mst finals Flashcards

(122 cards)

1
Q

An information space where documents and other web resources are identified by Uniform Resource Locators, which may be interlinked by hypertext, and are accessible over the internet

A

WORLD WIDE WEB (WWW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The address of a web page or colloquially termed a web address

A

URL
Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Text which contains links to the other texts or information

A

HYPERTEXT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hypertext which is not constrained to be text, can include graphics, video and sound

A

HYPERMEDIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A link from a hypertext file or document to another location or file, usually activated by clicking on a highlighted word or image

A

HYPERLINK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A small image representation of a larger image, usually intended to make it easier and faster to look at or manage a group of larger images

A

THUMBNAIL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

He invented the World Wide Web
in the year 1989.

A

TIM BERNERS-LEE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Tim Berners-Lee wrote the first web browser in the year ___.

A

1990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CERN
The ___ ___ ___ ___ ___, where Tim Berners-Lee worked when he invented the World Wide Web

A

European Organization for Nuclear Research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What year the browser was released outside of CERN?

A

1991

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A link from a hypertext file or document to another location or file, usually activated by clicking on a highlighted word or image

A

HYPERLINK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The name of the browser that helped to get the World Wide Web popular

A

MOSAIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The World Wide Web has been central to the development of the ___ ___ and is the primary tool for billions of people use to interact on the Internet

A

INFORMATION AGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The first generation of the world wide web, which is the “read-only web”

A

WEB 1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Web _.0 allowed users to search for information and read it, with very little user interaction or content generation

A

1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Web 1.0 is also known as ___

A

Static web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Examples of Internet sites classified as Web 1.0

A

Britannica Online, personal websites, and mp3.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Disadvantages of Web 1.0

A

Read-only web
Limited user interaction
Lack of standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Without the ___ ___ community, browser makers would be the ones making decisions on what should and shouldn’t be features of the World Wide Web, which could lead to the Web becoming a monopolized commodity

A

WEB STANDARDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The second stage/generation of the development of the internet, focused on user-generated content and the __-__ web

A

READ-WRITE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An improved version of Web 1.0 which focuses primarily on user interactivity, collaboration, enhanced network connection, and a shift from a static to a dynamic approach to the internet

A

WEB 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An author, web designer and expert in user experience, who coined the term “Web 2.0” in 1999 and predicted the influence it would have on public relations

A

Darcy DiNucci

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A formal set of standards and technical specifications used to define aspects of the world wide web

A

WEB STANDARDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Web pages that are affected by user input or preference, where the user can interact with the page instead of just reading it

A

DYNAMIC PAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Examples of Web 2.0
Social Networking Blogs Wikis Video sharing sites
26
A user-generated system of classifying and organizing online content into different categories by the use of metadata such as electronic tags
TAGGING
27
A well-designed ___ __ interface draws the user in and encourages the user to interact with it and learn from the application
RICH USER
28
Synonymous to subscribing to a data plan that charges you for the amount of time you spent on Internet or a data plan that charges you for the amount of bandwidth you used
SUBSCRIPTION-BASED INTERNET
29
_ _ _ _ (SaaS)
 Subscribing to a software only when needed and involving human interactions with digital content facilitated by applications delivered over the web and that free the user from locally installed software
SOFTWARE AS A SERVICE
30
T or F Web 2.0's content is based on people from various cultures
T
31
T or F Web 3.0 is also known as Semantic Web
T
32
Main features that can help define Web 3.0
Semantic Web Artificial Intelligence 3D Graphics Connectivity
33
T or F Semantic web technologies is a two-way interaction
T
34
Which is correct about Hypermedia? A. Hypertext which is not constrained to be text, can include graphics, video, and sound. B. Hypertext Markup Language, is a coding language used to tell a browser how to place pictures, text, multimedia and links to create a web page.
A
35
_____ Web technologies enable people to create data stores on the Web, build vocabularies, and write rules for handling data
SEMANTIC
36
Main features That can Help us Define Web 3.0
Semantic Web Artificial Intelligence 3D Graphics Connectivity Ubiquity DLT (Distributed Ledger Technology) and Smart Contracts
37
Combining natural language processing, computers can distinguish information like humans to provide faster and more relevant results. They become more intelligent to fulfill the requirements of users.
ARTIFICIAL INTELLIGENCE
38
The three-dimensional design is being used widely in websites and services in Web 3.0. Museum guides, computer games, e-commerce, geospatial contexts, etc. are all examples that use 3D graphics
3D GRAPHICS
39
With Web 3.0, information is more connected thanks to semantic metadata. As a result, the user experience evolves to another level of connectivity that leverages all the available information
CONNECTIVITY
40
Content is accessible by multiple applications, every device is connected to the web, and the services can be used everywhere
UBIQUITY
41
With the help of _ _ _, we can have a virtually impossible to hack database from which one can have value to their content and things they can own virtually
DLT Distributed Ledger Technology
42
The ___ is the largest computer network in the world that connects billions of computer user
INTERNET
43
Hypertext Definition?
Text which contains links to the other texts or information
44
____ is a collection of computers and devices connected via communication channels and transmission media allow to share resources (hardware, software, data, information).
NETWORK
45
First version of the internet created as ARPANET
1969
46
First message sent over ARPANET
1969
47
Vinton Gray Cerf and Robert Kahn develop TCP/IP
1973
48
First "free net" created
1986
49
US government allowed business agencies to connect to internet
1991
50
Major Components of the Internet
SERVERS IP ADDRESS (Internet Protocol) BROWSER (DOMAIN NAME SYSTEM (DNS) INTERNET SERVICE PROVIDER (ISP)
51
Computer programs that provide services to other computer programs and users
servers
52
___ ___ (Internet Protocol)
 Numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication, providing identity to a network device
IP ADDRESS
53
Application program that provides a way to look information on the web
BROWSER
54
Browsers
Google chrome, Safari, Internet explorer, Opera, Mozilla
55
The phonebook of the internet, we access information online through domain names
Domain Name System (DNS)
56
Domain Name Examples
www.eac.edu.ph www.facebook.com sss.gov.ph https://thenew.org/
57
2 Types of ISP
National ISP Regional ISP
58
ISP Examples
Sky Broadband, PLDT, Converge
59
A collection of billions of webpages that you can view with a web browser
WEB
60
The most common method of sending and _ messages online
EMAIL
61
Websites and apps that allow people to share comments, photos, and videos
SOCIAL MEDIA
62
Games that allow people to play with and against each other over the Internet
ONLINE GAMING
63
Operating system and application updates can typically downloaded from the Internet
SOFTWARE UPDATES
64
a coding language used to tell a browser how to place pictures, text, multimedia and links to create a web page
HTML HYPERTEXT MARKUP LANGUAGE
65
To transfer data from your computer to another computer
DOWNLOAD
66
it indicates the web page has a special layer of encryption added to hide personal information and passwords
HTTPS HYPERTEXT TRANSFER PROTOCOL SECURE
67
Hardware device that acts as the traffic cop for network signals arriving at your home or business from your ISP
ROUTER or router modern combination
68
The mathematical scrambling of data so that it is hidden from eavesdroppers
ENCRYPTION
69
Programs/applets (macros and intelligent agents) used on the Internet to perform repetitive functions, such as posting messages to multiple newsgroups or doing searches for information
WEB BOT
70
Specialized software, such as Google and Yahoo, that lets www browser users search for information on the web by using keywords and phrases
SEARCH ENGINE
71
the etiquette of cyberspace and "etiquette" means the forms of required by good breeding or prescribed by authority to be required in social or official life
NETIQUETTE
72
Virginia Shea Dubbed the "_" by the San Jose Mercury News
NETWORK MANNERS GURU
73
Give Rules of Netiquette
1. Remember the Human 2. Adhere to the same standards of behavior online that you follow in real life 3. Know where you are in cyberspace 4. Respect other people's time and bandwidth 5. Make yourself look good online 6. Share expert knowledge 7. Help keep flame wars under control 8. Respect other people's privacy 9. Don't abuse your power 10. Be forgiving of other people's mistakes
74
A branch of philosophy that deals with determining what is right and wrong
COMPUTER ETHICS
75
Main concerns of computer ethics
Internet privacy Cracking Copyright infringement Internet control
76
Main concerns of computer ethics
Internet privacy Cracking Copyright infringement Internet control
77
An adjective or prefix which means relating to or characteristic of information technology, virtual reality, and computers
CYBER
78
T or F When working on animation films or designing video games, it is the programmer's responsibility to understand his target audience/users and the effect it may have on them
T
79
T or F A computer game for kids should have content that can influence them negatively
F
80
A ____ ____/development firm should consider the influence their code can have on society at large
SOFTWARE
81
The ____ we follow in the real world applies to communication over computers as well
COMMUNICATION ETIQUETTE
82
A crime in which a computer or the internet is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense
CYBERCRIME
83
Individuals or teams of people who use technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, and generating profit
CYBERCRIMINALS
84
Republic Act No. 10173 _ _ _ _ _ is an act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a national privacy commission, and for other purposes
DATA PRIVACY ACT OF 2012
85
Republic Act No. 11449 Access Devices Regulation Act of 1998 is an Act Providing for Additional Prohibitions to and Increasing Penalties for Violations of Republic Act No. _
8484
86
Illegal Downloading. Obtaining files that you do not have the right to use from the internet. Digital Piracy, Practice of illegally copying and selling digital music, video, computer software, etc. Copyright Infringement
ELECTRONIC THEFT
87
Republic Act No. 9775 The _ Act of 2009 defines the crime of child pornography, prescribing penalties therefor and for other purposes
ANTI-CHILD PORNOGRAPHY
88
A type of intellectual property that gives its owner the exclusive right to print, publish, distribute, adapt, display, and perform a creative work
COPYRIGHT
89
The violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work
COPYRIGHT INFRINGEMENT
90
Presenting someone else's work or ideas as your own, with or without their consent, by incorporating it into your work without full acknowledgement
PLAGIARISM
91
_ applies when ideas are copied; copyright violation occurs only when a specific fixed expression (e.g., sequence of words, use of an image) is copied
PLAGIARISM
92
COMMON CYBERCRIMES
Hacking Computer related forgery, fraud and/or identity theft Electronic theft Cyberbullying Cybersex Child Pornography Cyber Libel
93
_
 Unauthorized access of or interference with computer systems, servers, or information and communication system or any access in order to corrupt, alter, steal, or destroy electronic data using computers or other information and communication systems without the computer or system owner's knowledge and consent of the owner of the computer or information communication system, including the introduction of computer viruses and the like resulting in the corruption, destruction, alteration, theft, or loss of electronic data messages or electronic documents
HACKING
94
The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature
CYBERBULLYING
95
Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration
CYBERSEX
96
A form of child sexual exploitation committed through a computer system
CHILD PORNOGRAPHY
97
An unprivileged false statement of fact which tends to harm the reputation of a person or company
CYBER LIBEL
98
A threat that makes use of the World Wide Web to disperse, conceal, and update itself to facilitate cybercrime
INTERNET THREAT
99
Internet Threats
Malware Spam Phishing Pharming
100
Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, adware, and ransomware
MALWARE
101
Malicious program designed to replicate itself and transfer from one computer to another either through the internet and local network or data storage (like flash drives and CD's)
VIRUS
102
Malicious program designed that transfer from one computer to another by any type of means. Often, it uses a computer network to spread it
WORM
103
The ___ ___ ___ worm was created by a Filipino destroys all the kinds of files including photographs, audio files and documents. Affected users who didn't have backup copies lost them permanently
I LOVE YOU
104
A malicious program disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allow hackers to get information
TROJAN
105
Trojan files are usually saved as ____. An example of Trojan is Roque Security Software which tricks the user into posing that it is a security software. It asked the user to pay to his/her security. But, in reality they are not protected at all
.EXE.files
106
Program that runs in the background without knowing it. That's why it is called "spy". It has the ability to monitor what are you are currently doing through keylogging. Used to record the keystrokes done by the user. Done to steal password or any other sensitive information. Can record email, messages, any information you type using your keyboard
SPYWARE
107
Program designed to send you advertisements, mostly as pop ups. You can usually see adware in restricted or unwanted site. Some would tell you that you won a million dollar and you have to claim it before time runs out
ADWARE
108
A type of malicious software designed to block access to a computer system until a sum of money is paid
RANSOMWARE
109
The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs
SPAM
110
The Three Ages of Digital
1. Pre-digital Age 2. Mid-digital Age 3. Post-digital Age
111
The time before our world became digital can simply be identified as a physical world where media channels were consumed on TV, newspaper, radio, and people loved reading magazines. These were all one-way communication.
PRE-DIGITAL AGE
112
Computers In _, the first set of computers for commercial purposes were released but solved only simple arithmetic problems and data handling and were expensive for most people.
1951
113
In _, laptops with tiny screens were invented.
1981
114
It took almost a week for pictures to be developed. The process involved taking pictures on film, getting the roll developed, and then printed. It was until 1988 that a fully functional camera with storage of up to 10 photos was released.
CAMERA AND PHOTOGRAPHY
115
Music was only heard live before LP records. Then there came in 12-inch discs and music was recorded and played by placing the needle on the record. It was long after that the Walkman was a thing and music was recorded on cassettes and movies were recorded on VCRs. Then music was recorded on compact discs and movies on DVD.
DATA AND STORAGE
116
___________ Age
 This was the time when TV didn't show anything anywhere because of digital rights that were yet not cleared and most of what TV showed were headlines about new discoveries and inventions which were happening fast. Soon after digitalization started to become more and more accepted and immersed in society, knowledge started becoming vast.
MID-DIGITAL AGE
117
Mobile Phones In _ saw the release of a smartphone that not only supported calls but also email and fax.
1994
118
The concept of digital has far gone out of the conversation by this time as it has become a norm to live in a digital world. In fact, the time before this has become irrelevant and off-topic by this era. In this era, digital technology is the backbone of life and it becomes the elephant in the room only in its absence. On the spot videos, smart homes, and offices, digital news and content are already the essences of life.
POST-DIGITAL AGE
119
_ is defined as a group of interrelated technologies (electronic devices) for accessing, processing, and disseminating information. It is a system of electronic network activated through a complex hardware and software systems linked by a vast array of technical protocols.
ICT INFORMATION AND COMMUNICATIONS TECHNOLOGY
120
refers to a transformation of culture and social organizations / structures over time. We are aware that in a modern world, a society is never static and that of social, political, economic, and cultural changes occurs constantly.
SOCIAL CHANGE
121
Fulfils a number of important roles for human wellbeing, such as time structure, social contact, a sense of purpose, a valued social position as well as an opportunity for skill use
EMPLOYMENT
122