● We can use it to enter and share to content technology by combining information on web page - The term different media formats such as text, writable web refers to the capacity of pictures, sounds, and videos into one Web 2.0 to allow users to enter multimedia content. Nowadays, the goal information through the use of forms of multimedia content is to appeal to as many senses used by an individual as and social media websites. possible to obtain information such as seeing, hearing, smelling, tasting, and ● It is recognized as the executable web touching. of web evolution - Web 3.0 is the executable web of web evolution. This ● The convergence of technology in generation of websites can deliver communication technology refers to the customized service, perform real-time fast and effective transfer of information analysis, and generate reports with the through the collaboration of different use of technologies such as artificial communication technologies like radio intelligence and machine learning. frequencies, Bluetooth, Wi-Fi connectivity, ethernet, and fiber optics. ● Web 2.0 - Web 2.0 is labeled as the “writable web” because of its capability ● Due to the static nature of Web 1.0, the to engage its users through interaction, users of this web generation are limited collaboration, and information sharing. to observing and consuming Websites belonging to this type have information. The dynamic nature of transformed web pages from static to Web 2.0 and 3.0 enables the users to dynamic web pages, which are capable interact, collaborate, and share of updating content real-time using information on the website. applications embedded in the system ● The content of a dynamic web page is ● not a description and a part of Web 1.0? easier to update or modify compared to that of a static web page. Moreover, a dynamic web page's content is saved in the server while that of a static web page is embedded in the platform. Comparing the remaining two options, by definition, static means "stationary or fixed," whereas dynamic means "marked by productive activity or changes.
● The technology convergence in terms of
computing technology refers to the ● The convergence of improvements made on electronic devices or gadgets by combining the technology will not guarantee functions of two more devices into one gadget. a stylish design of electronic devices. ● One of the most important functions of ICT is to be able to distribute ● A spreadsheet allows you to information between different create rows and columns to devices through networks. organize data. It can calculate Distribution also means to share values using formulas and even information using hardware like create various graphs. monitors, television, speakers to the users of an ICT system. ● An encoder and web developer both belong to the people component of Hardware is the physical and ICT whereas word processor and tangible component of the computer coding application are both system. It is a term used in ICT to software, so the two given differentiate it from software or the pairs exhibit people-software set of instructions that run the grouping. Although a computer hardware. scientist and a digital artist are also peopleware, they are paired ● Information is the product of with hardware—LCD projector and an ICT system that is useful to Bluetooth technology, respectively us when making decisions. Data are raw facts and figures that seem ● The situation is focused on Juan’s meaningless to us until they are ability to be updated despite organized and processed into geographical distance through the information that gives data context. use of a social media platform. Through social media, he is able to ● Tools, devices, services and connect and interact with his family and other people from applications, that are used to different parts of the world.- retrieve, process, store, COMMUNITION. secure, and transmitted information. - ● The generally accepted definition of ICT is any electronic device, application, and service that can be used to gather, record, and store information which can then transmit and distribute that information to other people or systems. ICT is often associated with just computer-based technologies, but it also includes old electronic devices such as telephones and radio. ● The online store can expand their The processing system, also referred market if they can sell their products through the Internet, using it to perform to as the “information system,” is a business transactions like taking orders group of hardware and software that online and processing online payments. is designed to collect, process, store, The information needed for the project and distribute information. will come from web search engines.
A terminal device is a component of
Sheila needs an online advertising the online system that is used to send platform to communicate with data or instruction from the user to customers that are using the the Internet Internet.
A server refers to the hardware that
serves as the storage house of data coming in and out of the system. Discussion sites are social media Portability is measured by the device’s websites designed for individuals size and weight. If the device weighs less who are avid fans of forums and or is smaller in size, it will be more debates. These allow users to portable exchange views, comments, and *In this situation, visual impairment can be opinions on issues and matters eliminated since it requires the person to discussed among its participants of see visual cues. the same interest or expertise.
*Hearing impairment can also be removed
Consumer review network is a social since the output is audible sounds, which do media site that allows users and not match persons with hearing customers to give feedback on impairment. different products. The comments, reviews, or ratings posted on the *Learning difficulty can also be eliminated
websites by consumers can help since it is not designed explicitly to address
future customers to decide if they a specific type of learning difficulty.
are going to avail of the same
Assistive media are devices that aim to products. increase or improve the functionality of a person with disability (PWD). It refers to Bookmarking and content curation technology that acts as support to PWDs in sites are websites that aid users in the accomplishment of their task. discovering, sharing, and discussing the latest trends in media. These A social networking site is the type of social websites help people search for media that fits Jerry’s purpose because it information or ideas that can help facilitates communication through text them with a project. messages, phone calls, and video calls ● The cyber world allows us to ● navigate through a virtual world, ● interact with other people ● Being a generation of technology through the use of the internet, dependent human beings, we and retrieve data from the vast need to be more careful on the information available online. internet to avoid risk. We can protect ourselves by simply creating strong passwords and avoiding sharing personal ● The internet is very powerful but information to others especially even with these advancements, to strangers. we can still encounter risks such as exposure to unsuitable contents, crime-related dangers such as hackers, identity thieves, internet predators, and cyberbullies, privacy-related dangers, and malicious software–related threats like virus, worms, trojan virus, spyware, adware, ransomware and fileless malware. ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● What feature of the cyber world ● Your younger sibling might be allows us to freely get information exposed to unsuitable contents on different topics? and encounter different graphic violence and verbal obscenity Information source as a feature of the through competitive and violent cyber world allows us to access data on streamers online. There are also the internet. We can search video tutorials, trivia, and other details about a shows on YouTube that are not specific topic. age-appropriate despite being a cartoon like Happy Tree Friends ● Phishing is an illegal practice where a criminal sends an email ● The first statement is similar to disguised as a reputable situations done by predators that organization to the victim asking usually target vulnerable for their personal information or children and teens. The second bank account details. This is statement is connected to usually used by identity thieves phishing which is a practice done to steal identity. And the last ● Ransomware is often part of the statement is clearly a form of phishing scam. When the victim cyberbullying. All these threats clicks an untrusted link, it will fall under the category of download a file and encrypt crime-related dangers sensitive information denying any access from the target. The ● Vince’s popularity can make criminals behind the malware haters do extreme measures such will then ask for money before as hacking through his account they unlock your file or system to destroy his reputation online. Fortunately, the hackers failed to ● The cyber world provides us with access his accounts with the use an environment where social of a strong password. He should interactions such as chatting, change his password as soon as sharing ideas on an online possible to avoid compromising community, teaming up with his account information and he players on an online game, or should use a stronger one that is finding people with similar different from his current interests. The cyber world is password. It is also better if he public thus open to anyone who will turn on the two-factor wants to use it. There is no limit authentication for stronger to the actions that we can do security online ● Installing antivirus can ● here is no official and definitely help in detecting and written rule for netiquette. removing malicious software, It can be made by anyone but it is better to prevent them who is using the internet from entering our computer by depending on the factors avoiding suspicious links, as it such as geography, race, can download viruses. Keeping and preference, among the device updated can also help others, which still follows protect your system the regulations in each country ● Practicing all of the choices given will protect you and your ● Since you are typically not seen information from being stolen. in the virtual world, people tend By not sharing personal to judge you more on how you information, you cannot be communicate online. This easily tracked in both the cyber includes your choice of words world and the real world. Scams and correct use of spelling and and phishing are one way of grammar stealing information, so it is good to know the signs. ● Flaming is an act of expressing Passwords are important offensive language towards because they allow us to access someone you are interacting our online accounts such as bank with online. That may lead to and work accounts. It should what is being called a "flame only be known by the person war. using that account. Lastly, if it is inevitable to use a shared device, ● Having more power online does make sure to log out not give anyone the right to take advantage of it. It should be used for the welfare of the greater good—as the saying goes "with great power comes great ● responsibility ● ● ● Practicing netiquette helps us to ● properly communicate online in ● any given situation. ● ● ● ● Once you put something online, anyone can easily have access to that information. Always think twice before posting anything online
● In this kind of situation, it is best
to check first whether it is a real virus through security websites. This will help you to be fully aware of this kind of warning next time you come across it again
● In this kind of situation, it is best
to leave the online forum. A proper netiquette involves respecting other people especially when there is an important discussion
● In this kind of situation it is best
to block the website that posts inappropriate content to prevent it from reappearing again
● In this kind of situation, it is best
to stop communicating with the person and let an adult deal with the incident especially if you are underage