問題一覧
1
Static Web – Read Only
Web 1.0
2
Dynamic Web – Read and Write
Web 2.0
3
Semantic Web – Read, Write and Own
Web 3.0
4
documents contains hyperlinks and they provide no interactivity. Web of Documents
Web 1.0
5
providing people the means to collaborate and share information online.
Web 2.0
6
Coined the term Web 2.0 in her article “Fragmented Future”
Darcy DiNucci
7
Popularized the term Web 2.0
Tim O Reilly , Dale Dougherty
8
Web 2.0 Characteristics:
Accessibility Relevance of Content Shared data Collaboration Rich User Experiences
9
Web 2.0 Technologies
AJAX or Asynchronous Javascript and XML Blog Mash- ups RSS Social Networking User-generated Content (UGC) Wikis Software as a Service (SaaS)
10
sites will be generating raw data on their own, allowing the exchange of data and produce new information.
Web 3.0
11
are the combination of two or more different entities of technologies to create a new single device.
Convergent Technologies
12
3 Technologies that enable Convergence
Internet Satellite Wireless
13
Websites and other online means of communication that are used by large people to share information and to develop social and professional contacts
Social Media
14
a small nonprofit organization that offers audio access to reading materials for anybody with a reading access barrier.
Assistive Media
15
was the founder of Assistive Media
David Erdody
16
Online Threats
Phishing Internet scam Malware Keyloggers A.Viruses B.Worms Cyberstalking Cyber bullying
17
scammers disguise as a reliable source in trying to attain private information like passwords, and credit card information through the internet
Phishing
18
cheat the target of their personal property directly rather than private information through fabricated promises
Internet scam
19
malicious software disguised as a real software often secretly installed, intended to transfer and gather private information, like passwords without user’s permission.
Malware
20
this is a software that allows criminals to look for significant information that can be used for identity or intellectual property theft
Keyloggers
21
a program designed to replicate by attaching itself into other computer programs
Viruses
22
can be injected into a network by any types of means , like a USB stick or an email attachment.
Worms
23
to follow or bother an individual, or association. Collecting files that may be used to bully and solicitation of minors for sex.
Cyberstalking
24
is frequently an extension of harassment outside the internet, and may yield in various dissimilar bahaviors.
Cyberbullying
25
Evaluating websites
What is the domain type of the website? Who wrote the article? What is the purpose of the document and why was it produced? When was the document published and updated?
26
An illustration in Microsoft Office is visualize or drawing that is in the form of
Pictures Clip arts Shapes Smart Art Charts Screenshots
27
Microsoft Powerpoint provides several animation styles in different categories namely
Entrance Emphasis Exit Motion Paths
28
is a text or image on the screen that you can click-on to jump to another file or within existing file.
Hyperlinks
29
are visual representations of data made on a computer and is displayed on a computer screen or monitor
Computer Graphics
30
it helps to draw attention in specific graphics elements.
Contrast
31
are formed by pairing one main color with the two colors directly next to it on the color wheel.
Analogous Color Schemes
32
are colors with various shades and tints of one hue in the color wheel.
Monochromatic Color Schemes
33
are colors that are equally placed in lines around the color wheel.
Triadic Color Schemes
34
are colors directly across from each other on the color wheel and relevant tints of those colors
Complementary Color Schemes
35
are colors that includes dominant color and the two colors directly adjacent to the dominant color’s complement.
Split Complementary Color Schemes
36
is the process of repeating elements throughout a design to give unified look
Repetition
37
calls for related items to be grouped visually, creating less clutter and making for a more organized layout.
Proximity
38
GNU image Manipulation Program
GIMP
39
Features of the GIMP
Painting System Advanced manipulation Animation File Handling
40
Image Hosting Sites
Instagram Imgur Flickr Photobucket DeviantArt
41
is an mobile photo and video sharing, and social networking service
42
is an online sharing community and image host
Imgur
43
is an image and video hosting websites and web services suite
Flickr
44
is an image and video hosting websites, web services suite, and online community dedicated to preserving and sharing the entire photo and video lifecycle.
Photobucket
45
is an online community for art display and social networking service
DeviantArt