問題一覧
1
a program designed to replicate by attaching itself into other computer programs
Viruses
2
are colors that includes dominant color and the two colors directly adjacent to the dominant color’s complement.
Split Complementary Color Schemes
3
Online Threats
Phishing Internet scam Malware Keyloggers A.Viruses B.Worms Cyberstalking Cyber bullying
4
are colors directly across from each other on the color wheel and relevant tints of those colors
Complementary Color Schemes
5
scammers disguise as a reliable source in trying to attain private information like passwords, and credit card information through the internet
Phishing
6
Microsoft Powerpoint provides several animation styles in different categories namely
Entrance Emphasis Exit Motion Paths
7
Popularized the term Web 2.0
Tim O Reilly , Dale Dougherty
8
Evaluating websites
What is the domain type of the website? Who wrote the article? What is the purpose of the document and why was it produced? When was the document published and updated?
9
was the founder of Assistive Media
David Erdody
10
Web 2.0 Technologies
AJAX or Asynchronous Javascript and XML Blog Mash- ups RSS Social Networking User-generated Content (UGC) Wikis Software as a Service (SaaS)
11
this is a software that allows criminals to look for significant information that can be used for identity or intellectual property theft
Keyloggers
12
is an image and video hosting websites, web services suite, and online community dedicated to preserving and sharing the entire photo and video lifecycle.
Photobucket
13
are visual representations of data made on a computer and is displayed on a computer screen or monitor
Computer Graphics
14
it helps to draw attention in specific graphics elements.
Contrast
15
are formed by pairing one main color with the two colors directly next to it on the color wheel.
Analogous Color Schemes
16
3 Technologies that enable Convergence
Internet Satellite Wireless
17
is an mobile photo and video sharing, and social networking service
18
cheat the target of their personal property directly rather than private information through fabricated promises
Internet scam
19
is an image and video hosting websites and web services suite
Flickr
20
Websites and other online means of communication that are used by large people to share information and to develop social and professional contacts
Social Media
21
Image Hosting Sites
Instagram Imgur Flickr Photobucket DeviantArt
22
sites will be generating raw data on their own, allowing the exchange of data and produce new information.
Web 3.0
23
are colors that are equally placed in lines around the color wheel.
Triadic Color Schemes
24
can be injected into a network by any types of means , like a USB stick or an email attachment.
Worms
25
An illustration in Microsoft Office is visualize or drawing that is in the form of
Pictures Clip arts Shapes Smart Art Charts Screenshots
26
are the combination of two or more different entities of technologies to create a new single device.
Convergent Technologies
27
Semantic Web – Read, Write and Own
Web 3.0
28
is an online sharing community and image host
Imgur
29
is the process of repeating elements throughout a design to give unified look
Repetition
30
GNU image Manipulation Program
GIMP
31
are colors with various shades and tints of one hue in the color wheel.
Monochromatic Color Schemes
32
Features of the GIMP
Painting System Advanced manipulation Animation File Handling
33
a small nonprofit organization that offers audio access to reading materials for anybody with a reading access barrier.
Assistive Media
34
is a text or image on the screen that you can click-on to jump to another file or within existing file.
Hyperlinks
35
documents contains hyperlinks and they provide no interactivity. Web of Documents
Web 1.0
36
is frequently an extension of harassment outside the internet, and may yield in various dissimilar bahaviors.
Cyberbullying
37
is an online community for art display and social networking service
DeviantArt
38
providing people the means to collaborate and share information online.
Web 2.0
39
calls for related items to be grouped visually, creating less clutter and making for a more organized layout.
Proximity
40
malicious software disguised as a real software often secretly installed, intended to transfer and gather private information, like passwords without user’s permission.
Malware
41
Coined the term Web 2.0 in her article “Fragmented Future”
Darcy DiNucci
42
to follow or bother an individual, or association. Collecting files that may be used to bully and solicitation of minors for sex.
Cyberstalking
43
Dynamic Web – Read and Write
Web 2.0
44
Web 2.0 Characteristics:
Accessibility Relevance of Content Shared data Collaboration Rich User Experiences
45
Static Web – Read Only
Web 1.0