Who invented the World Wide Web (WWW)?
Tim Berners-Lee, an English engineer and computer scientist, invented it in 1989.
What characterizes Web 1.0?
Web 1.0 is characterized by static web pages that cannot be manipulated.
1/53
p.1
History of the World Wide Web

Who invented the World Wide Web (WWW)?

Tim Berners-Lee, an English engineer and computer scientist, invented it in 1989.

p.1
Web 1.0 vs Web 2.0 vs Web 3.0

What characterizes Web 1.0?

Web 1.0 is characterized by static web pages that cannot be manipulated.

p.1
Web 1.0 vs Web 2.0 vs Web 3.0

What is a key feature of Web 2.0?

Web 2.0 allows users to interact with the page, creating dynamic web pages.

p.2
Features of Web 2.0

What is microblogging?

Sites that focus on short updates from the user.

p.2
Assistive Media and Its Importance

What is Assistive Media?

A nonprofit service organized to help people with visual and reading impairments.

p.1
Features of Web 2.0

What is folksonomy in the context of Web 2.0?

Folksonomy allows users to categorize and classify information using tags, often starting with a hashtag (#).

p.4
Types of Internet Threats and Malware

What does malware stand for?

Malicious software.

p.3
Internet Safety and Security Tips

Why is sharing your mother's maiden name risky?

It is often used as an answer to secret questions for password recovery.

p.3
Internet Safety and Security Tips

What is the risk of disclosing the names of your siblings?

Strangers may use their identity to deceive you.

p.3
Internet Safety and Security Tips

How can sharing your birthday make you vulnerable?

It can lead to identity theft.

p.2
Mobile Technologies Overview

What has contributed to the rise in popularity of mobile technologies?

The capability of smartphones and tablets to perform tasks originally found in PCs.

p.1
Social Media Types and Impact

What is social media?

Social media is a website, application, or online channel that enables users to create, discuss, modify, and exchange user-generated content.

p.2
Internet Safety and Security Tips

What is the risk of sharing your first name online?

A hacker may already know plenty about you even with just your first name.

p.2
Features of Web 2.0

What are additional social features mentioned in Empowerment Technologies?

Liking, commenting, and having a user profile.

p.4
Types of Internet Threats and Malware

What is the function of spyware?

A program that runs in the background without the user's knowledge.

p.4
Mobile Technologies Overview

What is the purpose of the formula bar in Excel?

To display the contents and formula entered in the active cell.

p.2
Mobile Technologies Overview

What is iOS?

A mobile operating system created by Apple Inc. and distributed exclusively for Apple hardware.

p.4
Types of Internet Threats and Malware

What is a key vulnerability when downloading files?

Downloading from untrusted websites, especially peer-to-peer downloads.

p.1
Web 1.0 vs Web 2.0 vs Web 3.0

What is Web 3.0 also known as?

Web 3.0 is known as the Semantic Web.

p.2
Internet Safety and Security Tips

What information can identity thieves use for verification purposes?

Current and previous schools attended.

p.3
Internet Safety and Security Tips

What does 'Internet Safety' refer to?

The online security or safety of people and their information when using the internet.

p.3
Internet Safety and Security Tips

What should you do before accepting terms and conditions on a website?

Read them carefully.

p.3
Internet Safety and Security Tips

Why should you avoid logging into public networks?

They can expose you to hackers.

p.3
Internet Safety and Security Tips

What type of websites should you avoid visiting?

Untrusted websites.

p.2
Netiquette Guidelines

Why should you not type in all caps?

Because people may misinterpret it.

p.4
Internet Safety and Security Tips

What should you do to protect your computer from malware?

Install and update antivirus software, using only one to avoid conflicts.

p.4
Types of Internet Threats and Malware

What is a computer virus?

A piece of malicious code that attaches itself to software programs, emails, or files without permission.

p.3
Internet Safety and Security Tips

Why is sharing your home address particularly dangerous?

It makes it easier for criminals to locate you.

p.4
Types of Internet Threats and Malware

What is phishing?

An attempt to acquire sensitive personal information like credit card details.

p.2
Trends in Information and Communication Technology (ICT)

What does convergence refer to?

The synergy of technological advancements to work on a similar goal or task.

p.1
Features of Web 2.0

What does 'Rich User Experience' mean in Web 2.0?

It refers to content that is dynamic and responsive to user input.

p.2
Netiquette Guidelines

What is the purpose of netiquette?

A set of rules for behaving properly while online.

p.1
Social Media Types and Impact

What are social networks?

Social networks are websites that allow people with similar interests to come together and share information and communicate.

p.4
Internet Safety and Security Tips

How can you secure your home Wi-Fi network?

Make it a private network by adding a password.

p.3
Internet Safety and Security Tips

What should never be posted over the internet?

Personal information such as your number, address, and names of family members.

p.4
Types of Internet Threats and Malware

What is a Trojan?

A malicious program disguised as a useful program that leaves your computer unprotected.

p.2
Features of Web 2.0

What do blogs and forums allow users to do?

Post content and comment on topics.

p.4
Mobile Technologies Overview

What does the term 'active cell' refer to in Excel?

The cell that has a thick border.

p.3
Internet Safety and Security Tips

What is the internet often referred to as?

The 'Information Superhighway'.

p.2
Mobile Technologies Overview

What is Android?

An open-source operating system developed by Google.

p.3
Internet Safety and Security Tips

What is a good practice when adding friends on social media?

Only add friends you know in real life.

p.2
Internet Safety and Security Tips

Why is sharing both your first and last name risky?

It can lead to identity theft as it allows matching a name with a face.

p.3
Internet Safety and Security Tips

What is more risky: sharing your home phone number or your personal phone number?

Sharing your home phone number is more risky.

p.4
Mobile Technologies Overview

What does the quick access toolbar show in Excel?

Most frequently used Excel commands.

p.3
Internet Safety and Security Tips

What is a key tip for staying safe online regarding passwords?

Do not share your password with anyone.

p.1
Social Media Types and Impact

What is the purpose of media sharing sites?

Media sharing sites allow users to upload and share media content like images, music, and video.

p.4
Mobile Technologies Overview

What is the function of scroll bars in Excel?

To enable movement of the document into vertical or horizontal views.

p.3
Internet Safety and Security Tips

What should you avoid posting about on social media?

Future vacations, as it signals when your home will be unoccupied.

p.1
Features of Web 2.0

What is the concept of 'Software as a Service' in Web 2.0?

Users subscribe to software only when needed, rather than purchasing it outright.

p.2
Netiquette Guidelines

What is the Golden Rule of netiquette?

Treat others as you would like to be treated.

p.1
Social Media Types and Impact

What do bookmarking sites allow users to do?

Bookmarking sites allow users to save and share links to websites or interesting articles.

p.1
Trends in Information and Communication Technology (ICT)

What are some challenges facing Web 3.0?

Challenges include compatibility issues, security concerns, vastness of data, vagueness of language, and logical limitations of machines.

p.2
Netiquette Guidelines

What does 'no flaming' mean in netiquette?

Avoiding personal insults communicated through the internet.

Study Smarter, Not Harder
Study Smarter, Not Harder