Professional Documents
Culture Documents
WEB 1.0
-When the World Wide Web
was invented, most web pages were static. Static (also known as flat page or stationary
page) in the sense that the page is “as is” and cannot be manipulated by the user. The content is
also the same for all users. This is referred to as Web 1.0.
-Web 2.0 allows users to interact with the page: instead of just reading a page, the
user may be able to comment or create a user account. Web 2.0 also allows users to
use web browsers instead of just using their operating system. Browsers can now be used for
their user interface, application software (or web applications), and even for file storage.
3. Long Tail - Services are offered on demand rather than on a one-time purchase.
In certain cases, time-based pricing is better than file-size-based pricing or vice
versa.This is synonymous to subscribing to a data plan that charges you
for the amount of time you spent in the Internet,
or a data plan that charges you for the amount of bandwidth you used.
4. User Participation - The owner of the website is not the only one who is able to
put content. Others are able to place a content of their own by means of comment,
reviews, and evaluation. Some websites allow readers to comment on
an article, participate in a poll, or review a specific product (e.g., Amazon.com, on
line stores).
2. Security - The user’s security is also in question since the machine is saving his
or her preferences.
3. Vastness - The World Wide Web already contains billions of web pages.
5. Logic -
Since machines use logic, there are certain limitations for a computer to be able to predict w
hat the user is referring to at a given time.
TRENDS IN ICT
1. Convergence - Technological convergence is the synergy of technological
advancements to work on a similar goal or task.
a. Social Networks
- These are sites that allow you to connect with other people with the same interests or
background. (Facebook & Google+)
b. Bookmarking Sites
- These are sites that allow you to store and manage links to various websites and
resources. (StumbleUpon & Pinterest)
c. Social News -
These are sites that allow users to post their own news items or links to other news
sources. (Reddit & Digg)
d. Media Sharing -
These are sites that allow you to upload and share media content like images, music, and vide
o. (Flicker,Youtube & Instagram)
e. Microblogging - These are sites that focus on short updates from the user. (Twitter & Plurk)
3. Mobile Technologies
-The popularity of smartphones and tablets has taken a major rise over the
years.This is
largely because of the devices’ capability to do tasks that were originally found i
n personal computers.
KINDS OF OPERATING SYSTEM:
a. iOS Apple devices like iPhone & iPad
b. Android free OS developed by Google
c. Blackberry OS Blackberry devices
d. Windows Phone OS closed source developed by Microsoft
e. Symbian OS for smartphones and Nokia devices
f. WebOS smartphones and smart TVs
g. Windows Mobile developed by Microsoft for smartphones and pocket PCs
4. Assistive Media
-Assistive media is a nonprofit service designed to help people who have visual
NETIQUETTE
-Set of guidelines for courteous communication in the online environment. It includes
proper manners for sending e-mail, conversing online, and so on.
PURPOSE OF NETIQUETTE
-help construct and maintain
a pleasant, comfortable, and efficient environment for online communication,
as well as to avoid placing strain on the system and generating conflict among users.
TYPEOF INFORMATIO
N POSIBLE RISK
1. First Name
2. Last Name
4. Current and Previous School(s) Identity Theft with the purpose of verification
5. Your Cellphone Number
Same as posting your number on a billboard
Rules of Netiquette
l Online security, safety, and ethics
l Internet threats
l Protecting reputations online
l Copyright
l Contextualized online search and research skills
Internet Threats:
Malware - malicious software
Types: Virus, Worm, Trojan, Ransomware, Bots or
Botnets, Spyware, Adware, Rootkits, Fileless malware, and Malvertising.
2. Your friends depend on you to protect their reputation online. Talk to your friends about
this serious responsibility.
3. Set your post to “private.” In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted
it to pull it down or report it as inappropriate.