Documente Academic
Documente Profesional
Documente Cultură
User Participation - The owner of the website is Media Sharing - These are sites that allow you
not the only one who is able to put content. Others to upload and share media content like images,
are able to place a content of their own by means music, and video. Examples: Flickr, Youtube,
of comment, reviews, and evaluation. Some Instagram
1|Page
Empowerment Technologies
your system do something that an attacker
Microblogging - These are sites that focus on wants it to do.
short updates from the user. Example: Twitter
TYPES OF MALWARE
Blogs and Forums - These websites allow users
to post their content. Examples: Blogger, Virus - a piece of malicious computer code that
Wordpress, and Tumblr attaches itself to a software program, email or
computer file without your permission.
Mobile Technologies - The popularity of
smartphones and tablets has taken a major rise Worm - a malicious program that transfers from
over the years. This is largely because of the one computer to another by any type of means.
devices’ capability to do tasks that were originally
found in personal computers. Trojan - a malicious program that disguised as
a useful program but once downloaded or
KINDS OF OPERATING SYTEM installed it leaves your PC unprotected and
allows hackers to get your information.
iOS – Apple devices such as iPhone & iPad
Android – Open Source OS developed by Google Spyware - a program that runs in the
Blackberry OS – used in Blackberry devices background without you knowing it and has the
Windows Phone OS – closed source and ability to monitor what you are currently doing
proprietary OS developed by Microsoft and typing.
Symbian – original smartphone OS; used by
Nokia devices Keyloggers - used to record the keystroke
WebOS – originally used for smartphones; now done by the user to steal password or any other
used for smart TV’s sensitive information.
Windows Mobile – developed by Microsoft
Adware - a program designed to send your
Assistive Media - is a nonprofit service designed advertisement and mostly as pop-ups.
to help people who have visual and reading
impairments. A database of audio recordings is Spam – unwanted email mostly from bots or
used to read to the user. advertisers. It can be used to send malware.
B. Square
This setting allows the image you inserted
to be placed anywhere with the paragraph with the
text going around the image in a square pattern
like frame.
C. Tight
This is almost the same as the Square
setting, but here the text “hug” or conforms to the
general shape of the image.
D. Through
This setting allows the text on your
document to flow even tighter taking the contours
and shape of the image. Again, this can be best
used with .GIF or .PNG type of image.
4|Page
Empowerment Technologies