Veira

Cards (74)

  • Empowerment Technology refers to computer technology that we use almost everyday which enables us to do tasks that in the past, require professional help. It often deals with the use of different technologies such as mobile phones, telephone, computer, and other devices to locate, save, communicate, and to inform.
  • INFORMATION COMMUNICATION TECHNOLOGY (ICT) •It is the umbrella that includes any communication device or application, encompassing;radio, television,c omputer and ect. •It is the main method of communication,getting information and education,attaining services and expressing social advocacies and awareness.
  • WWW) WORLD WIDE WEB (INTERNET TECHNOLOGY)
  • 1st version WEB 1.0
    In this stage of internet technology there were very few web content creators and many of them were so called "read only web".
    • There were no USER INTERACTION.
    Web Pages were STATIC.
    The feedback mechanism was thru private email
    No Direct Comment available
  • 2nd Version WEB 2.0
    •The term Web 2.0 was used around 2004.
    • Internet technology became more and more interactive (used of social media begins).
    • The internet became more available to everyone.
    • The users can now interact,contribute,and create their own internet space and content.
    Activate Windows Go
  • web 3.0
    • It is discovered by Tim Berners-Lee (Father of the World Wide Web) as the read-write-execute web.
    • It is referred to as the semantic web or data driven web content and response.
    Activate
  • Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community
  • Decentralized application (DApp) is a type of distributed, open source software application that runs on a peer-to-peer (P2P) blockchain network rather than on a single computer.
  • Users Monetize Their Data - is when data providers charges data consumers to access to a provider's data.
  • NFTs-non-fungible token (NFT) is a unique digital identifier that is recorded on a blockchain and is used to certify ownership and authenticity. It cannot be copied, substituted, or subdivided. The ownership of an NFT is recorded in the blockchain and can be transferred by the owner, allowing NFTs to be sold and traded.
  • VR & AR (Metaverse) - Virtual reality (VR) and augmented reality (AR) are two technologies that are changing the way we use screens, creating new and exciting interactive
  • Permissionless Blockchains - also known as trustless or public blockchains,
    are open networks available to everyone to participate in the - users on the network are responsible for verifying and validating transactions. One of the main advantages of permissionless blockchains is that they provide a high level of transparency
  • Artificial Intelligence - Artificial intelligence is the simulation of human
    intelligence processes by machines, especially computer systems. Specific applications of Al include expert systems, natural language processing, speech recognition and machine vision.
  • Interoperability - the basic ability of different computerized products or systems to readily connect and exchange information with one another, in either implementation or access without restriction
  • TECHNOLOGY CONVERGENCE
    • It is an evolution of technological development that merge into a new system bringing together different types of applications and media.
    Example:
    Smartphone - as it provides functionality of various individual separate and different devices now available in one year.It can function as a telephone,camera, radio, TV and gaming console.
  • Smartphone - as it provides functionality of various individual separate and different devices now available in one year.It can function as a telephone,camera, radio, TV and gaming
  • Social Media- It is a collection of internet-based communicaton tools and computer-assisted channels dedicated to allow users to share information in a to interact,communicate, and virtual community and network.
  • •Facebook-is a popular free social netwo more than a billic networking site with users around the globe that that allows its users to create profiles, upload photos and videos.
  • Twitter-With more than 300 million users in 2016. -Allow users to microblog or broadcast short message called "tweets".
  • Instagram- Networking app that enables the user to share mobile photo and video either publicly or
  • Snapchat-Designed for the mobile networking application.
    -Also designed for photo sharing,chat,and messaging services.
    -Images and videos shared in this app last only for a short time and they are gone.
  • Assistive Media-It is a nonprofit organization founded in 1996 in Ann Arbor, Michigan USA.
    -It was the first internet-based reading do service for persons with visual and reading
  • Email Spam-known as junk email, usually unsolicited commercial email sent from one source with identical message to send to multiple recipients.
  • Spammer-the term used to refer to a person who creates electronic spam.
  • Email Spoofing-A deceitful email practice in which the sender address is changed, so that it would appear to have come from a different sources usually someone you know.
    spam.
    -It is usually used by spammers to hide the origin of the
  • Phishing-A deceitful practice of trying to get confidential information such as passwords and usernames, and credit and details by comes from a trustworthy source.
  • 1st version WEB 1.0
    In this stage of internet technology there were very few web content creators and many of them were so called "read only web".
  • 1st version WEB 1.0
    There were no USER INTERACTION.
  • 1st version WEB 1.0
    Web Pages were STATIC
  • 1st version (web 1.0)
    The feedback mechanism was thru private email
  • 1st version WEB 1.0
    No Direct Comment available.
  • 2nd Version WEB 2.0
    •The term Web 2.0 was used around 2004.
  • 2nd Version WEB 2.0
    Internet technology became more and more interactive (used of social media begins).
  • 2nd version (Web 2.0)
    The internet became more available to everyone.
  • 2nd Version (web 2.0)
    The users can now interact,contribute,and create their own internet space and content
  • web 3.0
    It is referred to as the semantic web or data driven web content and response.
  • Pharming
    A dangerous hacker attack on a website which directs all traffic to that website to another fictitious website.
  • Pharming
    Its main objective is to obtain username and passwords, as well as credit card and financial information and use these to steal money electronically
  • Spyware
    -It is acomputer program that is installed convertly on a personal computer to collect information or even take control over to collect information
  • Computer Worm
    -Is a dangerous computer program that replicates itself through a network.