p.1
History of the World Wide Web
Who invented the World Wide Web (WWW)?
Tim Berners-Lee, an English engineer and computer scientist, invented it in 1989.
p.1
Web 1.0 vs Web 2.0 vs Web 3.0
What characterizes Web 1.0?
Web 1.0 is characterized by static web pages that cannot be manipulated.
p.1
Web 1.0 vs Web 2.0 vs Web 3.0
What is a key feature of Web 2.0?
Web 2.0 allows users to interact with the page, creating dynamic web pages.
What is microblogging?
Sites that focus on short updates from the user.
p.2
Assistive Media and Its Importance
What is Assistive Media?
A nonprofit service organized to help people with visual and reading impairments.
What is folksonomy in the context of Web 2.0?
Folksonomy allows users to categorize and classify information using tags, often starting with a hashtag (#).
p.3
Internet Safety and Security Tips
Why is sharing your mother's maiden name risky?
It is often used as an answer to secret questions for password recovery.
p.3
Internet Safety and Security Tips
What is the risk of disclosing the names of your siblings?
Strangers may use their identity to deceive you.
p.3
Internet Safety and Security Tips
How can sharing your birthday make you vulnerable?
It can lead to identity theft.
p.2
Mobile Technologies Overview
What has contributed to the rise in popularity of mobile technologies?
The capability of smartphones and tablets to perform tasks originally found in PCs.
p.1
Social Media Types and Impact
What is social media?
Social media is a website, application, or online channel that enables users to create, discuss, modify, and exchange user-generated content.
p.2
Internet Safety and Security Tips
What is the risk of sharing your first name online?
A hacker may already know plenty about you even with just your first name.
What are additional social features mentioned in Empowerment Technologies?
Liking, commenting, and having a user profile.
p.4
Types of Internet Threats and Malware
What is the function of spyware?
A program that runs in the background without the user's knowledge.
p.4
Mobile Technologies Overview
What is the purpose of the formula bar in Excel?
To display the contents and formula entered in the active cell.
p.2
Mobile Technologies Overview
What is iOS?
A mobile operating system created by Apple Inc. and distributed exclusively for Apple hardware.
p.4
Types of Internet Threats and Malware
What is a key vulnerability when downloading files?
Downloading from untrusted websites, especially peer-to-peer downloads.
p.1
Web 1.0 vs Web 2.0 vs Web 3.0
What is Web 3.0 also known as?
Web 3.0 is known as the Semantic Web.
p.2
Internet Safety and Security Tips
What information can identity thieves use for verification purposes?
Current and previous schools attended.
p.3
Internet Safety and Security Tips
What does 'Internet Safety' refer to?
The online security or safety of people and their information when using the internet.
p.3
Internet Safety and Security Tips
Why should you avoid logging into public networks?
They can expose you to hackers.
Why should you not type in all caps?
Because people may misinterpret it.
p.4
Internet Safety and Security Tips
What should you do to protect your computer from malware?
Install and update antivirus software, using only one to avoid conflicts.
p.4
Types of Internet Threats and Malware
What is a computer virus?
A piece of malicious code that attaches itself to software programs, emails, or files without permission.
p.3
Internet Safety and Security Tips
Why is sharing your home address particularly dangerous?
It makes it easier for criminals to locate you.
p.4
Types of Internet Threats and Malware
What is phishing?
An attempt to acquire sensitive personal information like credit card details.
p.2
Trends in Information and Communication Technology (ICT)
What does convergence refer to?
The synergy of technological advancements to work on a similar goal or task.
What does 'Rich User Experience' mean in Web 2.0?
It refers to content that is dynamic and responsive to user input.
What is the purpose of netiquette?
A set of rules for behaving properly while online.
p.1
Social Media Types and Impact
What are social networks?
Social networks are websites that allow people with similar interests to come together and share information and communicate.
p.4
Internet Safety and Security Tips
How can you secure your home Wi-Fi network?
Make it a private network by adding a password.
p.3
Internet Safety and Security Tips
What should never be posted over the internet?
Personal information such as your number, address, and names of family members.
p.4
Types of Internet Threats and Malware
What is a Trojan?
A malicious program disguised as a useful program that leaves your computer unprotected.
What do blogs and forums allow users to do?
Post content and comment on topics.
p.4
Mobile Technologies Overview
What does the term 'active cell' refer to in Excel?
The cell that has a thick border.
p.3
Internet Safety and Security Tips
What is the internet often referred to as?
The 'Information Superhighway'.
p.2
Mobile Technologies Overview
What is Android?
An open-source operating system developed by Google.
p.3
Internet Safety and Security Tips
What is a good practice when adding friends on social media?
Only add friends you know in real life.
p.2
Internet Safety and Security Tips
Why is sharing both your first and last name risky?
It can lead to identity theft as it allows matching a name with a face.
p.3
Internet Safety and Security Tips
What is more risky: sharing your home phone number or your personal phone number?
Sharing your home phone number is more risky.
p.4
Mobile Technologies Overview
What does the quick access toolbar show in Excel?
Most frequently used Excel commands.
p.3
Internet Safety and Security Tips
What is a key tip for staying safe online regarding passwords?
Do not share your password with anyone.
p.1
Social Media Types and Impact
What is the purpose of media sharing sites?
Media sharing sites allow users to upload and share media content like images, music, and video.
p.4
Mobile Technologies Overview
What is the function of scroll bars in Excel?
To enable movement of the document into vertical or horizontal views.
p.3
Internet Safety and Security Tips
What should you avoid posting about on social media?
Future vacations, as it signals when your home will be unoccupied.
What is the concept of 'Software as a Service' in Web 2.0?
Users subscribe to software only when needed, rather than purchasing it outright.
What is the Golden Rule of netiquette?
Treat others as you would like to be treated.
p.1
Social Media Types and Impact
What do bookmarking sites allow users to do?
Bookmarking sites allow users to save and share links to websites or interesting articles.
p.1
Trends in Information and Communication Technology (ICT)
What are some challenges facing Web 3.0?
Challenges include compatibility issues, security concerns, vastness of data, vagueness of language, and logical limitations of machines.
What does 'no flaming' mean in netiquette?
Avoiding personal insults communicated through the internet.