Sei sulla pagina 1di 18

Salanguste, Niña Rica BSMA 2-10

1. Types of Internet Users


2. Web 1.0, Web 2.0, and Web 3.0 features and differences:

Web 1.0

Web 1.0 refers to the first stage of the World Wide Web evolution. Earlier, there were only few

content creators in Web 1.0 with the huge majority of users who are consumers of content.

Personal web pages were common, consisting mainly of static pages hosted on ISP-run web

servers, or on free web hosting services.

In Web 1.0 advertisements on websites while surfing the internet is banned. Also, in Web 1.0,

Ofoto is an online digital photography website, on which user could store, share, view and print

digital pictures. Web 1.0 is a content delivery network (CDN) which enables to showcase the

piece of information on the websites. It can be used as personal websites. It costs to user as per

pages viewed. It has directories which enable user to retrieve a particular piece of information.

Four design essentials of a Web 1.0 site include:

 Static pages.

 Content is served from the server’s file-system.

 Pages built using Server Side Includes or Common Gateway Interface (CGI).

 Frames and Tables used to position and align the elements on a page.

Web 2.0

Web 2.0 refers to world wide website which highlight user-generated content, usability and

interoperability for end users. Web 2.0 is also called participative social web. It does not refer to
a modification to any technical specification, but to modify in the way Web pages are designed

and used. The transition is beneficial but it does not seem that when the changes are occurred.

An interaction and collaboration with each other is allowed by Web 2.0 in a social media

dialogue as creator of user-generated content in a virtual community. Web 1.0 is enhanced

version of Web 2.0.

The web browser technologies are used in Web 2.0 development and it includes AJAX and

JavaScript frameworks. Recently, AJAX and JavaScript frameworks have become a very popular

means of creating web 2.0 sites.

Five major features of Web 2.0

 Free sorting of information, permits users to retrieve and classify the information

collectively.

 Dynamic content that is responsive to user input.

 Information flows between site owner and site users by means of evaluation & online

commenting.

 Developed APIs to allow self-usage, such as by a software application.

 Web access leads to concern different, from the traditional Internet user base to a wider

variety of users.

Usage of Web 2.0

The social Web contains a number of online tools and platforms where people share their

perspectives, opinions, thoughts and experiences. Web 2.0 applications tend to interact much

more with the end user. As such, the end user is not only a user of the application but also a

participant by these 8 tools mentioned below:


 Podcasting  Social bookmarking

 Blogging  Social networking

 Tagging  Social media

 Curating with RSS  Web content voting

Web 3.0

It refers the evolution of web utilization and interaction which includes altering the Web into a

database. In enables the upgradation of back-end of the web, after a long time of focus on the

front-end (Web 2.0 has mainly been about AJAX, tagging, and another front-end user-experience

innovation). Web 3.0 is a term which is used to describe many evolutions of web usage and

interaction among several paths. In this, data isn’t owned but instead shared, where services

show different views for the same web / the same data.

The Semantic Web (3.0) promises to establish “the world’s information” in more reasonable way

than Google can ever attain with their existing engine schema. This is particularly true from the

perspective of machine conception as opposed to human understanding. The Semantic Web

necessitates the use of a declarative ontological language like OWL to produce domain-specific

ontologies that machines can use to reason about information and make new conclusions, not

simply match keywords.

Problems with Web 3.0

1. Compatibility - HTML(Hypertext Markup Language) files and current web browsers

could not support Web 3.0


2. Security - The users security is also in question since the machine is saving his or her

preferences.

3. Vastness - The World Wide Web already contains billions of web pages.

4. Vagueness - Certain words are imprecise. The words "old" and "small" would depend on

the user.

5. Logic - Since machines use logic, there are certain limitations for a computer to be able

to predict what the user is referring to at a given time.

Semantic Web

The Semantic Web is a mesh of data that are associated in such a way that they can easily be

processed by machines instead of human operators. It can be conceived as an extended version of

the existing World Wide Web, and it represents an effective means of data representation in the

form of a globally linked database. By supporting the inclusion of semantic content in Web

pages, the Semantic Web targets the conversion of the presently available Web of unstructured

documents to a Web of information/data.

The term Semantic Web was coined by Tim Berners-Lee.

The Semantic Web is driven by the World Wide Web Consortium (W3C). It builds on W3C's

Resource Description Framework (RDF), and is usually designed with syntaxes that use Uniform

Resource Identifiers (URIs) to represent data. These syntaxes are known as RDF syntaxes. The

inclusion of data to RDF files enables computer programs or Web spiders to search, discover,

collect, assess and process the data on the Web.

The key goal of the Semantic Web is to trigger the evolution of the existing Web to enable users

to search, discover, share and join information with less effort. Humans can use the Web to
execute multiple tasks, such as booking online tickets, searching for different information, using

online dictionaries, etc. Even so, machines are not able to carry out any of these tasks without

human intervention because Web pages are made to be read by humans, not machines. The

Semantic Web can be considered a vision for the future in which data could be quickly

interpreted by machines, allowing them to carry out numerous tedious tasks related to

discovering, blending, and taking action on the information available on the Web.

The Semantic Web is a process that allows machines to quickly understand and react to

complicated human requests subject to their meaning. This kind of understanding mandates that

the appropriate information sources are semantically structured, which is a difficult task.

WEB 1.0 WEB 2.0 WEB 3.0

It is the “readable” phrase of It is the “writable” phrase of It is the “executable” phrase of

the World Wide Web with flat the World Wide Web with Word Wide Web with

data. In Web 1.0, there is only interactive data. Unlike Web dynamic applications,

limited interaction between 1.0, Web 2.0 facilitates interactive services, and

sites and web users. Web 1.0 interaction between web users “machine-to-machine”

is simply an information portal and sites, so it allows users to interaction. Web 3.0 is a

where users passively receive interact more freely with each semantic web which refers to

information without being other. Web 2.0 encourages the future. In Web 3.0,

given the opportunity to post participation, collaboration, computers can interpret


reviews, comments, and and information sharing. information like humans and

feedback. Examples of Web 2.0 intelligently generate and

applications are Youtube, distribute useful content

Wiki, Flickr, Facebook, and so tailored to the needs of users.

on. One example of Web 3.0

is Tivo, a digital video

recorder. Its recording

program can search the web

and read what it finds to you

based on your preferences.

3. Define the following:

 Convergent Technology - is a tendency for technologies that were originally quite

unrelated to become more closely integrated and even unified as they develop

and advance. The concept is roughly analogous to convergent evolution in biological

systems, such that (for example) the ancestors of whales became progressively more like

fish in outward form and function, despite not being fish and not coming from a fish

lineage. In technological convergence, a cardinal example to convey the concept is

that telephones, television, and computers began as separate and mostly unrelated

technologies but have converged in many ways into interrelated parts of a


telecommunication and media industry underpinned by common elements of digital

electronics and software.

 Mobile Social Network - A mobile social network is a social network where people with

common interests meet and converse using a mobile phone or a tablet. It is similar to

Web-based social networks and also makes use of virtual communities, with the

difference being in the device used. Mobile social networks make use of mobile

messaging applications and are considered one of the best ways for providing a smoother

user interaction and also for engaging users.

 Assistive Media - Assistive Media is the Internet's first audio solution for persons with

print reading/access barriers. The audio recordings of the literary works produced by

Assistive Media are now easily accessible, on-demand, to the ever growing number of

persons with disabilities who now use the Internet. Assistive Media has opened a unique

avenue of accessibility for many individuals with cognitive, physical, and communication

disabilities. Used in a variety of environmental settings (home, school, community, work

place), Assistive Media provides a solution that allows individuals with disabilities access

to literary materials which provide independence and integration into the mainstream of

society and community life. Assistive Media seeks to offer material that is immediate yet

timeless, energetic and thoughtful, serious and funny. Assistive Media's very simple goal

is to offer accessibility to good writing, a point of view, and a deeper understanding of

people, communities, and cultures through the highest standards of nonprofit service.

Based in Ann Arbor Michigan-USA, Assistive Media was founded in 1996 as a nonprofit

producer and provider of audiocassette-based literary works to libraries for the blind and

physically handicapped.
4. Define the following:

 Online Systems– are online versions of information systems, which is “the process of

and tools for storing, managing, using, and gathering of data and communications in an

organization. An example of information systems are tools for sending out

communications and storing files in a business.”

 Online Function - Online functions include email notifications from our server

(emails using another server are not included), the updating of web blacklists (lists

of undesirable websites), updating of the list of file-sharing programs (prohibited

programs page), and remote access to Child Control through the Internet. Free

program updates are also included.

 Online Platform – A platform is a group of technologies that are used as a base upon

which other applications, processes, or technologies are developed. A platform involves

an operating system, the computer system's coordinating program, which in turn is built

on the instruction set for a processor or microprocessor, the hardware that performs logic

operations and manages data movement in the computer. The operating system must be

designed to work with the particular processor's set of instructions.

5. Dangers of the Internet

 Cyberbullying - Cyberbullying is the most common threat that you may face while using

the internet, especially on Social Networking sites. On these sites spreading false rumors

about someone is relatively very easy. Also, people can post anonymous posts about

someone on various sites without revealing their own identity. Cyberbullies send
insulting and hateful messages to their target, spread lies about them and posts nasty

comments on social networks making the bullied unable to face the society.

 Online Predators - Apart from cyberbullying, the threat of cyber or online predators is

very immanent on social network or gaming sites. Sexual harassment or abuse is very

common where people stalk kids and take advantage of their innocence and make them

indulge in illicit and dangerous behavior on and offline.

 Theft of personal information - Everything that you post on social networks is

permanent and unlike a letter it can’t be torn or burned. Today’s youth don’t understand

the damage a random picture or post they uploaded on social networks can affect their

life in future. Also if your social account is hacked, the hacker can know all your personal

information and harass you. If your bank or credit card details get leaked, you can suffer

extensive damage.

 Pornography and other inappropriate content - Internet is filled with adult and

inappropriate content that can steal the innocence and morality of your children. You can

find links to adult websites on social media and other sites that your children may like to

visit. An accidental click on these links can take them on a trip to the filthy and grotesque

world of pornography.

 Phishing - Tricking people into clicking malicious and dangerous links are called

Phishing. Cybercriminals can use this technique to gather personal information about a

person and later blackmailing them into doing something illegal or demand money from

them.
6. Window Security

The Internet offers access just to about any type of information imaginable. The

Net also enables you to shop, play, learn, stay abreast of news and current events and

keep in contact with friends and loved ones. With all the benefits the Web offers, though,

it is also a breeding ground for criminals, hackers and other unscrupulous persons looking

to steal information for their own illegal purposes. Consequently, the Internet poses as

many risks for users as it does benefits.

While security risks on the Internet are real, there are things you can do to protect

yourself and your computer online. Of course, simple things such as installing anti-

virus/malware software and avoiding illegal or illicit websites help a great deal. However,

to ensure that your data and identity remain private while online, you must also take steps

to secure Windows from outsiders or intruders. Fortunately, securing your Windows

operating system is not too difficult and requires relatively little effort.

7. Ten Commandments Of Computer Ethics (Dr. Ramon C. Barquin)

Rule #1: Thou shalt not use a computer to harm other people.

You should not program a computer to do dangerous things to people. For example, to

program a robot to kill people, make viruses, or weapons of mass destruction. What this

means is that computers are not an excuse to do bad things to people. The programmer is

responsible for the actions of his programs.

Rule #2: Thou shalt not interfere with other people's computer work.

Everyone has the right to use computers. Likewise creating a computer virus is wrong
because it wastes people’s time and money and destroys potentially valuable property. As

the hippies used to say: “Live and let live!”

Rule #3: Thou shalt not snoop around in other people's computer files:

It is illegal to open and read someone's real physical mail, and it is also illegal to snoop

on network connections and read someones email, passwords, files, databases, etc.

Rule #4) Thou shalt not use a computer to steal.

This one is obvious. Stealing is just as bad with a computer or without one. Use your IT

powers for good!

Rule #5: Thou shalt not use a computer to bear false witness.

This commandment means that you shouldn’t use a computer to create false facts. For

instance, photoshopping a picture to make an innocent man look guilty. Perhaps another

equally important commandment should be, “Don’t believe everything you see on the

Internet”. Just like in traditional media, it is a common practice to spread half-truths,

exaggerations, lies, and rumors on the Internet. This is wrong.

Rule #6: Thou shalt not copy or use proprietary software for which you have not

paid.

Think about how hard it is to write good software. Think about all the people and costs

involved. You have two choices: 1) buy a license or 2) find an open source alternative.

Using pirated software not only unethical it is dangerous because of hidden malware.

Rule #7: Thou shalt not use other people's computer resources. without

authorization or proper compensation.

Is it ethical to use a neighbor’s lawn mower or mixer without telling them? How about
their Internet connection? No it isn’t! Is it legal or ethical to do bad things on a computer

while logged in as someone else? No it isn’t! Don’t do it!

Rule #8: Thou shalt not appropriate other people's intellectual output.

If you copy text or images from a website and post them on your own website it is a

crime in most countries, and definitely not ethical. Why? You are causing irreparable

damage to the creator of the content. Why not ‘get a life’ and create your own unique and

original content? You will be much happier in the long run creating new things rather

than stealing from other people.

Rule #9) Thou shalt think about the social consequences of the program you are

writing or the system you are designing.

Do you write software that helps people to steal, kill, spy, gamble, or spread

pornography? Please ask yourself why. Is there a way you can use your IT talents for

good purposes? Wouldn’t the world be a better place if everyone was engaged in positive

behavior instead of negative behavior? Think about it!

10) Thou shalt always use a computer in ways that ensure consideration and respect

for your fellow humans.

Things that you do ‘online’ can have real effects in your ‘offline’ life as well. Perhaps

Mark Zuckerberg, the founder of Facebook, said it best, “Having two identities for

yourself is an example of a lack of integrity."


Online Research: Advantages And Disadvantages

What are the advantages of doing internet research?

 Ability to obtain a large sample, which increases statistical power

 Ability to obtain a more diverse sample than in traditional university-based research

 Prevents experimenter demand effects (with no interaction with the experimenter, no

"experimenter expectancy" effect)

 Data is automatically coded so no data entry errors

 Can sample individuals beyond your schools subject pool

 Reduced cost of conducting research

What are the disadvantages of doing internet research? (and tips to overcome them)

 Some subjects may try to participant in the same study more than once

- To overcome this problem, you can ask for the email addresses of each

participant, and then look for duplicates.

- Since nowadays its easy for people to create multiple email addresses, you can

also ask for name and/or address of each subject. Sometimes researchers will have

a "lottery" as incentive to participate (e.g., $100 lottery prize for each 400

participants), so asking for name/address is necessary to award the lottery check.

- You can also collect the IP address of each participant and look for duplicates.

One issue here is that sometimes DSL providers give the same IP address to

multiple people.

 Some subjects may drop out of the study before finishing


- In traditional laboratory-based research its unusual for a subject to walk out of a

study, but online a subject can get distracted or simply lose interest and end the

study. Sometimes researchers will have a "lottery" as incentive to have the subject

participate in the study, but with any type of monetary incentive IRB's typically

require a statement in the consent form saying something to the effect of "you

may discontinue participation at any time without any consequences or losing

your entry in the lottery."

- Since a certain number of online subjects wont finish the study, you can

overcollect the number of subjects you think you need to offset the number of

subjects who dont finish the study, usually around 10-20%.

 Some subjects may stop the study and then continue minutes/hours later

- The problem here is that some studies involve manipulations which may lose

power if there is a time lag between the manipulation and measures in the study.

One advantage of online studies is that you can record how long the subject is

taking part in the study, so you can identify the average length of time of your

study, and also identify those subjects who take an extrordinary long amount of

time to finish the study.

 Some subjects may rush through the study

- Since you can record how long each subject is participating in the study, you can

identify those subjects who may have rushed through the study.

8. Research Skills: Strengths And Weaknesses

What are research skills?

In a nutshell, research skills help us find answers to questions. Research skills are the ability
to search for, find, collect, analyse, interpret and evaluate information that is relevant to the

subject being studied.Research shapes the future, it teaches us new things and helps us adapt

and evolve. Without research, we wouldn’t have cars, smartphones or the internet (or this

website for that matter!)

The internet is a huge part of our lives. Using search engines (like Google) is a way of

researching. Whether you’re finding cheap flights or a top restaurant, it’s all research!

Why are research skills important?

Employers love research skills. Research is an important part of business because it helps

companies:

 Report writing

 Keep an eye on their competitors

 Develop new products

 Identify what customers want

 Get better at what they do

 Keep up with changing technologies

How can you gain research skills?

You can research using tools and methods like:

 The internet  Surveys  Articles

 Books  Journal  Studies

 Interviews  Experiments
BIBLIOGRAPHY

 WittyCookie. (2012, June 05). What are the major differences among Web 1.0, 2.0 and 3.0?

Retrieved July 22, 2019, from https://wittycookie.wordpress.com/2012/06/04/what-are-the-

major-differences-among-web-1-0-2-0-and-3-0/

 Web 1.0, Web 2.0 and Web 3.0 with their difference. (2018, September 24). Retrieved from

https://www.geeksforgeeks.org/web-1-0-web-2-0-and-web-3-0-with-their-difference/

 What is Semantic Web? - Definition from Techopedia. (n.d.). Retrieved July 22, 2019, from

https://www.techopedia.com/definition/27961/semantic-web

 What is technological convergence? - Definition from WhatIs.com. (n.d.). Retrieved July 22,

2019, from https://searchconvergedinfrastructure.techtarget.com/definition/convergence

 (n.d.). Retrieved July 22, 2019, from http://www.ideafinder.com/guest/madlist/amd-

assistive.htm

 (n.d.). Retrieved July 22, 2019, from https://www.spyzie.com/monitor/top-5-dangers-of-

using-the-internet.html

 G1galileoetech. (2017, October 17). ONLINE SYSTEMS, FUNCTIONS, AND

PLATFORMS. Retrieved July 22, 2019, from

https://g1galileoetech.wordpress.com/2017/09/01/online-systems-functions-and-platforms

 Windows Security - What are the security risks and vulnerabilities of Microsoft Windows.

(n.d.). Retrieved July 22, 2019, from https://www.allaboutcookies.org/security/windows-

security.html
 Unit 22 Reading Activity. (n.d.). Retrieved July 22, 2019, from

https://www.english4it.com/unit/22/reading

 What are the advantages/disadvantages of doing internet research? (n.d.). Retrieved July 22,

2019, from

http://www.psychwiki.com/wiki/What_are_the_advantages/disadvantages_of_doing_internet

_research?

 TheBigChoice.com, The student and graduate job site. (n.d.). Retrieved July 22, 2019, from

https://www.thebigchoice.com/graduate-jobs/careers-advice/research-skills

Potrebbero piacerti anche