You are on page 1of 5

WEB

WEB – internet-based hypertext system


WWW – an information space where documents and other web resources are identified by URL,
interlinked by hypertext links, and accessible via the Internet
WEBSITE – a collection of related web pages, including multimedia content, typically
identified with a common domain name, and published on at least one web server
WEBPAGE – a hypertext document connected to the WWW
WEB SERVER – refers to server software, or hardware dedicated to running said software, that
can serve contents to the WWW
URLs (Uniform Resource Locators) – a reference to a web resource that specifies its location
on a computer network
EXAMPLE: http.www.google.com.index.html
http – protocol
www.google.com – hostname
index.html – filename
DN (Domain Name) – an identification string that defines a realm of administrative autonomy,
authority or control within the Internet. Domain Names are formed by the rules and procedures
of the DNS
DNS (DN + System) – a hierarchical decentralized naming system for computers, services, or
other resources connected to the Internet or a private network.
MULTIMEDIA – a combination of different content forms such as texts, audio, images,
animations, video, and interactive content.
IP (Internet Protocol) – the principal communications protocol in the Internet protocol suite for
relaying datagrams across network boundaries
LAN (Local Area Network) – a computer network that interconnects computers within a
limited area such as a residence, school, laboratory, university campus, or office building
WAN (Wide Area Network) – a telecommunications network or computer network that extends
over a large geographical distance/place
HOSTNAME – a label that is assigned to a device connected to a computer network and that is
used to identify the device in various forms of electronic communication, such as WWW
HTTP (HyperText Transfer Protocol) – an application protocol for distributed, collaborative,
and hypermedia information systems. It is the foundation of data communications for the WWW
WEB BROWSER (Browser) – a software application for accessing information on the WWW.
Each individual web page, image, and video is identified by a distinct URL, enabling browsers to
retrieve and display them on the user’s device.

STATIC WEBSITE (WEB 1.0) VS. DYNAMIC WEBSITE (WEB 2.0)


WEB 1.0 (STATIC WEBSITE)
- contains web pages with fixed content
- Server is directed to the client/browser
ADVANTAGES:
 Easy to develop
 Cheap to develop
 Cheap to host
DISADVANTAGES:
 Requires web development expertise to update site
 Changes and updates are very time consuming
 Site not as useful for the user
 OUT OF DATE!
WEB 2.0 (DYNAMIC WEBSITE)
- Refers to WWW websites that emphasize user-generated content, usability, and
contain dynamic content
- Server is directed to database/s first before client/browser
ADVANTAGES:
 Much more functional website
 Much easier to update
 Much easier to add new content/pages
 New content brings people back to the site and helps in the search engines
 Can work as a system to allow staff or users to collaborate
DISADVANTAGES
 More expensive to develop
 Slower to develop
FEATURES
 Folksonomy (allows user to categorize and classify/arrange information using freely
chosen keywords)
 #Hashtag
 Rich User Experience (content is dynamic and responsive to user’s input)
 User Participation (the owner of the website is not the only one who is able to put
content)
 Long Tail (services that are offered on demand rather than on a one time purchase)
 Software as a Service (users will subscribe to a software only when needed rather
than purchasing them)
 Mass Participation (diverse information sharing through universal web access)

SEMANTIC WEB (3.0)


WEB 1.0 AND 2.0 ARE CENTRALIZED, HUMAN MEDIATED, RENT SEEKING, while
WEB 3.0 IS DECENTRALIZED AUTONOMOUS P2P (PEER TO PEER)
WEB 3.0 – a movement led by the World Wide Web Consortium (W3C)
The w3c standard encourages web developers to include semantic content in their web pages
TIM BERNERS-LEE – Inventor of WWW

TRENDS IN ICT
CONVERGENCE – technological convergence is the synergy of technological advancements
to work on a similar goal or task
SOCIAL MEDIA – a website, application, or online channel that enables web users to create,
co-create, discuss, modify, and exchange user-generated content.

TYPES OF SOCIAL MEDIA


SOCIAL NETWORKS – sites that allow you to connect with other people with the same
interest or background
BOOKMARKING SITES – sites that allow you to store and manage links to various websites
and resources. E.g. Pinterest
SOCIAL NEWS – sites that allow users to post their own new items or links to other news
sources.
MEDIA SHARING – sites that allow you to upload and share media content like images,
music, and videos. E.g. Youtube and Instagram
MICROBLOGGING – sites that focus on short updates from the user. E.g. Twitter
BLOGS AND FORUMS – websites that allow users to post their content. Other users are able
to comment on the said topic. E.g. Blogger and Tumblr

MOBILE TECHNOLOGIES
iOS – used in Apple devices such as the iPhone and iPad
ANDROID – an open source OS (Operating System) developed by Google
BLACKBERRY OS – used in Blackberry devices
WINDOWS PHONE OS – a closed source OS developed my Microsoft
SYMBIAN – the original smartphone OS, used by Nokia devices
WebOS – originally used for smartphones, now used for Smart TVs
WINDOWS MOBILE – developed by Microsoft for smartphones and pocket PCs
 ASSISTIVE MEDIA – a nonprofit service designed to help people who have visual and
reading impairments. Database of audio recordings
 THE INTERNET OF THINGS – Anything (Any device), Anyone (Anybody), Any
service (Any business), Any Path (Any Network), Any Place (Anywhere), Anytime (Any
content)

THINGS TO CONSIDER BEFORE POSTING SOMETHING OVER THE


INTERNET
 Would you want your parents or grandparents, future boss to see it? (ONCE YOU POST
SOMETHING ONLINE, YOU HAVE NO CONTROL ON WHO SEES IT)
 Your friends depend on you to protect their reputation online. Take this seriously
 Set your post to “private”. In this way, search engines will not be able to scan that post
 Avoid using names. Names are easy for search engines to scan.
 Offensive posts should be taken down
CORE RULES OF NETIQUETTE
1. Remember the human
2. Adhere to the same standards of behavior online that you follow in real life
3. Know where you are in cyberspace
4. Respect other people’s time and bandwidth
5. Make yourself look good online
6. Share expert knowledge
7. Help keep flame wars under control
8. Respect other people’s privacy
9. Don’t about your power
10. Be forgiving of other people’s mistakes

INTERNET THREATS
MALWARE – stands for malicious software
Spreads through Free software, Suspicious pop-up ads, Spam email attachments, P2P
sharing files, Malicious websites
TYPES OF MALWARE:
1. VIRUS – a malicious program designed to replicate itself and transfer from one computer
to another either through the Internet and local networks or data storage
2. WORM – a malicious program that transfer from one computer to another by any type of
means. It uses a computer network to spread itself
a. ILOVEYOU worm (Love Bug Worm) by Reonel Ramones and Onel De Guzman
3. TROJAN – a malicious program that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get your
information
a. Rouge Security Software – tricks the user into posing that it is a security software.
It asks the user to pay to improve his/her security but in reality, they are not
protected at all
4. SPYWARE – a program that runs in the background without you knowing it. It has the
ability to monitor what you are currently doing and typing through keylogging
a. Keyloggers – used to record the keystroke done by the users. This is done to steal
their password or any other sensitive information. It can record email, messages,
or any information you type using your keyboard.
i. Hardware keylogger – device attached to keyboard (method 1 of record
typing)
ii. Software keylogger – programs run on computer (method 2 of record
typing)
5. ADWARE – a program designed to send you advertisements, mostly a pop-ups
a. Spam – unwanted email mostly from bots or advertisers. It can be used to end
malware
b. Phishing – acquires sensitive personal information like passwords and credit card
details. This is done by sending you an email that will direct the user to visit a
website
c. Pharming – a more complicated way of phishing where it exploits the DNS
system

You might also like