exam ah Flashcards

(35 cards)

1
Q

Websites were static and were called “Read only web”

A

Website 1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internet technology became more and more interactive and were
called “Dynamic Web”

A

Website 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is referred to as the semantic web or data driven web content
and response. It aimed to have a machine or servers understand the users’ preference to be able to deliver web content specifically targeting the user

A

Website 3.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

designed to help people who have visual and reading
impairment

A

Assistive Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • These are sites that allow you to connect with other people with the
    same interest or background. Ex: Google +, Facebook
A

. Social Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

These are sites that allow you to store and manage links to various
website and resources. Ex. Pinterest, StumbleUpon

A

Bookmarking Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

These are sites that allow users to post their own news items or links to
other news sources Ex. Reddit, Digg

A

Social News

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

These are sites that allow you to upload and share media content like
images, music and video. Ex. Tiktok, Instagram Youtube

A

Media Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • These sites focuses on short updates from the user.Ex. Plurk, Twitter
A

Microblogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These websites allow user to post their content. Other users are
able to comment on the said topic. Blogger, Wordpress, Tumblr

A

Blogs and Forums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stands for malicious software

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

malicious software/program that transfer
from one computer to another by any type of means

A

COMPUTER WORM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

it uses
computer networks to spread itself

A

COMPUTER WORM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • A malware fronting to perform a good task, but
    covertly performs undesirable function with the intention of
    entering the computer without the user’s consent.
A

TROJAN HORSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is a program that duplicates itself and then
infects the computer

A

COMPUTER VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It spreads like a biological virus.

A

COMPUTER VIRUS

17
Q
  • A computer program that is installed covertly on a
    personal computer to collect information or even take control over
    the computer without the knowledge of the user.
18
Q
  • A program designed to send you advertisements,
    mostly pop-ups
19
Q
  • unwanted email mostly from bots or advertisers. It can be used to
    send malware.
20
Q
  • Usually unsolicited commercial email sent from an
    unknown source with identical message sent to multiple
    recipients
21
Q

It is a deceitful email practice in which the
sender address is changed, so that it would appear to have come
from a different source which is usually someone you know.

A

EMAIL SPOOFING

22
Q

It is a deceitful practice of trying to get confidential information
such as passwords and usernames, and credit card details by making it
appear as if it comes from a trustworthy source.

23
Q

This is a person who is able to enter and control other
people’s computer without authorization

24
Q
  • repeated harassment, mistreatment, or making fun of
    another person online through the use of computers, cell phones, and
    other electronic devices
A

Cyberbullying

25
- is the use of the internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization.
Cyberstalking
26
criminal event that occurs when one person takes personal information from another without his or her permission or knowledge
Identity Theft
27
it is usually refers to sending and receiving rude messages or videos such as need photos etc.
Sexting
28
It is a software program that creates documents using text and/or graphics.
WORD PROCESSING
29
Found under Undo
INSERT
30
You can customize the margin
LAYOUT
31
Add picture
* INSERT
32
It allows you to create slideshow ________wherein you can format the texts and images, adding also animation and other multimedia components interactively
. Presentation
33
you can apply it to attract audience attention
ANIMATION
34
It quickly organize numerical information and allow the creator to input formulas into the _______for easy calculation.
Spreadsheet
35
productivity tools you can use to create a calendar easily
Excel