it3 Flashcards

(230 cards)

1
Q

consists of information organized into Web pages containing text and graphic images.

A

The Web (World Wide Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is larger collection of interconnected documents or content.

A

The Web (World Wide Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It contains hypertext links or highlighted keywords and images that lead to related information.

A

The Web (World Wide Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A collection of linked Web pages that has a common theme or focus is called

A

Web site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The main page that all of the pages on a particular Web site are organized around and link back to is called the site’s home page.

A

The Web (World Wide Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sir Timothy John Berners-Lee is aka

A

TimBL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

an English engineer and computer scientist best known as the inventor of the World Wide Web.

A

Sir Timothy John Berners-Lee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

He is a Professorial Fellow of Computer Science at the University of Oxford and a professor at the Massachusetts Institute of Technology

A

Sir Timothy John Berners-Lee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is an old internet that only allows people to read from the internet.

A

Web 1.0 (Read Only Static Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

First stage worldwide linking web pages and hyperlink.

A

Web 1.0 (Read Only Static Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Web is use as “information portal”.

A

Web 1.0 (Read Only Static Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It uses table to positions and align elements on page.

A

Web 1.0 (Read Only Static Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Most read only web. If focused on company’s home pages.

A

Web 1.0 (Read Only Static Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dividing the World Wide Web into usable directories.

A

Web 1.0 (Read Only Static Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It started with the simple idea “put content together”.

A

Web 1.0 (Read Only Static Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Example of Web 1.0

A

Mp3.com
Home Page
Directories
Page Views
HTML/Portals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Disadvantages of Web 1.0

A

Read Only Web
Limited User Interaction
Lack Of Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A term used to describe a new generation of Web services and applications with an increasing emphasis on human collaboration.

A

Web 2.0 (Read-Write Interactive Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It is a platform that gives users the possibility (liberty) to control their data.

A

Web 2.0 (Read-Write Interactive Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This is about user-generated content and the read-write web.

A

Web 2.0 (Read-Write Interactive Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

People are consuming as well as contributing information through blogs or sites.

A

Web 2.0 (Read-Write Interactive Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Allows the user to interact with the page known as

A

DYNAMIC PAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

refers to the web pages that are affected by user input or preference.

A

DYNAMIC PAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Is focused on the ability for people to collaborate and share information online via social media, blogging and Web-based communities

A

Web 2.0 (Read-Write Interactive Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Examples of Web 2.0
Social Networking Blogs Wikis Video Sharing Sites
26
is the use of Internet-based social media sites to stay connected with friends, family, colleagues, customers, or clients.
Social Networking
27
Social Networking ex
Facebook Twitter LinkedIn Google+ Pinterest Tumblr
28
It can have a social purpose, a business purpose
Social networking
28
is a discussion or informational website published on the world wide web consisting of discrete, often informal diary-style text entries (posts).
Blogs
29
Posts are typically displayed in reverse chronological order, so that the most recent post appears first, at the top of the web page.
Blogs
30
Blogs ex
Wordpress Blogger Tumbler
31
is a hypertext publication collaboratively edited and managed by its own audience directly using a web browser.
Wikis
32
contains multiple pages for the subjects or scope of the project and may be either open to the public or limited to use within an organization for maintaining its internal knowledge base.
Wikis
33
Wikis ex
Wikipedia Wikibooks Wikiversity Commons Wiktionary Wikivoyage Wikidata Wikinews Wikispecies MediaWiki
34
a website that lets people upload and share their video clips with the public at large or to invited guests.
Video Sharing Sites
35
Video Sharing Sites ex
Youtube Facebook LinkedIn Flickr Twitter Veoh Dailymotion VimeoPRO Myspace Metacafe
36
Key Features of Web 2.0
Folksonomy Rich User Interface User Participation Long Tail
37
An example would be a website that shows local content.
Rich User Interface
38
tagging is an ex of
Folksonomy
38
allows users to categorize and classify/arrange information using freely chosen keywords (e.g. tagging).
Folksonomy
39
content is dynamic and is responsive to user’s input.
Rich User Interface
40
the owner of website is not the only one who is able to put content.
User Participation
41
This is synonymous to subscribing to a data plan that charges you for the amount of time you spent on Internet or a data plan that charges you for the amount of bandwidth you used.
Long Tail
41
Others are able to place content on their own by means of comments, reviews, and evaluation.
User Participation
42
services are offered on demand rather than on a one-time purchase.
Long Tail
43
Web 3.0 (Read-Write Intelligent Web) is Suggested name by
John Markoff
43
ill be more connected, open, and intelligent, with semantic web technologies, distributed databases, natural language processing, machine learning, machine reasoning and autonomous agents.
Web 3.0 (Read-Write Intelligent Web)
44
It is a web of data.
Web 3.0 (Read-Write Intelligent Web)
44
In this generation, all the application on web or mobile will be upgraded with more features.
Web 3.0 (Read-Write Intelligent Web)
45
It applies same principles as Web 2.0: two-way interaction.
Web 3.0 (Read-Write Intelligent Web)
45
provides a framework that allows data to be shared and reuse to deliver web content specifically targeting the user.
Semantic Web
46
Types of websites:
eCommerce Business Website Entertainment Website Portfolio Website Media Website Brochure Website Nonprofit Website Educational Website Infopreneur Website Personal Website Web Portal Wiki or Community Forum Website
47
Website is a website people can directly buy products from you’ve probably used a number of ______ websites before, most big brands and plenty of smaller have one.
eCommerce
48
Any website that includes a shopping cart and a way for you to provide credit card information to make a purchase falls into this category.
eCommerce
49
is any website that’s devoted to representing a specific business.
Business Website
50
It should be branded like the business (the same logo and positioning) and communicate the types of products and/or services the business offers
Business Website
51
If you think about your internet browsing habits, you can probably think of a few websites that you visit purely for entertainment purposes.
Entertainment Website
52
are sites devoted to showing examples of past work.
Portfolio Website
53
Service providers who want to show potential clients the quality of the work they provide can use a portfolio website to collect some of the best samples of past work they’ve done.
Portfolio Website
54
This type of website is simpler to build than a business website and more focused on a particular task: collecting work samples.
Portfolio Website
55
collect news stories or other reporting.
56
There’s some overlap here with entertainment websites, but media websites are more likely to include reported pieces in addition to or instead of content meant purely for entertainment.
Media Website
57
are a simplified form of business websites.
Brochure Website
57
For businesses that know they need an online presence, but don’t want to invest a lot into it (maybe you’re confident you’ll continue to get most of your business from other sources), a simple brochure site that includes just a few pages that lay out the basics of what you do and provide contact information may be enough for you.
Brochure Website
58
In the same way that businesses need websites to be their online presence, nonprofits do as well.
Nonprofit Website
59
is the easiest way for many potential donors to make donations and will be the first place many people look to learn more about a nonprofit and determine if they want to support it.
Nonprofit Website
60
The websites of educational institutions and those offering online courses fall into the category of educational websites.
Educational Website
61
These websites have the primary goal of either providing educational materials to visitors or providing information on an educational institution to them.
Educational Website
62
websites overlap a bit with business and eCommerce websites, but they represent a unique type of online business.
Infopreneur Website
63
create and sell information products.
Infopreneur Website
64
That could be in the form of courses, tutorials, videos or eBooks.
Infopreneur Website
65
Not all websites exist to make money in some way or another.
Personal Website
66
Many people find value in creating personal websites to put their own thoughts out into the world.
67
This category includes personal blogs, vlogs, and photo diaries people share with the world.
Personal Website
68
are often websites designed for internal purposes at a business, organization, or institution.
Web Portal
69
They collect information in different formats from different sources into one place to make all relevant information accessible to the people who need to see it.
Web Portal
70
They often involve a login and personalized views for different users that ensure the information that’s accessible is most useful to their particular needs.
Web Portal
71
Most people are familiar with wikis through the most famous example of one out there
Wikipedia
72
is any website where various users are able to collaborate on content and all make their own tweaks and changes as they see fit.
Wiki or Community Forum Website
73
t or f There are wikis for fan communities, for business resources, and for collecting valuable information sources.
true
74
is the largest computer network in the world that connects billions of computer users.
The Internet or “net” (network of network)
75
he word internet comes from combination between
“interconnection” and “network”.
76
is a collection of computers and devices connected via communication channels and transmission media allow sharing resources (hardware, software, data, and information).
Network
77
t or f Generally, nobody owns the internet.
true
78
t or f The Internet has no single “inventor”. Instead, it has evolved over time.
true
79
The ____ got its start in the United Stated more than 50 years ago as a government weapon in the Cold War.
Internet
80
Scientist and researchers used it to communicate and share data with one another through what was known as
DARPNET (Defense’s Advanced Research Project Agency Network).
80
The Internet got its start in the ____
United Stated
81
This was in response to the Soviet Union bombings and a need to create a communication network which was free from interference and disruption.
Internet in the 1950’s
82
In 1962, a scientist from M.I.T. and DARPA named J.C.R. Licklider proposed a ____of computers that could talk to one another.
“galactic network”
83
who proposed a “galactic network” of computers that could talk to one another.
J.C.R. Licklider
84
Such a network would enable government leaders to communicate even if the Soviets destroyed the telephone system.
85
In 1965, another M.I.T. scientist developed a way of sending information from one computer to another that he called
“packet switching”.
86
breaks data down into blocks, or packets, before sending it to its destination.
Packet switching
87
t or f Without packet switching, the government’s computer network – now known as the ARPANET – would have been just as vulnerable to enemy attacks as the phone system.
true
88
In 1969, ARPANET delivered its first message: a____communicates from one computer to another but it crashed the full network. The internet was yet to be born.
“node-to-node”
89
By the end of 1969, just four computers were connected to the ARPANET, but the network grew steadily during the
1970s.
90
As packet-switched computer networks multiplied, however, it became more difficult for them to integrate into a single worldwide ____
“internet”.
91
By the end of the 1970s, a computer scientist named____had begun to solve this problem by developing a way for all of the computers on all of the world’s mini-networks to communicate with one another.
Vinton Cerf
92
He called his invention ______. Later, he added an additional protocol, known as ______. The acronym we use to refer to these today is TCP/IP.
“Transmission Control Protocol:, or TCP, “Internet Protocol”
93
was described to be the “handshake” between computers all over the world. It enables each computer to have its own identity.
“Transmission Control Protocol:, or TCP
94
His protocol transformed the Internet into a worldwide network.
Cerf
95
Through the ____, researchers and scientist used it to send filed and data from one computer to another.
1980’s
96
However, in ___the internet changed again.
1991
97
He introduced the World Wide Web
Tim Berners-Lee
98
an Internet that was not simply a way to send files from one place to another but was itself a “web” of information that anyone on the Internet could retrieve.
World Wide Web
99
he created the first browser and the Internet that we know today.
Berners-Lee
100
In 1992, a group of students and researchers at the University of the Illinois developed a sophisticated browser that they called In 1992, a group of students and researchers at the University of the Illinois developed a sophisticated browser that they called
Mosaic
101
Mosaic later became
Netscape
101
More Components of the Internet
Servers IP Address (Internet Protocol) Browser Domain Internet Service Provider (ISP)
102
It allowed users to see words and pictures on the same page for the first time and to navigate using scrollbars and clickable links.
Mosaic
103
offered a user-friendly way to search the Web:
Mosaic
104
t or f congress decided that the Web could be used for commercial purposes. As a result, companies of all kinds hurried to set up websites of their own, and e-commerce entrepreneurs began to use the Internet to sell goods directly to customers.
true
105
Is a computer program that provides service to another computer program, and its user.
Servers
106
Types of Servers
Application Server Web Server Proxy Server Mail Server File Server Policy Server
107
a program in computer that provides the business logic for an application program.
Application Server
108
a computer program that servers requested HTML pages or files.
Web Server
109
is software that acts as an intermediary between an endpoint device, such as computer and another server from which a user is requesting.
Proxy Server
110
is an application that receives incoming e-mail from local users and remote senders and forward outgoing e-mail for delivery.
Mail Server
111
is a computer responsible for central storage and management of data files so that other computer on the same network can access them.
File Server
112
is a security component of a policy – based network that provides authorization services and facilities tracking and control of files.
Policy Server –
113
Is a numerical label assigned to each device.
IP Address (Internet Protocol)
114
This provides identity to a network device.
IP Address (Internet Protocol)
115
Is an application program that provides a way to look information on the web.
Browser
116
Example of browsers:
Google chrome, safari, internet explorer, opera, Mozilla.
117
Is the phonebook of internet. We access information online through domain names.
Domain
118
Example of DNS:
www.facebook .com
119
Domain
.com - Commercial .org- Organization .net - Network ,edu -Education .gov - National and State Government Agencies .ph-Philippines .au - Australia
120
Is an organization that provides services for accessing, using or participating in the internet.
Internet Service Provider (ISP)
121
Two types of ISP:
National ISP Regional ISP
122
provide internet access to a specific geographic area.
National ISP
123
business that provides internet access in cities and towns nationwide.
Regional ISP
124
Example of ISP:
Sky Broadband, PLDT, Converge
125
Uses of Internet
Look for information School works, jobs, and home purposes Send and receive electronic mail Video teleconferencing (video call, video chat) Buy and sell product Social networking Watch and post videos Games Take college courses Monitor home while away Financial transactions Download music and movies
126
A global network of thousands of computer networks linked by data lines and wireless systems.
Internet
127
a collection of billions of webpages that you can view with a web browser.
Web
128
the most common method of sending and receiving messages online
Email
129
websites and apps that allow people to share comments, photos, and videos
Social media
130
games that allow people to play with and against each other over the Internet
Online gaming
131
operating system and application updates can typically downloaded from the Internet
Software updates
132
is a coding language used to tell a browser how to place pictures, text, multimedia and links to create a web page.
HTML - Hypertext Markup Language
133
When a user clicks on a link within a web page, that link, which is coded with___, links the user to a specific linked web page.
HTML - Hypertext Markup Language
133
is a web address used to connect to a remote resource on the World Wide Web.
URL - Uniform Resource Locator
134
is a single digit in the binary numbering system (base 2).
Bit
135
generally consists of eight bits.
Byte
136
is to transfer data from your computer to another computer.
Upload
137
is to transfer data from another computer to your computer.
Download
138
the data communication standard of web pages.
HTTP - Hypertext Transfer Protocol
139
combination is the hardware device that acts as the traffic cop for network signals arriving at your home or business from your ISP.
Router or router-modem
139
When a web page has this prefix, the links, text, and pictures should work correctly in a web browser.
HTTP - Hypertext Transfer Protocol
140
is the mathematical scrambling of data so that it is hidden from eavesdroppers.
Encryption
140
This indicates that the web page has a special layer of encryption added to hide your personal information and passwords from others.
Hypertext Transfer Protocol Secure. HTTPS
141
can be wired or wireless or both.
Router or router-modem
142
uses complex math formulas to turn private data into meaningless gobbledygook that only trusted readers can unscramble.
Encryption
143
specialized software, such as Google and Yahoo, that lets www browser users search for information on the web by using keywords, phrases.
Search Engine
144
means the forms of required by good breeding or prescribed by authority to be required in social or official life.
Etiquette of cyberspace and “etiquette”
145
Netiquette came from the word
Network Etiquette
146
is a set of rules for behaving properly online.
Netiquette
147
is concerned with the "proper" way to communicate in an online environment.
Netiquette
148
Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message. Make a good impression - treat others with the same respect that you would like to receive and avoid confrontational or offensive language. To help convey meaning when creating messages, it is sometimes acceptable to include appropriate emoticon symbols, such as a smiley face :) However, for professional communications these would be inappropriate.
REMEMBER THE GOLDEN RULE
149
Communicating effectively in college and business environments requires the use of correct terminology, spelling, and grammar that can easily be understood.
AVOID SLANG, ACRONYM, AND TEXT TALK
150
is a best practice for effective and efficient communication. Strive to make your communications concise and free of any: Spelling and grammar errors. Confusing terms or phrases that could be misunderstood. Errors of omission, such as missing content or recipients. Errors in accuracy of information.
PROOFREAD YOUR MESSAGES BEFORE SENDING THEM
151
E-mail and chat messages that you send or receive are considered private and should not be forwarded or copied to others without gaining the consent of all involved participants. To protect your privacy and safety, do not share online any sensitive personal information such as: Your home address or phone number. Personal conversations. Social plans, such as vacations. Financial information - Usernames, passwords, or hints. Anything personal that you would not want shared by others over the Internet If the material you share with others online came from another source, make every effort to gain permission from the original author or copyright holder. Copying someone else's work and passing it off as your own is plagiarism. It damages your reputation and could subject you to serious academic and legal consequences.
EXERCISE GOOD JUDGEMENT WHEN SHARING INFORMATION WITH OTHERS ONLINE
152
Be constructive and respectful when sharing opinions, beliefs, and criticisms, or responding to those of others in the conversation. When sharing a viewpoint that differs from someone else’s, it is a best practice to first acknowledge the other person by briefly restating what he or she said, but in your own words. This lets the person know that you are listening and trying to understand them. When presenting an opinion or criticism, it is helpful to use phrases that identify to whose point of view you are referring. If the opinion is yours, you can begin with the phrase “In my experience” or “In my opinion”. If it is a viewpoint of someone else, make sure you identify that in your message Example: “According to Eric Ericson,” or “The president believes”.
RESPECT DIVERSITY IN VIEWPOINTS
153
Top Commandments of Computer Ethics
Rule 1: Remember the Human. Rule 2: Adhere to the same standards of behavior online that you follow in real life. Rule 3: Know where you are in cyberspace. Rule 4: Respect other people's time and bandwidth. Rule 5: Make yourself look good online. Rule 6: Share expert knowledge. Rule 7: Help keep flame wars under control. Rule 8: Respect other people's privacy. Rule 9: Don't abuse your power. Rule 10: Be forgiving of other people's mistakes
154
It is the characteristics of the culture of computers, information, technology and virtual reality.
Cybercrime
155
is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.
Cybercrime
156
may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.
Cybercrime
156
is a law in the Philippines approved on September 12, 2012 which aims to address legal issues concerning online interactions and internet.
Republic Act No. 10175 Cybercrime Prevention Act of 2012
157
An act or instance of using or closely imitating the language and thoughts of another author without authorization.
Plagiarism
158
is an act protecting individual personal information.
Republic Act No. 10173 Data Privacy Act of 2012
159
The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
Copyright
160
is the violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work.
Copyright infringement
161
Common Forms of Cybercrimes
Copyright Plagiarism Computer Addiction
162
generally used when speaking about excessive gaming behavior, which can be practiced both offline and online.
Computer Addiction
163
Also known as “Internet Addiction”, gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet.
Computer Addiction
164
The persona you create about yourself virtually.
Virtual Self
165
Unauthorized access of or interference with computer systems, servers, or other information and communication systems.
Hacking
166
Unauthorized access to corrupt, alters, steal, or destroy electronic data using computers or other information and communication systems without the computer or system owner’s knowledge and consent.
Hacking
167
The introduction of computer viruses resulting in the corruption, alteration, theft, or loss of such data.
Hacking
168
Illegal Access Illegal Interception Data Interference System Interference Misuse of Devices is an ex of
Hacking
169
If the act is committed against critical infrastructure of the Philippines the, penalty is between 12-20 years reclusion temporal.
Infection of IT Systems with Malware
170
Six years up to twelve years of imprisonment also known as
prison mayor.
171
An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons.
Computer-related forgery, fraud and/or identity theft
172
Phishing Pharming Spam Maximum of Php 200,000 fine or prison mayor.
Computer-related forgery, fraud and/or identity theft
173
Illegal Downloading Obtaining files that you do not have the right to use from the internet. Digital Piracy Practice of illegally copying and selling digital music, video, computer software, etc. Copyright Infringement Penalty of Php 50,000 – 500, 000 and or prison mayor.
Electronic theft
174
The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
Cyberbullying
175
Cyberbullying LAW
The Anti-Bullying Act of 2013 (RA 10627)
176
Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
Cybersex
177
There is a discussion on this matter if it involves “couples” or “people in relationship” who engage in cybersex. Penalty at least Php 200,000 and or prison mayor.
Cybersex
178
Is a form of child sexual exploitation.
Child Pornography
179
Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 Penalty of 12-20 years of imprisonment or reclusion temporal.
Child Pornography
180
Child Pornography LAW
Republic Act No. 9775 or the Anti-Child Pornography Act of 2009,
181
Is an unprivileged false statement of fact which tends to harm the reputation of a person or company. Penalty of 6-12 years of imprisonment or prison mayor.
Cyber Defamation
182
Stands for malicious software.
Malware
183
Types of Malware
Virus Worm Trojan Spyware Spyware
184
A malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs.
Virus
185
A malicious program that transfers from one computer to another by any type of means.
Worm
186
Often, it uses a computer network to spread itself.
Worm
187
A malicious program that is disguised as a useful program, but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
Trojan
188
ricks the user into posing that it is security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all.
Rogue Security Software
189
A program that runs in the background without you knowing it
Spyware
190
It has the ability to monitor what you are currently doing and typing through key logging.
Spyware
191
used to record the keystroke done by the users. This is done to steal their password or any other sensitive information.
Keyloggers
192
A program designed to send you advertisements, mostly pop-ups.
Adware
192
It can record email, messages, any information you type using your keyboard.
Keyloggers
193
Unwanted email mostly from bots or advertisers. It can be used to send malware.
Spam
194
This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information.
Phishing
194
It goal is to acquire sensitive personal information like passwords and credit card details.
Phishing
195
a more complicated way of phishing where it exploits the DNS (Domain Name Service) system.
Pharming
196
Also known as Information Age.
Digital Age
197
A period when the computer and internet were introduced.
Digital Age
198
It is caused by rapid shift from traditional industry to computerization all the way to artificial intelligence which brought by Industrial Revolution.
Digital Age
199
These technologies enabled people to communicate information easily and rapidly.House chores and jobs are getting automated with the help of machines and equipment.
Digital Age
200
The ICT and its Role in Social Change
Entertainment Business Education Job and Earnings Health
201
Digital broadcasting has completely changed the way we experience television and radio. Cinema can now be found at the comfort of your home through application such as Netflix, iFlix, etc. We get entertained by the content that we see in Facebook, YouTube, and Instagram. Computer gaming has also been an important influence in the development of graphical interfaces. We can now listen to music and podcast using Spotify.
Entertainment
202
ICT helps to increase productivity in business with the use of social Media platforms for marketing and promotion. The use of websites now allowed companies to develop new and cheaper ways of offering customers with opportunities of buying goods and services at their convenient time and enhance the level of customer service. Online platform has been the marketplace where people can transact and communicate.
Business
203
With the help of multimedia, it enhances effectiveness of teaching-learning and hence proves crucial for early learners, slow learners and differently abled learners. Modern ICT tools not only deliver the content but also replicate formal learning experience via virtual learning. The intention of virtual classrooms is to extend the structure and services that accompany formal education programs from the physical environment to learners ICT also addresses the need of mobile learning. It makes education accessible to all, irrespective of geographical barriers or resource constraints. Learners from remote areas, working people who want to learn further and update their knowledge and differently abled students who find travelling an issue of concern - benefit from the mobile learning mode. Digital resources in classrooms can help prepare students for a digital society and economy.
Education
204
Digitalization yields opportunities by creating employment in new and existing industries, with greater job-to-job mobility facilitated by online job search tools. The digital economy also fundamentally changes the nature of work for many people, with fewer jobs exerting physical demands on workers but more jobs placing an emotional strain on desk-workers. New jobs in ICT and in other sectors become available. Teleworking (Work from Home) allows people to save time and combine their work and personal lives.
Job and Earnings
205
Health risks associated with the digital transformations include mental health problems associated with the extreme use of digital technologies, especially among children and teenagers and the crowding out of other activities such as physical exercise. Health-care delivery is also affected by new digital technologies, such as electronic records, new treatment options, telecare, and teleconsultation. Extreme use of digital technologies may have negative mental health effects. The effects of mobile phones, video games, and the pervasiveness of ubiquitous screens on the mental health of children and teenagers have drawn significant attention in the public debate because they may present risks of addiction. Extreme Internet use, defined as children who spend more than 6 hours on the Internet outside of school, is becoming more common among children and teenagers.
Health
206
Theory which strongly believes that technology shapes the culture, values, and social structures of a society.
Theory Determinism
207
Technological innovation is the cause of the social progress.
Theory Determinism
208
The technology has the control over the society --- over human actions, culture and values.
Theory Determinism
209
Society is changing because of technology.
Theory Determinism
210
It is the opposite of the Technological Determinism.
Social Constructivism
210
Our curiosity, the hunger to expand, and the need to do things efficiently drive us to create these technologies.
Social Constructivism
211
It believes that humans play a main role in shaping technology rather than technology shaping society.
Social Constructivism
212
It means the technical knowledge used in the production of capital and machinery.
Technological Change
213
The various changes in technology lead to an increase in the productivity of labor, capital and other production factors.
Technological Change
214
Technological progress comprises of creation of skill, new means of production, new uses of raw materials and the widespread use of machinery.