communication Technology (ICT)?

<p>The synergy of technological advancements working towards similar goals or tasks. (A)</p> Signup and view all the answers

Which of the following is the primary function of social media?

<p>To enable users to create, co-create, discuss, modify, and exchange user-generated content. (C)</p> Signup and view all the answers

Why is posting about a future vacation online discouraged?

<p>It can make you a target for burglars. (A)</p> Signup and view all the answers

What is the primary reason for installing and regularly updating antivirus software?

<p>To protect the computer from malware and viruses. (C)</p> Signup and view all the answers

Which type of social media platform is characterized by short, frequent updates from users, typically delivered to subscribers or followers?

<p>Microblogging (A)</p> Signup and view all the answers

Which of the following functionalities, once exclusive to personal computers, are now commonly found in smartphones due to advancements in mobile technologies?

<p>Complex data processing, document creation and cloud syncing files. (C)</p> Signup and view all the answers

Which of the following is the LEAST secure practice regarding online safety?

<p>Sharing your password with a close family member 'just in case'. (B)</p> Signup and view all the answers

What is a critical step to ensure the privacy and security of a home Wi-Fi network?

<p>Creating a strong, unique password for the network. (D)</p> Signup and view all the answers

Which mobile operating system is known for being open-source, allowing various mobile phone companies to use and modify it freely?

<p>Android (B)</p> Signup and view all the answers

A user receives an email claiming to be from their bank, requesting they update their account information via a provided link. What should the user do?

<p>Call the bank using the number listed on their official website to verify the email's authenticity. (C)</p> Signup and view all the answers

Which of these best describes the relationship between 4G networking and mobile technology?

<p>4G networking is the fastest mobile network commonly used by Smartphones. (D)</p> Signup and view all the answers

Many social media platforms are available on mobile devices. What is the most likely reason for this?

<p>Smartphones offer the capabilities of personal computers, with high-speed internet, from almost anywhere. (C)</p> Signup and view all the answers

Consider a scenario where a user frequently downloads software from various untrusted websites, does not update their antivirus, uses the same simple password for all accounts, and often clicks on links in suspicious emails. Estimate the probability that this user's computer will be infected with malware within one month, assuming each risky behavior independently increases the chance by 20%, and compounding effects are multiplicative.

<p>Approximately 70% (C)</p> Signup and view all the answers

Which MS Word feature automates the creation of personalized documents for mass distribution?

<p>Mail Merge (A)</p> Signup and view all the answers

A software developer is tasked with creating a mobile application that seamlessly integrates with both iOS and Android platforms, while also leveraging cloud-based services for data synchronization. Considering the trends in ICT, what would be the MOST strategic approach to ensure widespread accessibility and optimal performance?

<p>Develop separate native applications for iOS and Android, utilizing platform-specific APIs and cloud services, while optimizing for the latest 5G network capabilities. (A)</p> Signup and view all the answers

An organization seeks to leverage ICT trends to enhance internal communication, collaboration, and knowledge sharing among its globally distributed workforce. Recognizing the diverse technological landscapes and varying levels of digital literacy within the organization, which integrated strategy would MOST effectively promote inclusivity, engagement, and seamless information flow?

<p>Adopt a multifaceted approach integrating user-friendly social media platforms, cloud-based document sharing, mobile-first design principles, and comprehensive digital literacy training programs. (B)</p> Signup and view all the answers

What is the primary purpose of a 'data file' in the context of mail merge?

<p>To store individual recipient information. (C)</p> Signup and view all the answers

In mail merge, what is the function of 'Merge Field' or 'Placeholder'?

<p>Marks the position where individual data will be inserted. (C)</p> Signup and view all the answers

Which of the following actions in MS Word provides the least personalization when using the Mail Merge feature?

<p>Using &quot;Print Documents&quot; directly after performing the Mail Merge without reviewing each individual document. (B)</p> Signup and view all the answers

Consider a scenario where you need to send out a legal notice to clients whose accounts are past due. The notice requires a dynamically generated table containing specific transaction details for each client, pulled from a separate database that is not directly linkable to MS Word. Which method would be MOST efficient and programmatically sound to achieve this using mail merge principles, assuming you have intermediate programming skills?

<p>Write a script (e.g., Python) to programmatically query the database, generate individual CSV files for each client containing their transaction data, and then use mail merge to insert these CSVs as linked objects into the form document through VBA automation. (A)</p> Signup and view all the answers

Which of the following best describes 'intellectual property'?

<p>Creative works, ideas, inventions, or literary works where the creator has rights regarding its use. (C)</p> Signup and view all the answers

What should you do if you are unsure whether your intended use of copyrighted material falls under 'fair use'?

<p>Seek permission from the copyright holder before using the material. (C)</p> Signup and view all the answers

Which practice is LEAST likely to help you avoid copyright infringement?

<p>Using the work without permission, assuming it falls under 'fair use'. (B)</p> Signup and view all the answers

Which action constitutes copyright infringement?

<p>Using copyrighted software in a commercial setting without purchasing a license. (A)</p> Signup and view all the answers

What does the term 'fair use' generally allow?

<p>Using copyrighted material without permission for specific purposes like criticism, education, and research. (B)</p> Signup and view all the answers

When conducting online research, what is the first and foremost step one should take?

<p>Formulate a precise question or set of questions to guide the research. (D)</p> Signup and view all the answers

What does using 'advanced search' options primarily enable you to do?

<p>Filter and refine search results based on specific criteria. (A)</p> Signup and view all the answers

Which of the following is the LEAST reliable indicator of a source's credibility for online research?

<p>The superficial visual appeal and modern design of the website.. (A)</p> Signup and view all the answers

Suppose you are researching the impact of social media on teenage mental health. Which search strategy is most likely to yield the most relevant and credible results?

<p>Using advanced search to find peer-reviewed articles published in reputable journals focusing on psychology and adolescent development. (D)</p> Signup and view all the answers

A researcher discovers a groundbreaking study with irrefutable data contradicting long-held assumptions in their field. They decide to publish these findings verbatim under their own name, without acknowledging the original authors, but subtly alter the formatting and phrasing to avoid direct plagiarism detection. Furthermore, they manipulate the advanced search parameters to suppress the original study's visibility, thereby claiming sole credit for this revolutionary work. Which intellectual property right are they egregiously violating, and what legal mechanism could the original authors potentially employ to seek redress, even if the plagiarist’s version appears superficially distinct?

<p>Copyright law; The original authors could potentially claim 'derivative work infringement', focusing not just on verbatim copying but on the misappropriation of the study’s core findings and unique contribution to the field. (D)</p> Signup and view all the answers

Flashcards

ICT (Information and Communication Technologies)

Deals with using communication technologies (mobile phones, Internet, etc.) to locate, save, send, and edit information.

Folksonomy

Allows users to categorize information using freely chosen keywords, like hashtags.

Rich-User Experience

Users create an account to fully interact with and modify website content.

User Participation

Website users contribute content through comments, reviews, and evaluations.

Signup and view all the flashcards

Long Tail

Services offered "on demand" requiring subscription for continued access, like data plans.

Signup and view all the flashcards

Software as a service

Users subscribe to software only when needed, rather than purchasing it outright.

Signup and view all the flashcards

Mass Participation

Website content reflects diverse cultures and is accessible globally.

Signup and view all the flashcards

Convergence (in ICT)

The merging of different technologies to achieve similar goals or tasks efficiently.

Signup and view all the flashcards

Social Media

Websites and applications that enable users to create, share, discuss, and exchange content.

Signup and view all the flashcards

Social Networks

Social media platforms for connecting with people of similar interests. (e.g., Facebook)

Signup and view all the flashcards

Bookmarking Sites

Platforms for storing and managing website links. (e.g., Pinterest)

Signup and view all the flashcards

Media Sharing

Platforms for uploading and sharing media like images, music, and videos. (e.g., YouTube)

Signup and view all the flashcards

Microblogging

Platforms focused on short, frequent updates from users. (e.g., Twitter)

Signup and view all the flashcards

Blogs and Forums

Platforms where users post content and engage in discussions. (e.g., WordPress)

Signup and view all the flashcards

Mobile Technologies capabilities

The ability of smartphones and tablets to perform tasks originally done on computers.

Signup and view all the flashcards

4G Networking

The mobile network standard providing high-speed internet access on smartphones.

Signup and view all the flashcards

WebOS

Smartphone OS also used for Smart TVs.

Signup and view all the flashcards

Windows Mobile

Microsoft's OS for Smartphones and Pocket PCs (now discontinued).

Signup and view all the flashcards

Assistive Media

A non-profit helping people with visual and reading impairments read using audio recordings.

Signup and view all the flashcards

Mindful Sharing

Being aware of what you post and on which sites.

Signup and view all the flashcards

Read Terms & Conditions

Read agreements carefully, don't just accept them.

Signup and view all the flashcards

Privacy Policy

Understand how a site handles your shared information by reviewing their privacy policy.

Signup and view all the flashcards

Social Media Security

Enable security options on social media platforms to protect your information.

Signup and view all the flashcards

Password Security

Never give out your password to anyone, to keep your accounts secure.

Signup and view all the flashcards

WiFi Security

Use a private/secure network by adding a password.

Signup and view all the flashcards

Pirated Software

Software obtained illegally

Signup and view all the flashcards

Mail Merge

A feature in MS Word that lets you create and combine documents with a data file.

Signup and view all the flashcards

Form Document

The main document containing the message in a mail merge.

Signup and view all the flashcards

Data File

A file holding recipient's information used in mail merge.

Signup and view all the flashcards

Merge Field / Placeholder

Marks where recipient data will be inserted in a form document.

Signup and view all the flashcards

Infographics

Visual representations of information, statistics, or knowledge.

Signup and view all the flashcards

Copyright

The legal right granted to the owner of original works, including literary, artistic, and musical compositions.

Signup and view all the flashcards

Copyright Infringement

Using copyrighted material without permission from the owner.

Signup and view all the flashcards

Intellectual Property

Creations of the mind, such as inventions, literary and artistic works, designs, and symbols, names, and images used in commerce.

Signup and view all the flashcards

Fair Use

The doctrine that allows limited use of copyrighted material without permission for purposes such as criticism, comment, news reporting, teaching, scholarship, and research.

Signup and view all the flashcards

Paraphrasing with Attribution

Expressing someone else's ideas in your own words while giving credit to the original source.

Signup and view all the flashcards

Citing Sources

Specifying the original source of information used in your work.

Signup and view all the flashcards

Narrowing Down Search Terms

Focusing your research query to get more specific and relevant results.

Signup and view all the flashcards

Advanced Search

A search method that allows you to filter results based on specific criteria.

Signup and view all the flashcards

Assessing Source Credibility

Evaluating the source for accuracy, authoritativeness, objectivity, and currency.

Signup and view all the flashcards

Focused Research Question

Having a clear research question before starting your online search.

Signup and view all the flashcards

Study Notes

  • ICT deals with technologies like mobile phones and the internet for locating, saving, sending, and editing information.
  • The goal of ICT is to provide a unified way to communicate, making communication easier by saving resources like money and time.

Three Kinds of Websites

  • Web 1.0 (Static Website): Content is static and the same for all users, rarely updated and offers read-only access.
  • Web 2.0 (Dynamic Website): Content varies based on user preferences and inputs, enabling user interaction and collaboration, called "Social web or percipatory".
  • Web 3.0 (Semantic Website): Aims to understand user preferences to deliver targeted web content, saves search history and analyzes preferences for advanced website experiences.

Key Features of Web 2.0

  • Folksonomy: Users categorize information using freely chosen keywords or hashtags.
  • Rich-User Experience: Users need accounts to see the content of the website fully.
  • User Participation: Users can put their own content using comments, reviews, and evaluations
  • Long Tail: Services offered on demand rather than one-time.
  • Software as a service: Users subscribe to software only when needed rather than purchasing it.
  • Mass Participation: Website content is based on people from diverse cultures.
  • ICT innovations cater to the needs of people for business or personal use.
  • Convergence: Technological advancements work on similar tasks conveniently.
  • Social Media: Website applications or online channels enable web users to create, co-create, discuss, modify and exchange user-generated content.

Six Types of Social Media

  • Social Networks: Connecting with others with similar interests or background, like Facebook.
  • Bookmarking Sites: Storing and managing links to websites and resources, such as Pinterest.
  • Media Sharing: Uploading and sharing media content like images, music, and video, like YouTube.
  • Microblogging: Short updates from the user. Only subscribers/followers can see updates, like Twitter.
  • Blogs and Forums: Users can post content and others can comment, like WordPress.
  • Mobile Technologies: Smartphones and tablets can do tasks originally done on personal computers.

Mobile Phone's Different Operating Systems

  • iOS: Used in Apple devices like iPhone and iPad.
  • Android: An open-source operating system developed by Google used by several mobile phone companies for free.
  • Blackberry: Used in Blackberry devices.
  • Windows Phone OS: Closed-source and proprietary operating system developed by Microsoft.
  • Symbian: The original Smartphone OS used by Nokia.
  • WebOS: Also used for smart TVs.
  • Windows Mobile: Developed by Microsoft for Smartphones and pocket PCs.
  • Assistive Media: Non-profit helps those with visual reading impairments with audio recordings.

Tips to Stay Safe Online

  • Be mindful of what you share online
  • Read terms and conditions before accepting.
  • Check a website's privacy policy.
  • Do not share your password with anyone.
  • Avoid logging in to public networks.
  • Never post about future vacation plans. Install and update antivirus software.

Internet Threats

  • Malware: Any software that can harm or damage your computer.
  • Virus: Transfers from one computer to another via the internet, networks, or data storage.
  • Worm: Transfers from one computer to another by any type of means.
  • Trojan: Disguised as a useful program but leaves your PC unprotected.
  • Spyware: Monitors activity and typing through keylogging to steal information.
  • Adware: Sends advertisements, typically as pop-ups.
  • Spam: Unwanted email, often from bots or advertisers, used to send malware.
  • Phishing: Acquires sensitive information like passwords and credit card details by directing users to fake websites.

Protecting Reputations Online

  • Embarrassing moments get uploaded to the internet, where they can be stored forever which impacts reputations.
  • Think Before You Click: Is the golden rule when going online.
  • Copyright Infringement: Intellectual property cannot be used without consent.
  • Understand: Express using your own words, giving credit to the source.
  • Be Responsible: Always read the copyright page for copyright information.
  • Be Creative: Add your creative genius to everything that you will be credited to you.
  • Know the Law: "Fair Use" allows intellectual property use without consent for commentaries, criticisms, search engines, parodies, news reports, research, archiving, teaching, and education.

Tips for Conducting Online Research

  • Have a question in mind and start with one if it is a series of questions.
  • Narrow It Down: You should use several filters to determine the most appropriate result.
  • Advance Search: Filter out unneeded information.
  • Look for credible sources, because anyone can alter or edit information online.

Creating Mail Merge

  • Creating Mail Merge merges documents with a data file such as recipient information.
  • The steps involve opening MS Word, selecting recipients, and inserting merge fields.

Steps In Using Mail Merge

  • Steps In Using Mail Merge include inserting recipient information, and finishing/merging for customization, printing, or sending as email.

Integrating Images and Material

  • Integrating Images and Materials includes electronic photographs, line art drawings, printable objects, shapes or materials, predefined sets of different shapes and images used as generic representations for ideas and objects.

Image Placement

  • In Line with Text: place your image in a line with the text at the beginning of paragraph.
  • Square: Text goes around the image in a square pattern-like frame.
  • Tight: Text conforms to the shape of the image.
  • Through: Text flows tight taking the contours and shape of the image.

Basic Principles of Graphics and Layout

  • Balance: Visual weight of objects, texture, colors, and space should be evenly distributed.
  • Emphasis: An area that may appear different sizes, textures, shapes, or colors to attract an eye viewer attention.
  • Movement: Visual elements that guide the viewer's eye around the screen.
  • Pattern, Repetition, Rhythm: Repeating visual element used on an image or layout. Proportion: Visual elements used in the layout to create a unity in the layout or image.
  • Variety: Uses several design elements to draw a viewer's attention.

Editing Tips for Piktochart

  • Double-click a text to edit the content.
  • When working with objects, the topmost toolbox allows you to manipulate it.
  • When working with charts, double-click the chart to open the database editor.

Online Image File Formats

  • Using an image's file format consider that website images should be more compressed .
  • Common image file formats used on the web include Join Photographic Experts Group, Graphics Interchange Format, and Portable Network Graphics.

Principles and Basic Techniques of Image Manipulation

  • Choose the right file format.
  • Choose the right image size.
  • Caption it.

Online Platforms for ICT Content Development

  • Social Media Platforms: Websites like Facebook allow you to create not only personal accounts but also pages and groups where these are mobile or interest-based platforms.
  • Blogging Platform: These are broadcast-style communications systems that enable authors to publish articles, opinions, or product reviews.
  • Content Management System (CMS): Computer application used in blogs, view websites, and shopping

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Introduction to ICT and Web 2.0
10 questions
Understanding ICT, Web 1.0, and Web 2.0
10 questions
Use Quizgecko on...
Browser
Browser