WEB 2.0 READ/WRITE WEB Eidson. WORLD WIDE WEB  Sir Tim Berners-Lee  World Wide Web Inventor-1989  Web 2.0 – The Read/Write Web.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

ICT Workshop Departmental-use Dr. Hoda Baytiyeh-Naja The American University of Beirut.
BlueRedGreenPurpleOrange.
TOPIC LEARNING BTEC Level 3 Unit 28 Websites L01- All students will understand the web architecture and components which allow the internet and websites.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Web 2.0 The Read/Write Web. History Tim Berners-Lee: World Wide Web 1989 Dream of sharing information back and forth Mosaic Web browser in 1993 Writing.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Moodle, Blogs, Wikis and More Exploring Web 2.0 Tools: The 2nd Generation of the World Wide Web.
What is Web 2.0? Communication, Collaboration & Community.
Blogs defined From Wikipedia A blog is a website in which journal entries are.
Web 2.0 Web 2.0 is the term given to describe a second generation of the World Wide Web (WWW) that is focused on the ability for people to collaborate.
Nasca Internet Networking and Security viruses.
Internet Medias Dana Tiedemann. Podcasts  A podcast is a digital media file, or a series of such files, that is distributed over the Internet using syndication.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses & Destructive Programs
Blogs. Short for Weblog Blogs are simple web pages often made up short, informal and frequently updated posts.
Creating a Blog Blog Terms Mini-Glossary. Blog Blogger “A specific type of website where the author publishes his thoughts, ideas or knowledge about different.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Wikis and Blogs: Applications for Educational Environments Nina McHale Assistant Professor/Web Librarian Auraria Library.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
The Internet and World Wide Web.  Understand how the Internet evolved  Describe common Internet communication methods and activities  Setting up your.
NETS Stands for National Educational Technology Standards and are the standards for learning, teaching and leading in the digital age.
Unit 19 INTERNET SECURITY
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Wikipedia Social Media: Wiki Don Rood EDT What is Wikipedia? How is this social media used? Who are using wiki’s and why? Purpose/Outline: 2.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
1 Malware, Adware, Spyware, Viruses, BHO. 2 Malware A generic term increasingly being used to describe any form of malicious software like viruses, trojan.
Viruses & Destructive Programs
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Web 2.0 Tools Used in the Finance/Investment Management Industry.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Podcasts, Blogs, Wiki, & RSS Shacara Hilton CSC101 March 2006.
Web 2.0 Pragith Prakash Vikram Singh By The Era of.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
CHAPTER 1 THE READ/WRITE WEB Marquita Friend Resa Garvin October 17, 2012 EDUC 303.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Objective:  The main objective of this slide show is to inform viewers of: Web 2.0 The uses of Web 2.0 Educational Trend of Web 2.0.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Blogging (RSS & the Read/Write Web) Darrel Branson ICT Educator Sunraysia Mallee Schools Network
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Common Terms in the Internet Adnan Iqbal MCS-MIT-WD-A+ The College of Law.
Malicious Software.
Objective:  The main objective of this slide show is to inform viewers of: Web 2.0 The uses of Web 2.0 Educational Trend of Web 2.0.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Cyber Security By:Jerusa Miller July 7, What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet.
Using Wikis in Education An introduction to the use of wikis as a collaborative content development tool for learning.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Web 2.0 is the second generation of Internet-based services that emphasize online collaboration and sharing among users.
1 3 Computing System Fundamentals 3.7 Utility Software.
WIKI The 21 st Century Classroom Communication Resource William R. Clements Grand Canyon University TEC-537 Strategies & Integration of Productivity Software.
CREATE, IMPLEMENT AND ENJOY! Blogs,Wikis & RSS Readers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Comparing Internet Medias Sean Finucane CSC 101. Podcast A podcast is a digital media file that is shared over the web using syndication feeds, for playback.
November 4 th 2013 Use of social media tools in teaching, collaboration and engagement 1 Prepared by Geofrey KalumunaSupervised by Nkuba Mabula Topic:
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Online Communications This is about different ways that people & businesses communicate online You will already be very familar with most ways.
 GEETHA P.  Originally coined by Tim O’Reilly Publishing Media  Second generation of services available on www.  Lets people collaborate and share.
War between Good and Evil.
Internet LINGO.
How to Get Rid of Online Threats Impacting your Computer Device?
Web 2.0 Creating Content.
King Saud University- College OF Applied Studies
King Saud University- College OF Applied Studies
CYBERSAFETY & Personal information
Presentation transcript:

WEB 2.0 READ/WRITE WEB Eidson

WORLD WIDE WEB  Sir Tim Berners-Lee  World Wide Web Inventor-1989  Web 2.0 – The Read/Write Web

BLOGS  Coined phrase in 1997  Short for Weblogs  Bloggers are people who blog  Google has a free one – Blogger 

BLOGGER  Leading blogging site is Blogger  6.7 million people blog  Majority of bloggers are women  Business uses them to get customers  14% earn a living by blogging 

BLOG CHARACTERISTICS Easily created Easily updated by author Web site that contains dated text entries in reverse chronological order (newest entry first) about a particular topic

WIKIS  A collaborative Webspace where anyone can add content and anyone can edit it.  Wikipedia (online encyclopedia)  Wikispaces (free resource) 

SOCIAL MEDIA SITES Online communities of people who share interests and/or activities or want to share information Younger people use social networking sites more

MALWARE  Definition  A term that describes a group of malicious software programs intended to annoy you or destroy your data  Examples: worms, viruses, Trojan horses, spyware

TROJAN HORSE  A destructive program that pretends to be a safe application, but tries to steal your information.  It does not replicate (reproduce itself).

VIRUS  A program that is loaded on your computer, without your knowledge, and tries to damage your computer.  Typically uses all your memory by replicating itself.

WORM  A program that replicates itself over a computer network and performs malicious actions.  A type of virus.  Cannot reproduce itself.

SPYWARE  Software that secretly gathers user information through your Internet connection without your knowledge.  Is usually downloaded as part of freeware or shareware.

SUMMARY  Web 2.0 has many great tools:  Blogs  Wikis  Social Networking Sites  Malware  Trojan Horse  Virus  Worm  Spyware

REFERENCES Carvin, A. (2005, February 1). Tim Berners-Lee: Weaving a semantic web. Retrieved March 2, 2009, from