You are on page 1of 8

Emptech reviewer 11 - gas

● The convergence of technology applies


● We can use it to enter and share to content technology by combining
information on web page - The term different media formats such as text,
writable web refers to the capacity of pictures, sounds, and videos into one
Web 2.0 to allow users to enter multimedia content. Nowadays, the goal
information through the use of forms of multimedia content is to appeal to as
many senses used by an individual as
and social media websites.
possible to obtain information such as
seeing, hearing, smelling, tasting, and
● It is recognized as the executable web touching.
of web evolution - Web 3.0 is the
executable web of web evolution. This ● The convergence of technology in
generation of websites can deliver communication technology refers to the
customized service, perform real-time fast and effective transfer of information
analysis, and generate reports with the through the collaboration of different
use of technologies such as artificial communication technologies like radio
intelligence and machine learning. frequencies, Bluetooth, Wi-Fi
connectivity, ethernet, and fiber optics.
● Web 2.0 - Web 2.0 is labeled as the
“writable web” because of its capability ● Due to the static nature of Web 1.0, the
to engage its users through interaction, users of this web generation are limited
collaboration, and information sharing. to observing and consuming
Websites belonging to this type have information. The dynamic nature of
transformed web pages from static to Web 2.0 and 3.0 enables the users to
dynamic web pages, which are capable interact, collaborate, and share
of updating content real-time using information on the website.
applications embedded in the system
● The content of a dynamic web page is
● not a description and a part of Web 1.0?
easier to update or modify compared to
that of a static web page. Moreover, a
dynamic web page's content is saved in
the server while that of a static web page
is embedded in the platform. Comparing
the remaining two options, by
definition, static means "stationary or
fixed," whereas dynamic means
"marked by productive activity or
changes.

● The technology convergence in terms of


computing technology refers to the
● The convergence of
improvements made on electronic
devices or gadgets by combining the technology will not guarantee
functions of two more devices into one
gadget. a stylish design of electronic
devices.
● One of the most important functions
of ICT is to be able to distribute ● A spreadsheet allows you to
information between different create rows and columns to
devices through networks. organize data. It can calculate
Distribution also means to share values using formulas and even
information using hardware like create various graphs.
monitors, television, speakers to the
users of an ICT system. ● An encoder and web developer both
belong to the people component of
Hardware is the physical and ICT whereas word processor and
tangible component of the computer coding application are both
system. It is a term used in ICT to software, so the two given
differentiate it from software or the pairs exhibit people-software
set of instructions that run the grouping. Although a computer
hardware. scientist and a digital artist are
also peopleware, they are paired
● Information is the product of with hardware—LCD projector and
an ICT system that is useful to Bluetooth technology, respectively
us when making decisions. Data
are raw facts and figures that seem ● The situation is focused on Juan’s
meaningless to us until they are ability to be updated despite
organized and processed into geographical distance through the
information that gives data context. use of a social media platform.
Through social media, he is able to
● Tools, devices, services and connect and interact with his
family and other people from
applications, that are used to
different parts of the world.-
retrieve, process, store, COMMUNITION.
secure, and transmitted
information. - ●
The generally accepted definition of
ICT is any electronic device,
application, and service that can be
used to gather, record, and store
information which can then
transmit and distribute that
information to other people or
systems. ICT is often associated with
just computer-based technologies,
but it also includes old electronic
devices such as telephones and
radio.

The online store can expand their The processing system, also referred
market if they can sell their products
through the Internet, using it to perform to as the “information system,” is a
business transactions like taking orders group of hardware and software that
online and processing online payments.
is designed to collect, process, store,
The information needed for the project and distribute information.
will come from web search engines.

A terminal device is a component of


Sheila needs an online advertising
the online system that is used to send
platform to communicate with
data or instruction from the user to
customers that are using the
the Internet
Internet.

A server refers to the hardware that


serves as the storage house of data
coming in and out of the system.
Discussion sites are social media Portability is measured by the device’s
websites designed for individuals size and weight. If the device weighs less
who are avid fans of forums and or is smaller in size, it will be more
debates. These allow users to portable
exchange views, comments, and
*In this situation, visual impairment can be
opinions on issues and matters
eliminated since it requires the person to
discussed among its participants of
see visual cues.
the same interest or expertise.

*Hearing impairment can also be removed


Consumer review network is a social
since the output is audible sounds, which do
media site that allows users and
not match persons with hearing
customers to give feedback on
impairment.
different products. The comments,
reviews, or ratings posted on the *Learning difficulty can also be eliminated

websites by consumers can help since it is not designed explicitly to address

future customers to decide if they a specific type of learning difficulty.

are going to avail of the same


Assistive media are devices that aim to
products.
increase or improve the functionality of a
person with disability (PWD). It refers to
Bookmarking and content curation
technology that acts as support to PWDs in
sites are websites that aid users in
the accomplishment of their task.
discovering, sharing, and discussing
the latest trends in media. These A social networking site is the type of social
websites help people search for media that fits Jerry’s purpose because it
information or ideas that can help facilitates communication through text
them with a project. messages, phone calls, and video calls
● The cyber world allows us to ●
navigate through a virtual world, ●
interact with other people ● Being a generation of technology
through the use of the internet, dependent human beings, we
and retrieve data from the vast need to be more careful on the
information available online. internet to avoid risk. We can
protect ourselves by simply
creating strong passwords and
avoiding sharing personal
● The internet is very powerful but
information to others especially
even with these advancements,
to strangers.
we can still encounter risks such
as exposure to unsuitable
contents, crime-related dangers
such as hackers, identity thieves,
internet predators, and
cyberbullies, privacy-related
dangers, and malicious
software–related threats like
virus, worms, trojan virus,
spyware, adware, ransomware
and fileless malware.



















What feature of the cyber world ● Your younger sibling might be
allows us to freely get information exposed to unsuitable contents
on different topics? and encounter different graphic
violence and verbal obscenity
Information source as a feature of the through competitive and violent
cyber world allows us to access data on streamers online. There are also
the internet. We can search video
tutorials, trivia, and other details about a
shows on YouTube that are not
specific topic. age-appropriate despite being a
cartoon like Happy Tree Friends
● Phishing is an illegal practice
where a criminal sends an email ● The first statement is similar to
disguised as a reputable situations done by predators that
organization to the victim asking usually target vulnerable
for their personal information or children and teens. The second
bank account details. This is statement is connected to
usually used by identity thieves phishing which is a practice done
to steal identity. And the last
● Ransomware is often part of the statement is clearly a form of
phishing scam. When the victim cyberbullying. All these threats
clicks an untrusted link, it will fall under the category of
download a file and encrypt crime-related dangers
sensitive information denying
any access from the target. The ● Vince’s popularity can make
criminals behind the malware haters do extreme measures such
will then ask for money before as hacking through his account
they unlock your file or system to destroy his reputation online.
Fortunately, the hackers failed to
● The cyber world provides us with access his accounts with the use
an environment where social of a strong password. He should
interactions such as chatting, change his password as soon as
sharing ideas on an online possible to avoid compromising
community, teaming up with his account information and he
players on an online game, or should use a stronger one that is
finding people with similar different from his current
interests. The cyber world is password. It is also better if he
public thus open to anyone who will turn on the two-factor
wants to use it. There is no limit authentication for stronger
to the actions that we can do security
online
● Installing antivirus can ● here is no official and
definitely help in detecting and written rule for netiquette.
removing malicious software, It can be made by anyone
but it is better to prevent them who is using the internet
from entering our computer by depending on the factors
avoiding suspicious links, as it such as geography, race,
can download viruses. Keeping and preference, among
the device updated can also help others, which still follows
protect your system the regulations in each
country
● Practicing all of the choices given
will protect you and your ● Since you are typically not seen
information from being stolen. in the virtual world, people tend
By not sharing personal to judge you more on how you
information, you cannot be communicate online. This
easily tracked in both the cyber includes your choice of words
world and the real world. Scams and correct use of spelling and
and phishing are one way of grammar
stealing information, so it is
good to know the signs. ● Flaming is an act of expressing
Passwords are important offensive language towards
because they allow us to access someone you are interacting
our online accounts such as bank with online. That may lead to
and work accounts. It should what is being called a "flame
only be known by the person war.
using that account. Lastly, if it is
inevitable to use a shared device, ● Having more power online does
make sure to log out not give anyone the right to take
advantage of it. It should be used
for the welfare of the greater
good—as the saying goes "with
great power comes great
● responsibility

● ● Practicing netiquette helps us to
● properly communicate online in
● any given situation.



● Once you put something online,
anyone can easily have access to
that information. Always think
twice before posting anything
online

● In this kind of situation, it is best


to check first whether it is a real
virus through security websites.
This will help you to be fully
aware of this kind of warning
next time you come across it
again

● In this kind of situation, it is best


to leave the online forum. A
proper netiquette involves
respecting other people
especially when there is an
important discussion

● In this kind of situation it is best


to block the website that posts
inappropriate content to prevent
it from reappearing again

● In this kind of situation, it is best


to stop communicating with the
person and let an adult deal with
the incident especially if you are
underage

You might also like