EmPoTech

Subdecks (1)

Cards (90)

  • Web 1.0 was static and read-only
  • BPO (Business Process Outsourcing) centers flourished
  • Information and Communication Technology
    Deals with the use of different communication technologies to locate, save, send, and edit information
  • Social media enables web users to create, co-create, discuss, modify, and exchange user-generated content
  • Web 2.0 features dynamic content and response
  • Web 2.0 was first used around 2004 and became more interactive, known as the read-write-execute web
  • Web 2.0
    • User Participation
    • Mass Participation
    • Software as a service
    • Long Tail
  • Assistive Media is a platform that assists people with disabilities, guiding them like a blind person using audio recordings
  • Media Sharing websites allow users to share and store multimedia files like videos, photos, and music, e.g., Instagram, YouTube, Flickr
  • Rich User Experience
    • Users can have high interaction with the content of the page and can achieve a level of expertise
  • Sexting is the act of sending sexually explicit text messages, images, and videos
  • Blogs and Forums are discussion websites where users can ask questions and comment on journals posted by individuals or groups, e.g., Wordpress, Blogger
  • Social News is a website where users can post stories ranked based on popularity through voting
  • Identity Theft is the crime of stealing personal information to assume someone's name or identity for transactions
  • Philippines is known as the ICT Hub of Asia
  • Feedback mechanism in Web 1.0 was through private emails
  • Web 2.0 will not make Web 1.0 obsolete
  • Folksonomy
    Classify and arrange information by adding tags or labels, e.g., # in social media sites (#Single)
  • World Wide Web (WWW or W3) was introduced by Tim Berners-Lee
  • Technology Convergence involves merging different types of applications and media into a new system
  • In 2013, Time Magazine listed "The Selfiest Cities around the World"
  • Bookmarking Sites allow users to share and store internet bookmarks, articles, posts, blogs, images, and others
  • Social Network is a website where people with the same interests come together to share information
  • Mobile Technologies are used in cellular and other devices like netbooks, laptops, tablets, smartphones, etc.
  • Microblogging websites allow users to broadcast short messages, e.g., Twitter, Tumblr, Meetme
  • Cyberbullying is when someone is intentionally abused, harassed, and mistreated by another person using electronic communication
  • Spam, also known as junk email
  • Cyber Stalking is a criminal practice using electronic communication to stalk or harass individuals or groups
  • Internet Threats
    • Malware
    • Virus
    • Worm
    • Trojan
    • Spyware
    • Keyloggers
    • Adware
  • Cyber Stalking is a criminal practice where electronic communication is used to stalk or harass an individual or group
  • Phishing
    Using deceptive emails and websites to acquire sensitive personal information
  • Online search modifiers
    Narrowing the topic, using "AND" between keywords, identifying synonyms, grouping similar words with "OR", using plus (+) sign for required words, minus (-) sign to exclude a word, wildcard characters (*) for word variations, using quotation marks for phrases or names
  • Cybercrime is a crime in which a computer is used as an object and tool in committing crimes such as hacking, phishing, spamming, child pornography, libel, hate crimes, identity theft, and others
  • Virus
    Designed to replicate itself and transfer from one computer to another
  • Trojan
    A malicious program disguised as a useful program, but once downloaded or installed, leaves your computer vulnerable
  • Keyloggers
    Used to record the keystrokes done by the user
  • Title Bar of MS Word

    • Displays the program or document's name
  • Commands

    • Appear within each group on the Ribbon
  • Tabs
    • Appear across the top of the Ribbon and contain groups of related commands
  • Pharming
    A more complicated way of phishing which exploits the Domain Name Service system