暗記メーカー
ログイン
EMTECH
  • Stephen Madriaga

  • 問題数 45 • 10/12/2023

    記憶度

    完璧

    6

    覚えた

    17

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    Static Web – Read Only

    Web 1.0

  • 2

    Dynamic Web – Read and Write

    Web 2.0

  • 3

    Semantic Web – Read, Write and Own

    Web 3.0

  • 4

    documents contains hyperlinks and they provide no interactivity. Web of Documents

    Web 1.0

  • 5

    providing people the means to collaborate and share information online.

    Web 2.0

  • 6

    Coined the term Web 2.0 in her article “Fragmented Future”

    Darcy DiNucci

  • 7

    Popularized the term Web 2.0

    Tim O Reilly , Dale Dougherty

  • 8

    Web 2.0 Characteristics:

    Accessibility Relevance of Content Shared data Collaboration Rich User Experiences

  • 9

    Web 2.0 Technologies

    AJAX or Asynchronous Javascript and XML Blog Mash- ups RSS Social Networking User-generated Content (UGC) Wikis Software as a Service (SaaS)

  • 10

    sites will be generating raw data on their own, allowing the exchange of data and produce new information.

    Web 3.0

  • 11

    are the combination of two or more different entities of technologies to create a new single device.

    Convergent Technologies

  • 12

    3 Technologies that enable Convergence

    Internet Satellite Wireless

  • 13

    Websites and other online means of communication that are used by large people to share information and to develop social and professional contacts

    Social Media

  • 14

    a small nonprofit organization that offers audio access to reading materials for anybody with a reading access barrier.

    Assistive Media

  • 15

    was the founder of Assistive Media

    David Erdody

  • 16

    Online Threats

    Phishing Internet scam Malware Keyloggers A.Viruses B.Worms Cyberstalking Cyber bullying

  • 17

    scammers disguise as a reliable source in trying to attain private information like passwords, and credit card information through the internet

    Phishing

  • 18

    cheat the target of their personal property directly rather than private information through fabricated promises

    Internet scam

  • 19

    malicious software disguised as a real software often secretly installed, intended to transfer and gather private information, like passwords without user’s permission.

    Malware

  • 20

    this is a software that allows criminals to look for significant information that can be used for identity or intellectual property theft

    Keyloggers

  • 21

    a program designed to replicate by attaching itself into other computer programs

    Viruses

  • 22

    can be injected into a network by any types of means , like a USB stick or an email attachment.

    Worms

  • 23

    to follow or bother an individual, or association. Collecting files that may be used to bully and solicitation of minors for sex.

    Cyberstalking

  • 24

    is frequently an extension of harassment outside the internet, and may yield in various dissimilar bahaviors.

    Cyberbullying

  • 25

    Evaluating websites

    What is the domain type of the website? Who wrote the article? What is the purpose of the document and why was it produced? When was the document published and updated?

  • 26

    An illustration in Microsoft Office is visualize or drawing that is in the form of

    Pictures Clip arts Shapes Smart Art Charts Screenshots

  • 27

    Microsoft Powerpoint provides several animation styles in different categories namely

    Entrance Emphasis Exit Motion Paths

  • 28

    is a text or image on the screen that you can click-on to jump to another file or within existing file.

    Hyperlinks

  • 29

    are visual representations of data made on a computer and is displayed on a computer screen or monitor

    Computer Graphics

  • 30

    it helps to draw attention in specific graphics elements.

    Contrast

  • 31

    are formed by pairing one main color with the two colors directly next to it on the color wheel.

    Analogous Color Schemes

  • 32

    are colors with various shades and tints of one hue in the color wheel.

    Monochromatic Color Schemes

  • 33

    are colors that are equally placed in lines around the color wheel.

    Triadic Color Schemes

  • 34

    are colors directly across from each other on the color wheel and relevant tints of those colors

    Complementary Color Schemes

  • 35

    are colors that includes dominant color and the two colors directly adjacent to the dominant color’s complement.

    Split Complementary Color Schemes

  • 36

    is the process of repeating elements throughout a design to give unified look

    Repetition

  • 37

    calls for related items to be grouped visually, creating less clutter and making for a more organized layout.

    Proximity

  • 38

    GNU image Manipulation Program

    GIMP

  • 39

    Features of the GIMP

    Painting System Advanced manipulation Animation File Handling

  • 40

    Image Hosting Sites

    Instagram Imgur Flickr Photobucket DeviantArt

  • 41

    is an mobile photo and video sharing, and social networking service

    Instagram

  • 42

    is an online sharing community and image host

    Imgur

  • 43

    is an image and video hosting websites and web services suite

    Flickr

  • 44

    is an image and video hosting websites, web services suite, and online community dedicated to preserving and sharing the entire photo and video lifecycle.

    Photobucket

  • 45

    is an online community for art display and social networking service

    DeviantArt