Deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send and editinformation
Web1.0
When the World Wide Web was invented, most web pages were static. Static (also known as flat page or stationary page) in the sense that the page is "as is" and cannot be manipulated by the user. The content is also the same for all users.
Web2.0
The evolution of Web1.0 by adding dynamic web pages—the user is able to see a website differently than others. Examples of Web2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, and web applications.
Web2.0
Allows users to interact with the page: instead of just reading a page, the user may be able to comment or create a user account
Allows users to use web browsers instead of just using their operating system. Browsers can now be used for their user interface, application software (or web applications), and even for file storage
Most websites that we visit today are Web 2.0
Folksonomy
Allows users to categorize and classify/arrange information using freely chosen keywords (e.g., tagging). Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with the poundsign (#). This is also referred to as hashtag.
Rich User Experience
Content is dynamic and is responsive to user'sinput. An example would be a website that shows local content. In the case of social networking sites, when logged on, your account is used to modify what you see in their website.
Long Tail
Services are offered on demand rather than on a one-time purchase. In certain cases, timebased pricing is better than file-size-based pricing or vice versa. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent in the Internet, or a data plan that charges you for the amount of bandwidth you used.
User Participation
The owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comment, reviews, and evaluation. Some websites allow readers to comment on an article, participate in a poll, or review a specific product (e.g., Amazon.com, online stores).
Software as a Service
Users will subscribe to a software only when needed rather than purchasing them. This is a cheaper option if you do not always need to use a software. For instance, Google Docs is a free web-based application that allows the user to create and edit word processing and spreadsheet documents online.
Mass Participation
It is a diverse information sharing through universal web access. Since most users can use the Internet, Web 2.0's content is based on people from various cultures.
Web 3.0 and the Semantic Web
The Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries. The aim of Web 3.0 is to have machines (or servers) understand the user's preferences to be able to deliver web content specifically targeting the user.
Problems of Web 3.0
Compatibility: HTML files and current web browsers could not support Web 3.0
Security: The user's security is also in question since the machine is saving his or her preferences
Vastness: The World Wide Web already contains billions of web pages
Vagueness: Certain words are imprecise. The words "old" and "small" would depend on the user
Logic: Since machines use logic, there are certain limitations for a computer to be able to predict what the user is referring to at a given time
Convergence
Technological convergence is the synergy of technological advancements to work on a similar goal or task.
Social Media
A website, application, or online channels that enable web users to create, co-create, discuss, modify, and exchange user-generated content.
Types of Social Media
Social Networks
Bookmarking Sites
Social News
Media Sharing
Micro blogging
Blogs and Forums
Mobile Technologies
The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices' capability to do tasks that were originally found in personal computers.
Kinds of Operating Systems
iOS
Android
Blackberry OS
Windows Phone OS
Symbian
WebOS
Windows Mobile
Assistive Media
A nonprofit service designed to help people who have visual and reading impairments. A database of audio recordings is used to read to the user.
Online safety, security, and rules of netiquette
Importance of staying safe online
Most of us are 'connected' via our laptops, mobile phones, tablets or personal computer
The potential for the internet to be a valuable and a fun resource for entertainment, making friends, keeping in touch and learning is huge
If you use the internet, you could be at risk of illegal activity or abuse - be it bullying, fraud or something more serious
On the net, people aren't always what they first seem
It is important to learn how to stay safe online, as these are skills that will stay with you for life
Some golden rules for online safety
Don't give out personal information such as your address or phone number
Don't send pictures of yourself to anyone, especially indecent pictures
Don't open emails or attachments from people you don't know
Don't become online 'friends' with people you don't know
Never arrange to meet someone in person who you've met online
If anything you see or read online worries you, tell someone about it
Social networking websites and apps
Websites and apps such as Facebook, MySpace, Instagram, Viber, Tumblr, SnapChat, Ask.fm and Twitter have become incredibly popular in recent years
Most users of social networking sites are genuine, but because it is so easy to hide your real identity, it is possible to come into contact with people you would normally avoid
Privacy risks on social networking
People might say things on a status update / post / tweet they would never say face to face
People might give out personal information about themselves or others (including photos) that they would normally keep private
Cyberbullying
Cyberbullying can work in the same way as bullying in the playground; the victim feels frightened and alone, while the bully tries to hide from being caught
Comments, images and videos about a person can be posted online causing the victim to feel frightened and upset
It is even possible for cyber bullies to hack into the victim's personal accounts and harass them from within their own user profile
Often cyber bullies feel braver because they can't be seen, but it can be the most traceable form of bullying because there's evidence that it's happened
Sometimes people who wouldn't normally bully might do so online
Cyberstalking
Harassment on the internet can be just as frightening as other forms of stalking
Women and girls are usually the victims of this kind of behavior
It can begin when a purely online friendship turns sour
It can even begin entirely at random, by one online stranger towards another
Identity theft
The more information you make available online, the greater the risk of identity theft
Personal information includes your email address, any banking information, phone number, photos of yourself, and postal address
The consequences of fraud can be huge, including stolen money, crimes that could put you or your parents in danger, and crimes that you or your parents could get into trouble for
Spam
Spam is usually considered to be electronic junk mail or junk newsgroup postings
Spam eats up a lot of network bandwidth
There are many organizations and individuals who have taken it upon themselves to fight spam with a variety of techniques, but there is really little that can be done to prevent spam
Phishing
The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft
Phishing emails will typically direct the user to visit a website where they are asked to update personal information, such as a password, credit card, social security, or bank account numbers, that the legitimate organization already has
The website, however, is bogus and will capture and steal any information the user enters on the page
Phishing emails are blindly sent to thousands, if not millions of recipients, counting on a percentage of people who actually have an account with the legitimate company being spoofed
Virus
A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes
Viruses can also replicate themselves
All computer viruses are manmade
A simple virus that can make a copy of itself over and over again is relatively easy to produce
An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems
Since 1987, when a virus infected ARPANET, many antivirus programs have become available to periodically check your computer system for the best-known types of viruses
A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs
Adware
Adware is the common name used to describe software that is given to the user with advertisements embedded in the application
Adware is considered a legitimate alternative offered to consumers who do not wish to pay for software
If you're using legitimate adware, when you stop running the software, the ads should disappear, and you always have the option of disabling the ads by purchasing a registration key
Another use of the phrase adware is to describe a form of spyware that collects information about the user in order to display advertisements in the Web browser
Malware
Malware refers to software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse
Types of malware include spyware, keyloggers, computer viruses or worms, and financial malware designed to scan a computer system for information related to financial transactions
The standard protection from malware is anti-malware — software tools and programs designed to identify, remove and prevent malicious software from infecting computer systems or electronic devices
If you have an e-address, at some point you might receive a message from someone you don't know, which could be selling something, sending an attachment, a virus, or abusive/explicit content
The golden rule is, if the email is from someone you don't know, delete it
You can avoid unwanted emails by getting the right software, which is something for an adult to sort out, but you might know more about it than them already, so help them out