2. F. W3C only sets standards.
4. F. 1GB has 1 billion characters.
7. F. There are considerably more mobile apps than web apps.
8. F. Search engine is the software that finds information related to a specific topic.
11. F. Tethering is the process of using your cell phone as a modem, or “hotspot” that provides Internet access for Wi-Fi usage devices.
12. F. Remove the cookies after finish browing to protect yourself online.
1. Catfishing – c
2. Chat – a
3. Curation website - i
4. Cyberbullying – e
5. Domain name – h
6. Internet backbone – b
7. Tag – d
8. Tethering – g
9. Web serve – j
10. Wiki - f
Cyberbullying message: if I happen to receive an email message that has bullying content, I would just either delete it, or putting in the spam folder. Also consider blocking the sender of the message.
Unsolicited friend request: if I have concluded that I do not know the person at all, I would either just ignore the request, or maybe consider deleting the request. If the person happens to keep sending me the friend request after I have deleted it, I would consider blocking that person from reaching me on Facebook.
Unexpected search engine: most browsers these days do not automatically switches the search engine without the user’s modification, unless there is a malware that is causing the problem. Therefore it is possible that your device is infected and you should attempt to scan for it.
Social media password: social media is likely to offer you the “Forgot Password?” option right below the log in credentials. You can just choose the option and I would send an email an access code that would enable you to create a new password and re-access the account.
Suspicious web site visits: most of the time a company would require you to require a work account to access the Wi-Fi. Most IT departments should have visibility on the Wi-Fi users and would be able to determine what websites you visit and how often. However, if you know for sure that you do not browse non work-related websites like they claim, there might be a possibility that your work account is being accessed by a third party. I would suggest you go talk to the IT department about the issue.
Research – Cloud Services
Documents being share with accessibility to edit simultaneously offers flexibility and real-time decision making, potentially reduces the time require for peer-review documentation or group work on a project. Sending files through email does not have this real-time feature, and would take a significant amount of time to complete the peer-editing process.
Office Online/Google Drive requires only your web browser and internet connection to access, and you are not required to conduct an installation. With Drive/Office Online, you only need to sign in to be able to access all the features such as Slides, Docs, Word…and they offer online real-time file sharing, as opposed to the native Office installed on my computer.