ログイン

Empowerment Technology
38問 • 1年前
  • Al-Walli Bayotlang
  • 通報

    問題一覧

  • 1

    It is also known as WWW or W3 introduce by Tim Berners-Lee. It consists of different pages that are formatted in a markup language called HTML (Hypertext Markup Language) and linked to each other that contain text, graphics, multimedia files, hyperlinks and etc.

    World Wide Web

  • 2

    The first development of World Wide Web where web pages are static. It also known as flat or stationary page and it cannot be manipulated by users.

    Web 1.0

  • 3

    It is a dynamic web page where user can interact with page like creating a user account, posting comments, uploading files and images, and others. Example: Blog sites, Facebook, Twitter, Instagram, YouTube

    Web 2.0

  • 4

    A new paradigm in web interaction extension of led by World Wide Web Consortium (W3C) where it provides framework that allows data to be shared and reuse.

    Web 3.0

  • 5

    users can classify and arrange information by adding tag or label. Pound sign (#) is used in Facebook, Twitter, Instagram and other social networking sites.

    Folksonomy

  • 6

    user can have high interaction with the content of the page and can achieve level of expertise.

    Rich User Experience

  • 7

    user can put content on their own in web page like comment, evaluation, and etc.

    User Participation

  • 8

    A site that offers services and brings individual and businesses into selling different goods and commodities such as shopping site like OLX, Lazada, Shopee, Zalora and others.

    Long Tail

  • 9

    users can subscribe to a software when they need it instead of purchasing them.

    Software as a service

  • 10

    sharing of diverse information through universal web access.

    Mass Participation

  • 11

    – it refers to fusing of technological advancement to work on a similar task. Example. Using smartphone as camera in taking pictures instead of DSLR came

    Convergence

  • 12

    an application and website where user can communicate, create and share content, and participate in online communities.

    Social Media

  • 13

    a technology used in cellular and other devices such netbook, laptop, tablet, smartphones and etc.

    Mobile Technologies

  • 14

    A platform that assist people with disability. It will guide the individual like a blind person by using an audio recording.

    Assistive Media

  • 15

    A website where people with the same come together to share information. Examples: Twitter, Instagram, Facebook

    Social Network

  • 16

    A website where user can post stories and are ranked based on the popularity through voting. Examples: Digg, Reddit, Propeller, Slashdot, Fark

    Social News

  • 17

    A website that allows you to share and store internet bookmarks, articles, posts, blogs, images and others. Examples: Pinterest, StumbleUpon, Dribble

    Bookmarking Sites

  • 18

    A website that allows you to share and store multimedia files such as video, photos and music. Examples: Instagram, YouTube, Flickr

    Media Sharing

  • 19

    a website that allows you to broadcast short message. Examples: Twitter, Tumblr, Meetme

    Microblogging

  • 20

    a discussion website that allows user to ask questions and comments on a journal posted by an individual or group. Examples: Wordpress, Blogger

    Blogs and Forums

  • 21

    It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication.

    Cyberbullying

  • 22

    It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions.

    Identity Theft

  • 23

    A criminal practice where electronic communication is used to stalk or harass individual or group.

    Cyberstalking

  • 24

    The act of sending sexually explicit text messages, images, and videos.

    Sexting

  • 25

    also known as Malicious Software.

    Malware

  • 26

    a malicious program that replicate itself by copying itself to another program.

    Virus

  • 27

    malicious program that disguised as legitimate program that user will accept and use but take control of your computer.

    Trojan Horse

  • 28

    malicious program that copy’s itself and spreads to other computers.

    Worm

  • 29

    A malicious program that gathers information from victim’s computer and send it back to the hacker.

    Spyware

  • 30

    An unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close them.

    Adware

  • 31

    A program that runs in the background and steals user credentials and confidential information and send back to hack by recording every keystroke that a user makes on their computer or device.

    Keylogger

  • 32

    A collection of infected internet–connected devices such as PC and mobile phone that are controlled by a common type of malware.

    Botnet

  • 33

    A software tools used by hackers to gain control over a computer on a network without being exposed.

    Rootkit

  • 34

    A ransom virus that block the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus.

    Ransomeware

  • 35

    Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware.

    Spam

  • 36

    A cyberattack method using deceptive emails and websites to acquiring sensitive personal information.

    Phishing

  • 37

    A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others.

    Cybercrime

  • 38

    A law that deals with all forms of cybercrime.

    Cybercrime Law

  • Physical Science

    Physical Science

    Al-Walli Bayotlang · 44問 · 1年前

    Physical Science

    Physical Science

    44問 • 1年前
    Al-Walli Bayotlang

    Introduction 1

    Introduction 1

    Al-Walli Bayotlang · 22問 · 1年前

    Introduction 1

    Introduction 1

    22問 • 1年前
    Al-Walli Bayotlang

    Entrepreneurship

    Entrepreneurship

    Al-Walli Bayotlang · 38問 · 1年前

    Entrepreneurship

    Entrepreneurship

    38問 • 1年前
    Al-Walli Bayotlang

    Philosophy

    Philosophy

    Al-Walli Bayotlang · 33問 · 1年前

    Philosophy

    Philosophy

    33問 • 1年前
    Al-Walli Bayotlang

    Practical Research 2

    Practical Research 2

    Al-Walli Bayotlang · 18問 · 1年前

    Practical Research 2

    Practical Research 2

    18問 • 1年前
    Al-Walli Bayotlang

    Physical Education

    Physical Education

    Al-Walli Bayotlang · 8問 · 1年前

    Physical Education

    Physical Education

    8問 • 1年前
    Al-Walli Bayotlang

    Entrepreneurship

    Entrepreneurship

    Al-Walli Bayotlang · 15問 · 1年前

    Entrepreneurship

    Entrepreneurship

    15問 • 1年前
    Al-Walli Bayotlang

    Empowerment Technologies

    Empowerment Technologies

    Al-Walli Bayotlang · 42問 · 1年前

    Empowerment Technologies

    Empowerment Technologies

    42問 • 1年前
    Al-Walli Bayotlang

    Physical Science

    Physical Science

    Al-Walli Bayotlang · 7問 · 1年前

    Physical Science

    Physical Science

    7問 • 1年前
    Al-Walli Bayotlang

    Oracle 2

    Oracle 2

    Al-Walli Bayotlang · 14問 · 1年前

    Oracle 2

    Oracle 2

    14問 • 1年前
    Al-Walli Bayotlang

    Oracle

    Oracle

    Al-Walli Bayotlang · 15問 · 1年前

    Oracle

    Oracle

    15問 • 1年前
    Al-Walli Bayotlang

    Pr2

    Pr2

    Al-Walli Bayotlang · 22問 · 1年前

    Pr2

    Pr2

    22問 • 1年前
    Al-Walli Bayotlang

    Disadvantages of Quantitative

    Disadvantages of Quantitative

    Al-Walli Bayotlang · 7問 · 1年前

    Disadvantages of Quantitative

    Disadvantages of Quantitative

    7問 • 1年前
    Al-Walli Bayotlang

    Strength of Quantitative

    Strength of Quantitative

    Al-Walli Bayotlang · 8問 · 1年前

    Strength of Quantitative

    Strength of Quantitative

    8問 • 1年前
    Al-Walli Bayotlang

    Non-Probability Sampling

    Non-Probability Sampling

    Al-Walli Bayotlang · 5問 · 1年前

    Non-Probability Sampling

    Non-Probability Sampling

    5問 • 1年前
    Al-Walli Bayotlang

    Em2

    Em2

    Al-Walli Bayotlang · 9問 · 1年前

    Em2

    Em2

    9問 • 1年前
    Al-Walli Bayotlang

    Em3

    Em3

    Al-Walli Bayotlang · 6問 · 1年前

    Em3

    Em3

    6問 • 1年前
    Al-Walli Bayotlang

    問題一覧

  • 1

    It is also known as WWW or W3 introduce by Tim Berners-Lee. It consists of different pages that are formatted in a markup language called HTML (Hypertext Markup Language) and linked to each other that contain text, graphics, multimedia files, hyperlinks and etc.

    World Wide Web

  • 2

    The first development of World Wide Web where web pages are static. It also known as flat or stationary page and it cannot be manipulated by users.

    Web 1.0

  • 3

    It is a dynamic web page where user can interact with page like creating a user account, posting comments, uploading files and images, and others. Example: Blog sites, Facebook, Twitter, Instagram, YouTube

    Web 2.0

  • 4

    A new paradigm in web interaction extension of led by World Wide Web Consortium (W3C) where it provides framework that allows data to be shared and reuse.

    Web 3.0

  • 5

    users can classify and arrange information by adding tag or label. Pound sign (#) is used in Facebook, Twitter, Instagram and other social networking sites.

    Folksonomy

  • 6

    user can have high interaction with the content of the page and can achieve level of expertise.

    Rich User Experience

  • 7

    user can put content on their own in web page like comment, evaluation, and etc.

    User Participation

  • 8

    A site that offers services and brings individual and businesses into selling different goods and commodities such as shopping site like OLX, Lazada, Shopee, Zalora and others.

    Long Tail

  • 9

    users can subscribe to a software when they need it instead of purchasing them.

    Software as a service

  • 10

    sharing of diverse information through universal web access.

    Mass Participation

  • 11

    – it refers to fusing of technological advancement to work on a similar task. Example. Using smartphone as camera in taking pictures instead of DSLR came

    Convergence

  • 12

    an application and website where user can communicate, create and share content, and participate in online communities.

    Social Media

  • 13

    a technology used in cellular and other devices such netbook, laptop, tablet, smartphones and etc.

    Mobile Technologies

  • 14

    A platform that assist people with disability. It will guide the individual like a blind person by using an audio recording.

    Assistive Media

  • 15

    A website where people with the same come together to share information. Examples: Twitter, Instagram, Facebook

    Social Network

  • 16

    A website where user can post stories and are ranked based on the popularity through voting. Examples: Digg, Reddit, Propeller, Slashdot, Fark

    Social News

  • 17

    A website that allows you to share and store internet bookmarks, articles, posts, blogs, images and others. Examples: Pinterest, StumbleUpon, Dribble

    Bookmarking Sites

  • 18

    A website that allows you to share and store multimedia files such as video, photos and music. Examples: Instagram, YouTube, Flickr

    Media Sharing

  • 19

    a website that allows you to broadcast short message. Examples: Twitter, Tumblr, Meetme

    Microblogging

  • 20

    a discussion website that allows user to ask questions and comments on a journal posted by an individual or group. Examples: Wordpress, Blogger

    Blogs and Forums

  • 21

    It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication.

    Cyberbullying

  • 22

    It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions.

    Identity Theft

  • 23

    A criminal practice where electronic communication is used to stalk or harass individual or group.

    Cyberstalking

  • 24

    The act of sending sexually explicit text messages, images, and videos.

    Sexting

  • 25

    also known as Malicious Software.

    Malware

  • 26

    a malicious program that replicate itself by copying itself to another program.

    Virus

  • 27

    malicious program that disguised as legitimate program that user will accept and use but take control of your computer.

    Trojan Horse

  • 28

    malicious program that copy’s itself and spreads to other computers.

    Worm

  • 29

    A malicious program that gathers information from victim’s computer and send it back to the hacker.

    Spyware

  • 30

    An unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close them.

    Adware

  • 31

    A program that runs in the background and steals user credentials and confidential information and send back to hack by recording every keystroke that a user makes on their computer or device.

    Keylogger

  • 32

    A collection of infected internet–connected devices such as PC and mobile phone that are controlled by a common type of malware.

    Botnet

  • 33

    A software tools used by hackers to gain control over a computer on a network without being exposed.

    Rootkit

  • 34

    A ransom virus that block the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus.

    Ransomeware

  • 35

    Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware.

    Spam

  • 36

    A cyberattack method using deceptive emails and websites to acquiring sensitive personal information.

    Phishing

  • 37

    A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others.

    Cybercrime

  • 38

    A law that deals with all forms of cybercrime.

    Cybercrime Law