E-TECH Flashcards

(144 cards)

1
Q

an umbrella term which covers any communication

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who invented World wibe web

A

Sir Tim Berners- LEE in 1989

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

are what make up the world wide
web and it can either be static or dynamic.

A

Web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

, the user cannot manipulate or edit the
content of the page, as well as, the content is same for all
the users.

A

WEB 1.0 (STATIC WEB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

most of the websites contain dynamic
content or has interactive characteristics.

A

WEB 2.0 (DYANAMIC WEB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHAT ARE THE SIX FEATURES OF WEB 2.0

A

FOLKSONOMY, RICH USER EXPERIENCE, USER PARTICIPATION, LONG TAIL SERVICES, SOFTWARE AS A SERVICE, MASS PARTICIPATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This feature allows user to
categorize and classify/arrange
information (ex.: hashtag like
#NewNormal).

A

FOLKSONOMY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This feature deals with how a
site uses user information for a
personalized content (ex.:
blog/vlog, social media accounts,
et cetera)

A

RICH USER EXPERIENCES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This means that those who view
the website can also put their
own information (ex.: the
comment section and/or the
reaction button of Facebook)

A

user participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These services offer services on
demand as opposed to a one-time
purchase (ex.: the Netflix user must pay
the monthly subscription fee to enjoy
binge-watching)

A

LONG TAIL SERVICES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This feature deals with diverse
information sharing through universal
web access (ex.: regardless your
nationality, gender, et cetera, you can
share information online, but make
sure, it is not fake).

A

MASS PARTICIPATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It contains how users would subscribe
to a software as opposed to
purchasing them (Ex.: thesis group
members can collaborate online
through Google Docs,

A

SOFTWARE AS SERVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It aims to produce machine that can understands the user’s
preferences. This machine can serve better by “learning”
from the previous choices of the user.

A

WEB 3.0 (SEMANTIC WEB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ability of Web technologies to understand and
interpret human-generated content
EXAMPLE: Apple’s Siri

A

Semantics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WHO COINED WEB 3.0?

A

JOHN MARKOFF IN 2006

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HTML FILES AND CURRENT WEB BROWERS COULD NOT SUPPORT

A

COMPABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IT MIGHT NOT UNDERTSAND SARCASM

A

LOGIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SAVING USERS PREFERANCE IS THE MAIN IDEA OF WEB3.0. IT IS ACHIEVABLE WITH THE CURRENT STATE OF ICT

A

SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WEB 3.0 MACHINE MUST CATER ALL LANGUAGES AS THIS THIRD GENERATION OF WEB AIMS TO SEARVE DIVERSE USERS.

A

VAGUENESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

INFORMATION COMES FROM BILLIONS OF WEB PAGES IS THE MEAIN FEATURE OF THE INTERNET

A

VASTNESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

WHAT ARE THE ICT TRENDS?

A

SOCIAL MEDIA, CONVERGENT MEDIA, M,OBILE TECHNOLOGIES, ASSSISTIVE MEDIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

THESE WEBSITES THAT LLOWAS THE NETIZENS TO CREATE, DISCUSS, AND EXCHANGE USER GENERATED CONTENT

A

SOCIAL MEDIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

WHAT ARE THE 6 TYPES OF SOCIAL MEDIA?

A

SOCIAL NETWORKS, BOOKMARKING SITE, SOCIAL MEDIA NEWS,MEDIA SHARING, MIRCO BLOGGING, BLOGS AND FORUMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ENABLES THE USERS TO CONNECT WITH OTHER USERS EX: FB GOOTGLE

A

social networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
ALLOWS USER TO STORE AND MANAGE LINKS TO VARIOUS WEBSITES AND RESOURCES EX: PINTE
BOOKMARKING SITE
23
THIS SITE PROMOTES SHARING BETWEEN THE NEWS PROVIDER AND THE USER, BECOMES A CENTRAL HUB FOR NEW STORIES FROM VARIOUS OTHER THIRD PARTY EC: REDDIT
SOCIAL MEDIA NEWS
24
ENABLE USERS TO UPLOAD AND SHARE MEDIA CONTENT LIKE IMAGE, VIDEO, MUSIC TO LIKE ex: TIKTOK, YT, INSTA
MEDIA SHARING
24
FOCUSES ON SHORT UPDATES FROM USERS EX: TWITTER
MICROBLOGGING
24
USER POST THEIR OWN WRITE UPS, JOURNAL, DIARY. FORUM IS A PART OF CERTAIN WEBSITES WHEREIN USERS CAN HOLD AN ONLINE DISCUSIION ABOUT CERTAIN TOPIC EX: BLOGGER. WORD PRESS
BLOGS AND FORUMS
25
THE COMBINATION OF TWO OR MORE DIFFERENT ENTITIES OF TECHNOLOGO=IES TO CRATE A NEW SINGLE DEVICE
CONVERGENT MEDIA
25
NON PROFIT SERVICE DESIGNED TO HELP VISUAL AND READING IMPAIRMENTS. `
ASSISTIVE MEDIA
26
the process of and tools for storing, managing, using, and gathering of data and communications in an organization.
ONLINE SYSTEM
27
It is a category of business software that adds broad social networking capabilities to work processes.
COLLABORATIVE PLATFORM
27
platforms are any hardware or software to host an application. These platforms come with the different functions. EX: COLLABORATIVE AND WEB SEARCH ENGINE
PLATFORMS
27
like Google, Bing, and Yahoo
WEBSEACRH ENGINES
28
-This term came from the blended words “malicious” and “software” -It is an umbrella term with 5 different types: Virus, Worm, Trojan, Spyware, Adware
MALWARE
29
It is malicious program that usually transfer from one device to another with the aid of the Internet and local networks, but commonly through data storage such as flash drives or hard drive
VIRUS
29
Unlike Virus, this malware replicates itself and can transfer by any type of means, but more often through computer network. * Example: ILOVEYOU worm
WORM
30
This is known as Love Bug, that infected 45 million machines across the globe, including Pentagon, within 24 hours last May 4, 2000 * When the victim opens the attachment, an email entitled LOVE-LETTER-FOR-YOU, the malware automatically send itself to all the victim’s Microsoft Outlook contact
ILOVEYOU WORM
31
Tracing its name origin, it can be link to the mythology story about how Trojan fell because of Greek’s wooden horse * Like the Odysseus’ strategy; this malicious program disguised as a useful program, however when you left your devices unprotected and become vulnerable to other malwares once you accessed or downloaded it
TROJAN
32
A malicious program that monitors the device, and the actions of the user without its knowledge * Example: the keylogger steals sensitive information using the recorded user’s keystrokes
SPYWARE
33
* This program automatically sends pop-ups advertisements
ADWARE
33
Used to record the keystroke done by the users * This is done to steal their password, or any other sensitive information * It can record email, messages, or any information you type using your keyboard
KEYLOGGERS
34
A CYBERCRIME Like fishing, criminals steals sensitive personal information like account passwords and banking details by sending out an alarming email as a bait. Usually they ask you to click a link, or input your username, password, or any personal info
PHISHING
35
r UNWANTED EMAILS contains bots and advertisements
SPAM MESSSAGES
36
Defined as the Illegal act done using Internet
CYBERCRIME
36
A more complicated way of phishing where it exploits the DNS (Domain Name Service system)
PHARMING
37
Defined as the information superhighway
INTERNET
38
UNAUTHORIZED ACCESSING OF DATA FROM A COMPUTER NETWORK. MOSTLY HACKERS ATTACK COMMERCIAL AND GOVERMENT SITES TO CAUSE AN ALARM OR TO TRAT SOMEON
HACKING
39
an illegal act of gambling on any sports event that happened over the internet
SPORT BETTING
40
deceiving act which the culprit posted a product or service on the internet. ONCE THE VICTIM PLACED ITS PAYMENT, THE CULPRIT DOES NOT GIVE THE ITEM OR SERVICE
NON- DELIVERY OF MERCHANDISE
41
anonymous criminal who harass, abuse threat or annoy people. ex: cyberbully
electronic harassmenT
42
R.A. no. 9775 or knowm as Anti-Child porno act of 2009, it is an act of real or simulated explicit sexual activities
CHILD PORNOGRAPHY
43
an illegfal act engage in any sexaul activities
PROSTITUTION
44
an authorized use of stealing of intellectua; property
CRIMINAL COPYRIGHT INFRIGEMENT
45
TIPS THAT COULD HELP YOU AVOID COPYRIGHT INFRINGEMENT:
1. UNDERSTAND, BE RESPONSIBLE, BE CREATIVE, KNOW THE LAW
46
you can express something using your own words, but you should give credit to the source.
1. UNDERSTAND
47
*Ask yourself whether what you are making is something that came from your won work or something made out of somebody’s else creativity
BE CREATIVE
47
*“Fair use” which means that an intellectual property may be used without consent as long as it is used in commentaries, criticisms, search engine, parodies, news reports, research, library archiving, teaching, and education
KNOW THE LAW
48
Be responsible enough to know if something has a copyright
. BE RESPONSIBLE
49
"MS. MANNERS" OF TEH INTERNET
VIRGINIA SHEA
50
IS THE WAY WE THINK, ACT AND BE ONLINE. ALSO REFERS TO THE REPONSIBLE USE OF TECHNO
DIGITAL CITIZENSHIP
51
STURFY THE TIPS TO STAY SAFE ONLINE LODA
52
is the process of interactively searching for and retrieving requested information via a computer from databases that are online.
ONLINE SEARCH
53
TIPS TO CONDUCTING ONLINE RESEARCH
Have a question in mind, Narrow it down, Advanced Search., Look for a credible source, Give credit
53
is an attempt to be more precise in providing the list of documents according to the words used by the user to search the Internet
Contextualized Online Research
54
is a software system that is designed to search for information on the World Wide Web. The search results are generally presented in a line of results often referred to as search engine results pages.
SEARCH ENGINE
54
is one of the skills a person should possess in research. It's our capacity to absorb, reflect and conclude from the searched knowledge like what Francis Bacon wrote, “some books are to be tasted, others to be swallowed, and some few to be chewed and digested.” Any of the knowledge shared online is not necessarily accurate
Critical thinking
55
Tips to make contextualized online search
1. Identify or choose a topic ● 2. Topic or task definition ● 3. Identify methods of search ● 4. Identify resources of your research ● 5. Make your research strategies ● 6. Compiling the research results ● 7. Evaluate the result of your research ● 8. Create a list of your references for citation
56
check if it is grammatically correct, verifiable and cite.
Accuracy
57
the data must be updated.
Currency
58
check the credentials/expertise of the information provider.
Author
59
the content must show all the sides and different points of view.
Fairness
60
the content must be related to the topic.
Relevance
61
or the ability to gather, organize, visualize and adapt information that is tailored to the subject’s context, is important.
or the ability to gather, organize, visualize and adapt information that is tailored to the subject’s context, is important.
62
is more than just googling (typing a word in Google and then clicking the search button). Look not only on the surface while you are searching;
computer literacy
63
Adding a + sign before a word means that it MUST be included in each site listed. For example: +Florida +taxes
Addition Sign (+)
63
Using quotation marks will help to find specific phrases involving more than one word.
Quotation Marks (“ ” )
64
Adding a - sign before a word means that it will NOT appear in the sites listed. For example: +Washington –DC
Subtraction Sign ( - )
65
Asterisks can be used for wild-cards in some search engines. For example: Mexic* will look for Mexico, Mexican, Mexicali, etc
Asterisks ( * )
66
Finds or excludes web pages that contain a group of words. example: SEO (technical OR local)
Parenthesis ( )
67
- Finds web pages that contains all the terms or phrases
AND or &
68
- Excludes web pages that contain a term or phrase
NOT or – -
69
Finds web pages that contain either or the term or phrases example: marathon or race
OR or |
70
provides related websites
related:website.com
70
provide results from a specific website. example: site:youtube.com or site:.gov
site:website.com
71
search for specific file type to narrow the results example: filetype:pp
filetype:
72
This features allow you to create documents and combine or merge them with another document or data file.
MAIL MERGE
73
Two components of mail merge
FORM DOCUMENTS , List or data file
74
the first component of the mail merged document.
form document
74
referred to as data fields or merge fields This marks the position on your form documents where individual data or information will be inserted. Denoted or marked by the text with double-headed arrows (<< >>) on each side.
pLACE HOLDER
74
main body of the message is the part of the form document that remains the same no matter to whom you will send the message from among your contact list.
FORM DOCUMENTS
75
his where the individual information or data that needs to be plugged in (merged) to form document is placed and maintained. One of the best things about the mail merge feature is that it allows data file to be created from Microsoft Word application itself or other data formats.
List or data file
76
is the process of interactively searching for and retrieving requested information via a computer from databases that are online.
ONLINE SEARCH
77
* Internet researching is faster than other medium. * Internet researching will save user’s physical distance. * You can share information with other people very quickly. * Quality of information also better than other medium. * Strength include speed, immediacy, and a complete disregard for physical distance.
Strengths
78
the data must be updated.
Currency –
78
Possibility of leak someone’s personal information. And it can make negative effect in your life * There is so many incorrect information that we trying to find. * You can get many harmful objects such as advertising. * Weaknesses include unrecognized bias difficulties in verifying a writer’s credentials (and therefore the accuracy or pertinence of the information obtained).
Weakness
78
is a software system that is designed to search for information on the World Wide Web. The search results are generally presented in a line of results often referred to as search engine results pages.
SEARCH ENGINE
78
the content must be related to the topic.
Relevance
79
Tips to make contextualized online search
1. Identify or choose a topic ● 2. Topic or task definition ● 3. Identify methods of search ● 4. Identify resources of your research ● 5. Make your research strategies ● 6. Compiling the research results ● 7. Evaluate the result of your research ● 8. Create a list of your references for citation
79
1. Have a question in mind 2. Narrow it down . Advanced Search. 4. Look for a credible source. 5. Give credit
TIPS TO CONDUCTING ONLINE RESEARCH
80
* is an attempt to be more precise in providing the list of documents according to the words used by the user to search the Internet
Contextualized Online Research
80
– check the credentials/expertise of the information provider
. Author
80
.com (commercial) ● .org (organization) ● .edu (education) ● .gov (government) ● .net (network) ● .mil (military) ● .ph (country domain)
asasasd
80
is one of the skills a person should possess in research. It's our capacity to absorb, reflect and conclude from the searched knowledge like what Francis Bacon wrote, “some books are to be tasted, others to be swallowed, and some few to be chewed and digested.”
Critical thinking
80
can be used for wild-cards in some search engines.
* Asterisks
80
– check if it is grammatically correct, verifiable and cite
Accuracy
80
the content must show all the sides and different points of view
Fairness
80
- Finds web pages that contain either or the term or phrases
OR or |
80
or the ability to gather, organize, visualize and adapt information that is tailored to the subject’s context, is important.
analytical skill
80
sign before a word means that it MUST be included in each site listed.
* Addition Sign
80
-Joint Photographic Experts Group.This type of image file can support 16.7 million colors that is why it is suitable for use when working with full color photographic images. *Unfortunately, it does not support transparency
jpg
80
will help to find specific phrases involving more than one word.
Quotation Marks
80
sign before a word means that it will NOT appear in the sites listed.
Subtraction Sign
81
Finds or excludes web pages that contain a group of words.
Parenthesis
81
Finds web pages that contains all the terms or phrases
AND or &
81
Excludes web pages that contain a term or phrase
NOT or –
81
These are printable objects or materials that you can integrate in your document to enhance its appearance or to allow you to have some tools to use for composing and representing ideas or message
SHAPES
81
*Generally, these are electronic or digital pictures or photographs saved in any local storage device. *There are three commonly used types of picture files. They can be identified by the extension on their file names.
PICTURE
81
provide results from a specific website.
site:website.com
81
provides related websites
related:website.com
81
search for specific file type to narrow the results
filetype:
81
are line art drawings or images used as generic representation for ideas and objects that can be integrated in Word documents.
CLIPART
81
Graphics Interchange Format. * This type of image file is capable of displaying transparencies. It is also capable of displaying simple animation.
GIF
81
Portable Network Graphics. *It is also good with transparencies but it does not support animation. .ALlows the control of the transparency level or opacity of images.
PNG
81
It treats the image like a text font with the bottom side totally aligned with the text line.
In Line with Text
81
Generally, these are predefined sets of different shapes grouped together to form ideas that are organizational or structural in nature.
SMART ART
81
g allows your image to be placed right on top of the text as if your image was dropped right on it, the text can be covered by the image.
. In Front of Text
81
allows the image you inserted to be placed anywhere within the paragraph with the text going around the image in a square pattern like a frame.
Square
81
Allows you to represent data characteristics and trends in your Word documents.
CHART
81
snipping tool for your screenshots so you can select and display only the part that you exactly like to capture on your screen.
screenshots
81
This is the same as the Square setting, but here are the text “hugs” or conforms to the general shape of the image.
Tight -
81
his setting allows the text on your document to flow even tighter, taking the contours and shape of the image.
Through
81
81
This allows your image to be dragged and placed anywhere on your document but with all the text floating in front of the list of it which makes your image looks like a background.
Behind Text
81
81
This setting pushes the text away vertically to the top/and or the bottom of the image so that the image occupies a whole line on its own.
Top and Bottom
81
81
81
81
81
81
81