Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Web 1.0
Web 1.0 refers to the first stage of the World Wide Web evolution. Earlier, there were only few
content creators in Web 1.0 with the huge majority of users who are consumers of content.
Personal web pages were common, consisting mainly of static pages hosted on ISP-run web
In Web 1.0 advertisements on websites while surfing the internet is banned. Also, in Web 1.0,
Ofoto is an online digital photography website, on which user could store, share, view and print
digital pictures. Web 1.0 is a content delivery network (CDN) which enables to showcase the
piece of information on the websites. It can be used as personal websites. It costs to user as per
pages viewed. It has directories which enable user to retrieve a particular piece of information.
Static pages.
Pages built using Server Side Includes or Common Gateway Interface (CGI).
Frames and Tables used to position and align the elements on a page.
Web 2.0
Web 2.0 refers to world wide website which highlight user-generated content, usability and
interoperability for end users. Web 2.0 is also called participative social web. It does not refer to
a modification to any technical specification, but to modify in the way Web pages are designed
and used. The transition is beneficial but it does not seem that when the changes are occurred.
An interaction and collaboration with each other is allowed by Web 2.0 in a social media
The web browser technologies are used in Web 2.0 development and it includes AJAX and
JavaScript frameworks. Recently, AJAX and JavaScript frameworks have become a very popular
Free sorting of information, permits users to retrieve and classify the information
collectively.
Information flows between site owner and site users by means of evaluation & online
commenting.
Web access leads to concern different, from the traditional Internet user base to a wider
variety of users.
The social Web contains a number of online tools and platforms where people share their
perspectives, opinions, thoughts and experiences. Web 2.0 applications tend to interact much
more with the end user. As such, the end user is not only a user of the application but also a
Web 3.0
It refers the evolution of web utilization and interaction which includes altering the Web into a
database. In enables the upgradation of back-end of the web, after a long time of focus on the
front-end (Web 2.0 has mainly been about AJAX, tagging, and another front-end user-experience
innovation). Web 3.0 is a term which is used to describe many evolutions of web usage and
interaction among several paths. In this, data isn’t owned but instead shared, where services
show different views for the same web / the same data.
The Semantic Web (3.0) promises to establish “the world’s information” in more reasonable way
than Google can ever attain with their existing engine schema. This is particularly true from the
necessitates the use of a declarative ontological language like OWL to produce domain-specific
ontologies that machines can use to reason about information and make new conclusions, not
preferences.
3. Vastness - The World Wide Web already contains billions of web pages.
4. Vagueness - Certain words are imprecise. The words "old" and "small" would depend on
the user.
5. Logic - Since machines use logic, there are certain limitations for a computer to be able
Semantic Web
The Semantic Web is a mesh of data that are associated in such a way that they can easily be
the existing World Wide Web, and it represents an effective means of data representation in the
form of a globally linked database. By supporting the inclusion of semantic content in Web
pages, the Semantic Web targets the conversion of the presently available Web of unstructured
The Semantic Web is driven by the World Wide Web Consortium (W3C). It builds on W3C's
Resource Description Framework (RDF), and is usually designed with syntaxes that use Uniform
Resource Identifiers (URIs) to represent data. These syntaxes are known as RDF syntaxes. The
inclusion of data to RDF files enables computer programs or Web spiders to search, discover,
The key goal of the Semantic Web is to trigger the evolution of the existing Web to enable users
to search, discover, share and join information with less effort. Humans can use the Web to
execute multiple tasks, such as booking online tickets, searching for different information, using
online dictionaries, etc. Even so, machines are not able to carry out any of these tasks without
human intervention because Web pages are made to be read by humans, not machines. The
Semantic Web can be considered a vision for the future in which data could be quickly
interpreted by machines, allowing them to carry out numerous tedious tasks related to
discovering, blending, and taking action on the information available on the Web.
The Semantic Web is a process that allows machines to quickly understand and react to
complicated human requests subject to their meaning. This kind of understanding mandates that
the appropriate information sources are semantically structured, which is a difficult task.
the World Wide Web with flat the World Wide Web with Word Wide Web with
data. In Web 1.0, there is only interactive data. Unlike Web dynamic applications,
limited interaction between 1.0, Web 2.0 facilitates interactive services, and
sites and web users. Web 1.0 interaction between web users “machine-to-machine”
is simply an information portal and sites, so it allows users to interaction. Web 3.0 is a
where users passively receive interact more freely with each semantic web which refers to
information without being other. Web 2.0 encourages the future. In Web 3.0,
unrelated to become more closely integrated and even unified as they develop
systems, such that (for example) the ancestors of whales became progressively more like
fish in outward form and function, despite not being fish and not coming from a fish
that telephones, television, and computers began as separate and mostly unrelated
Mobile Social Network - A mobile social network is a social network where people with
common interests meet and converse using a mobile phone or a tablet. It is similar to
Web-based social networks and also makes use of virtual communities, with the
difference being in the device used. Mobile social networks make use of mobile
messaging applications and are considered one of the best ways for providing a smoother
Assistive Media - Assistive Media is the Internet's first audio solution for persons with
print reading/access barriers. The audio recordings of the literary works produced by
Assistive Media are now easily accessible, on-demand, to the ever growing number of
persons with disabilities who now use the Internet. Assistive Media has opened a unique
avenue of accessibility for many individuals with cognitive, physical, and communication
place), Assistive Media provides a solution that allows individuals with disabilities access
to literary materials which provide independence and integration into the mainstream of
society and community life. Assistive Media seeks to offer material that is immediate yet
timeless, energetic and thoughtful, serious and funny. Assistive Media's very simple goal
people, communities, and cultures through the highest standards of nonprofit service.
Based in Ann Arbor Michigan-USA, Assistive Media was founded in 1996 as a nonprofit
producer and provider of audiocassette-based literary works to libraries for the blind and
physically handicapped.
4. Define the following:
Online Systems– are online versions of information systems, which is “the process of
and tools for storing, managing, using, and gathering of data and communications in an
Online Function - Online functions include email notifications from our server
(emails using another server are not included), the updating of web blacklists (lists
programs page), and remote access to Child Control through the Internet. Free
Online Platform – A platform is a group of technologies that are used as a base upon
an operating system, the computer system's coordinating program, which in turn is built
on the instruction set for a processor or microprocessor, the hardware that performs logic
operations and manages data movement in the computer. The operating system must be
Cyberbullying - Cyberbullying is the most common threat that you may face while using
the internet, especially on Social Networking sites. On these sites spreading false rumors
about someone is relatively very easy. Also, people can post anonymous posts about
someone on various sites without revealing their own identity. Cyberbullies send
insulting and hateful messages to their target, spread lies about them and posts nasty
comments on social networks making the bullied unable to face the society.
Online Predators - Apart from cyberbullying, the threat of cyber or online predators is
very immanent on social network or gaming sites. Sexual harassment or abuse is very
common where people stalk kids and take advantage of their innocence and make them
permanent and unlike a letter it can’t be torn or burned. Today’s youth don’t understand
the damage a random picture or post they uploaded on social networks can affect their
life in future. Also if your social account is hacked, the hacker can know all your personal
information and harass you. If your bank or credit card details get leaked, you can suffer
extensive damage.
Pornography and other inappropriate content - Internet is filled with adult and
inappropriate content that can steal the innocence and morality of your children. You can
find links to adult websites on social media and other sites that your children may like to
visit. An accidental click on these links can take them on a trip to the filthy and grotesque
world of pornography.
Phishing - Tricking people into clicking malicious and dangerous links are called
Phishing. Cybercriminals can use this technique to gather personal information about a
person and later blackmailing them into doing something illegal or demand money from
them.
6. Window Security
The Internet offers access just to about any type of information imaginable. The
Net also enables you to shop, play, learn, stay abreast of news and current events and
keep in contact with friends and loved ones. With all the benefits the Web offers, though,
it is also a breeding ground for criminals, hackers and other unscrupulous persons looking
to steal information for their own illegal purposes. Consequently, the Internet poses as
While security risks on the Internet are real, there are things you can do to protect
yourself and your computer online. Of course, simple things such as installing anti-
virus/malware software and avoiding illegal or illicit websites help a great deal. However,
to ensure that your data and identity remain private while online, you must also take steps
operating system is not too difficult and requires relatively little effort.
Rule #1: Thou shalt not use a computer to harm other people.
You should not program a computer to do dangerous things to people. For example, to
program a robot to kill people, make viruses, or weapons of mass destruction. What this
means is that computers are not an excuse to do bad things to people. The programmer is
Rule #2: Thou shalt not interfere with other people's computer work.
Everyone has the right to use computers. Likewise creating a computer virus is wrong
because it wastes people’s time and money and destroys potentially valuable property. As
Rule #3: Thou shalt not snoop around in other people's computer files:
It is illegal to open and read someone's real physical mail, and it is also illegal to snoop
on network connections and read someones email, passwords, files, databases, etc.
This one is obvious. Stealing is just as bad with a computer or without one. Use your IT
Rule #5: Thou shalt not use a computer to bear false witness.
This commandment means that you shouldn’t use a computer to create false facts. For
instance, photoshopping a picture to make an innocent man look guilty. Perhaps another
equally important commandment should be, “Don’t believe everything you see on the
Rule #6: Thou shalt not copy or use proprietary software for which you have not
paid.
Think about how hard it is to write good software. Think about all the people and costs
involved. You have two choices: 1) buy a license or 2) find an open source alternative.
Using pirated software not only unethical it is dangerous because of hidden malware.
Rule #7: Thou shalt not use other people's computer resources. without
Is it ethical to use a neighbor’s lawn mower or mixer without telling them? How about
their Internet connection? No it isn’t! Is it legal or ethical to do bad things on a computer
Rule #8: Thou shalt not appropriate other people's intellectual output.
If you copy text or images from a website and post them on your own website it is a
crime in most countries, and definitely not ethical. Why? You are causing irreparable
damage to the creator of the content. Why not ‘get a life’ and create your own unique and
original content? You will be much happier in the long run creating new things rather
Rule #9) Thou shalt think about the social consequences of the program you are
Do you write software that helps people to steal, kill, spy, gamble, or spread
pornography? Please ask yourself why. Is there a way you can use your IT talents for
good purposes? Wouldn’t the world be a better place if everyone was engaged in positive
10) Thou shalt always use a computer in ways that ensure consideration and respect
Things that you do ‘online’ can have real effects in your ‘offline’ life as well. Perhaps
Mark Zuckerberg, the founder of Facebook, said it best, “Having two identities for
What are the disadvantages of doing internet research? (and tips to overcome them)
Some subjects may try to participant in the same study more than once
- To overcome this problem, you can ask for the email addresses of each
- Since nowadays its easy for people to create multiple email addresses, you can
also ask for name and/or address of each subject. Sometimes researchers will have
a "lottery" as incentive to participate (e.g., $100 lottery prize for each 400
- You can also collect the IP address of each participant and look for duplicates.
One issue here is that sometimes DSL providers give the same IP address to
multiple people.
study, but online a subject can get distracted or simply lose interest and end the
study. Sometimes researchers will have a "lottery" as incentive to have the subject
participate in the study, but with any type of monetary incentive IRB's typically
require a statement in the consent form saying something to the effect of "you
- Since a certain number of online subjects wont finish the study, you can
overcollect the number of subjects you think you need to offset the number of
Some subjects may stop the study and then continue minutes/hours later
- The problem here is that some studies involve manipulations which may lose
power if there is a time lag between the manipulation and measures in the study.
One advantage of online studies is that you can record how long the subject is
taking part in the study, so you can identify the average length of time of your
study, and also identify those subjects who take an extrordinary long amount of
- Since you can record how long each subject is participating in the study, you can
identify those subjects who may have rushed through the study.
In a nutshell, research skills help us find answers to questions. Research skills are the ability
to search for, find, collect, analyse, interpret and evaluate information that is relevant to the
subject being studied.Research shapes the future, it teaches us new things and helps us adapt
and evolve. Without research, we wouldn’t have cars, smartphones or the internet (or this
The internet is a huge part of our lives. Using search engines (like Google) is a way of
researching. Whether you’re finding cheap flights or a top restaurant, it’s all research!
Employers love research skills. Research is an important part of business because it helps
companies:
Report writing
Interviews Experiments
BIBLIOGRAPHY
WittyCookie. (2012, June 05). What are the major differences among Web 1.0, 2.0 and 3.0?
major-differences-among-web-1-0-2-0-and-3-0/
Web 1.0, Web 2.0 and Web 3.0 with their difference. (2018, September 24). Retrieved from
https://www.geeksforgeeks.org/web-1-0-web-2-0-and-web-3-0-with-their-difference/
What is Semantic Web? - Definition from Techopedia. (n.d.). Retrieved July 22, 2019, from
https://www.techopedia.com/definition/27961/semantic-web
What is technological convergence? - Definition from WhatIs.com. (n.d.). Retrieved July 22,
assistive.htm
using-the-internet.html
https://g1galileoetech.wordpress.com/2017/09/01/online-systems-functions-and-platforms
Windows Security - What are the security risks and vulnerabilities of Microsoft Windows.
security.html
Unit 22 Reading Activity. (n.d.). Retrieved July 22, 2019, from
https://www.english4it.com/unit/22/reading
What are the advantages/disadvantages of doing internet research? (n.d.). Retrieved July 22,
2019, from
http://www.psychwiki.com/wiki/What_are_the_advantages/disadvantages_of_doing_internet
_research?
TheBigChoice.com, The student and graduate job site. (n.d.). Retrieved July 22, 2019, from
https://www.thebigchoice.com/graduate-jobs/careers-advice/research-skills