Social Media
Online services that facilitate communication and interaction among people who want to share information about their lives, issues, and events using a multimedia mix of text, pictures, video, and audio
Social Media Honeycomb
Provides a visual model for classifying and comparing various social media services
1/105
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Social Media
Online services that facilitate communication and interaction among people who want to share information about their lives, issues, and events using a multimedia mix of text, pictures, video, and audio
Social Media Honeycomb
Provides a visual model for classifying and comparing various social media services
4 groups of social media
1. Social Networking
Ex. Facebook
2. Geosocial networking
Ex. Google Maps
3. Content communities
Ex. Youtube, Instagram
4. Online communities
Ex. Snapchat, Tumblr
Online Identity
A persons presence on a social media service
Social Media Profile
the set of information provided to friends, contacts, and the public
Geosocial Networking
Provides a platform for users to carry out interactions based on their current locations
Social Discovery
uses geolocation to meet with people who are nearby and have similar interests
Crowdsourcing
When individuals contribute computer time, expertise, opinions, or money to a defined project
4 ways the location of a device can be determined
1. GPS trilateration
2. Cell tower triangulation
3. Hotspot triangulation
4. IP address lookup
Content Community
Focus on text-based information, or their focus may be on other media, such as photos, music, or video
Metadata Tag
A keyword that describes information, such as the content of a media element
Formal Tagging
Add information to a tag according to a set of tagging standards
Intellectual Property
All of the creations that materialize from the mind or intellect
Trademark
any word, name, symbol, or design used in commerce to identify and distinguish the goods of one company from those of another
Copyleft
designed to make a work freely available for distribution and modification under the condition that all derivative works use the same license
Fair use and 4 factors
- Allows for the limited use of copyrighted material without obtaining permission from the copyright holder
1. The purpose and character of the use
2. The nature of the copyrighted work
3. The amount of the copyrighted work that is used
4. The effect on the value of the copyrighted work
Blog
similar to an online diary; it is maintained by a person, company, or an organization, and it contains a series of entries on one or more topics
RSS reader and blog aggregator
a "feed" that monitors your favorite blogs, collects the latest posts, and displays them
Microblogs
a short blog post
Ex. A tweet
Wiki
a collaborative web application that provides tools that enable contributors to post, read, and modify content
Email Message
electronic document transmitted over a computer network
Email server
a computer that essentially acts as a control post office for a group of people
Standard Format of email messages
consists of a message header and the message body
Store-and-forward technique
When you use local email, an internet based email server stores your incoming messages until you launch your email client and get your mail
Instant Messaging
a synchronous, real-time technology for two or more people to type messages back and forth while online
Online Identities
Nearly 40% of all online identities are fake
Sockpuppets
any online identity created and used for purposes of deception
Online Reputation
impression that is generated by an online persona
Doppelgangers
2 or more online personas with the same name or username
Privacy
the right to be left alone
Executable File
Contains a computer program that is carried out step-by-step within the microprocessor
System requirements
specify the operating system and minimum hardware capacities necessary for a software product to work correctly
Software Upgrade
When a new version or edition of a software product is released
Software Update
a small section of program code that replaces part of the software currently installed
Service Pack
refers to a set of updates
Software pricing models
1. One-time purchase: the software remains the same as when it was purchased
2. Subscription: consumers pay an annual fee to use software
3. Trial: consumers use a software product during a free trial period
4. Freemium: provides free use of a stripped down or basic version of the product but requires payment for upgrades
Software License
a legal contract that defines the ways in which a computer program may be used
Operating system
gives your digital device a personality
Operating system categories
Desktop, mobile, server
Kernel
provides the essential operating system services, such as memory management and file access
Resource
refers to any component that is required to perform work
Multitasking
provides process and memory management services that allow 2 or more tasks to run simultaneously
Multithreading
allows multiple commands, or threads to run simultaneously
Multiprocessing
a capability that supports a division of labor among all the processing units
Memory leak
an application requests memory but never releases it
Buffers
collect and hold data while the device is busy with other tasks
Microsoft Windows
Installed on more than 80% of worlds PC's
Limitations of iOS
-Limits selection of apps to those provided by the app store
-Background processes, such as music, voice calls, and notifications, provide very limited multitasking capabilities
Android
mobile operating system that is a popular platform for tablet computers, smartphones, and ebook readers
Thin Client
depends substantially on processing and storage provided by a remote computer
Virtual machines
allows one computer to simulate the hardware and software of another
Web Apps
software that is accessed with a web browser
Examples of Web Apps
Popular web apps include: Gmail and google docs
Allow several people to collaborate on projects
Mobile Apps
designed for a handheld device such as a smartphone, tablet computer, or enhanced media player
Jailbreak
an unauthorized change to the devices software
Rooting
the process off making unauthorized modifications to any mobile device
Local Applications
installed on a computers hard disk
Ex. office suites, games, and professional software tools
Portable Software
designed for PC's and it runs from removable storage, such as a USB flash drive
Office Suite
collection of programs that typically include word processing, spreadsheet, and presentation modules
Spreadsheet
uses rows and columns of numbers to create a model or representation of a real situation
Automatic recalculation
when you change the contents of any cell in a worksheet, all the formulas are recalculated
Database
simply a collection of data that may be stored on one or more digital devices
Record
holds data for a single entity
Field
holds one item of data relevant to a record
Presentation Software
supplies tools for combining text, photos, clip art, graphs, animations, ad sound into a series of electronic slides that can be shown on a screen or projector
EX. Powerpoint
Computer File
a named collection of data that exists on a storage medium, such as a hard disk, cloud drive or USB flash drive
Device letter
storage devices where files can be saved
directory
contains a list of files
root directory
the main directory
file path
a computer file's location
File management utilities
File organization tools
Default application
software application associated with a specific file type
Ways of manipulating files and folders
1. Rename
2. Copy
3. Move
4. Delete
Encryption
transforms a message or data file in such a way that its contents are hidden from unauthorized readers
Authentication Protocols
Passwords, PINs, and fingerprint scanners
Brute force attack
uses password cracking software to generate every possible combination of letters, numerals, and symbols
Dictionary attack
helps hackers guess your password by stepping through a dictionary containing word lists in common languages
Password Manager
stores user IDs with their corresponding passwords
Malware
refers to any computer program designed to surreptitiously enter a digital device
Common classifications of malware
Viruses, worms, trojans
Computer virus
a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device
Code injection
the process of modifying an executable file or data stream by adding additional commands
Side-loading
an app from a source other than an official app store is installed on a device
Rootkit
Any code that is designed to hide the existence of processes and privileges
Computer Worms
self-replicating, self-distributing program designed to carry out an unauthorized activity on a victim's device
Trojan
computer program that seems to perform one function while actually doing something else
Dropper
designed to drop a malicious code into a device
Antivirus software
type of utility software that looks for and eliminates viruses, trojans, worms, and other malware
Online intrusion
takes place when an unauthorized person gains access to a digital device by using an internet connection and exploiting vulnerabilities in hardware or software
different types of intrusions
RATs, Ransomware, Botnets, Backdoor, DDoS
Zero-day attack
exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code
Netstat
produces a detailed list of open ports on a device
Firewall
a device or software that is designed to block unauthorized access while allowing authorized communications
Personal firewall
a set of rules to block data or allow it to enter a digital device
Spyware
any software that secretly gathers personal information without the victim's knowledge
Adware
monitors web-browsing activity to supply ad-serving sites with data used to generate targeted ads
Evil twins
a LAN server that is designed to look like a legitimate Wi-fi hotspot
Spam
defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems
Phishing
an email scam that masquerades as a message from a legitimate company or agency of authority; goal is to obtain private information
Pharming
redirects website traffic to fraudulent websites that distribute malware and collect personal data