NOTES S2Q3 Empowerment Technologies

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Role of ICT

EMPOWERMENT TECHNOLOGIES
NOTES S2-Q3 Technology Addiction VS Productivity
1. All About Information and Communications Technology (ICT) • Advanced technologies are useful and important;
1.1. Information and Communications Technology (ICT)
1.2. Role of ICT
they make things easier, help people be more
1.3. Internet VS World Wide Web productive, and make information more
1.3.1. Time Berners-Lee and the Client-Server Model accessible, thereby making knowledge more
1.4. Evolution of Web available to everyone.
1.4.1. Web 1.0
1.4.2. Web 2.0
• In order to put technologies into right use to
1.4.3. Web 3.0 increase our daily productivity, we need to learn
1.5. Trends in ICT what they are, how they work, and how to
2. Online Safety and Security Standards and Procedures properly utilize them to make them “work” for
2.1. Scamming
2.1.1. Different Types of Scamming
us, instead of us “working” for them.
2.2. Social Engineering
2.2.1. Signs and Techniques of Social Engineering
Internet VS World Wide Web
Attacks
2.2.2. Types of Social Engineering Attacks
Internet
2.2.3. Examples of Social Engineering Attacks
2.3. Persistent and Non-Persistent Cross-Site Scripting
• It is a global computer network providing a
2.4. How do we know if a website is secure or not? variety of information and communication
2.4.1. Signs of Website Malwares facilities, consisting of interconnected networks
2.5. All about Malware using standardized communication protocols.
3. Online Ethics and Etiquette
3.1. Netiquette Web
3.2. Online Behavior
3.2.1. Online Behavior in Writing Emails • It is a huge collection of information, data, and
4. Online Research Tools
4.1. Advantages and Disadvantages of Online Research
resources that facilitates communication
Tools between users and computers.
4.2. How do we determine when a source is credible?
4.3. Handy Tricks in Performing Online Research Internet VS Web
4.3.1. Use of Boolean Operators
4.3.2. Truncation The web uses the internet as its medium to
4.3.3. Quotation Marks transfer or exchange data with remote users.
5. Basic Principles of Design
5.1. Contrast Tim Berners-Lee and the Client-Server Model
5.2. Repetition
5.3. Proximity Tim Berners-Lee
5.4. Alignment
• He is a British scientist who invented the World
Wide Web in 1989.
ALL ABOUT INFORMATION AND
COMMUNICATIONS TECHNOLOGY (ICT) Client-Server Model

Information and Communications Technology (ICT)

Information and Communications Technology (ICT)

• It refers to the use of any means of technology


to perform access, process, and computation of
data or any means communications.
• It covers various technologies ranging: • It is a networking model where the client
➢ from hardware (communication devices. requests resources from the server.
workstations, servers. databases, routers, • The clients are usually connected to the server via
switches, hubs, wireless access points, etc.) network infrastructures like Local Area Network,
➢ to software (applications, operating systems, Wide Area Network, or the Internet.
etc.) • Ex.: When we search in Google, we usually type
being used today in various fields of expertise, the query into the search box and hit “enter”.
including but not limited to: healthcare, When we hit “enter”, a request that contains our
education, corporate, military, and public query is sent from our computer to the server of
services. Google.
Evolution of Web • This is normally used by social media sites, e-
commerce, and news/media companies to
Web 1.0
optimize the content display of their websites.
• Webpages based on the Web 1.0 are static
Today, Web 2.0 and Web 3.0 co-exist. While search
pages, meaning users cannot interact with the
engines, social media sites, e-commerce, and news/media
page and the page is in read-only formal.
companies use Web 3.0 to optimize the search results and
• It delivers content in a single direction, where in
personalize the displayed contents, many sites like
the site owner is always the contributor, and the
forums, wikis, and file sharing sites still uses Web 2.0.
users are always the audience.
Trends in ICT
Where can I find Web 1.0?
1. Technological Convergence
• Today, Web 1.0 can only be found on static
• It is the evolution of two or more different
pages like directory pages, official homepages,
technologies towards one, performing the same
and media front pages.
task but in a more efficient way.
Web 2.0 • A good example is our mobile phone.

• It is more dynamic than Web 1.0. 2. Social Media


• Users are encouraged to participate and • It is an online platform where people and
contribute to the content by commenting, organizations post statuses, upload pictures and
sharing, tagging, etc. videos, and interact with each other.
• It is considered more flexible compared to Web • These are originally considered Web 2.0 based
1.0, hence, many of the websites today use Web web applications which feature user-generated
2.0. contents.
• Well-known social media applications such as
When can I use Web 2.0?
Facebook, Twitter, YouTube, Tumblr, and Google
• Web 2.0 is used when user participation is are transitioning to Web 3.0 due to the
needed on a web page. increased demand of the market for a smarter
• All social media sites, blogging, life sharing, web.
podcasting, voting sites, forums, and web.
• Services such as Google Docs and Microsoft 3. Mobile Media
Office 360 use Web 2.0. • It is principally a versatile, personal, intelligent,
and internet-enabled platform (hand-held
Where can I find Web 2.0?
gadgets such as mobile phones, tablets,
• Most of the websites today use Web 2.0. smartwatches, and phablets) that allow its users
• Pages that require contributions and to connect with peers and exchange information.
interactions between users are mostly based on • A good example of this in real life scenario will be
Web 2.0. smartphones.
• Blogs use Web 2.0 and encourage readers to
How can I utilize mobile media?
contribute by sharing, commenting, and
bookmarking contents. • There is a wide variety of mobile media
application in real life scenario, some of which
Web 3.0
include:
• It is the smarter version of Web that uses ➢ Social media applications
semantics, or more commonly known as the ➢ News, and information
science of meaning of language and artificial ➢ Games
intelligence, to optimize and personalize content ➢ Culture and entertainment
display to suit the needs and taste of the user. ➢ Online shopping
➢ Mobile browser
Where can I find Web 3.0? ➢ Productivity
➢ Finance and budgeting
• Search engines such as Google, Yahoo, Bing,
social media sites such as Facebook, Twitter,
4. Assistive Technology
YouTube, or even news/media sites like CNN
• It is anything that helps you do something you
and BBC utilize Web 3.0 to provide user with
could not do before.
richer personalized content viewing experience
• Some examples of these are:
and more accurate search results.
➢ A pair of glasses that allows you to see clearer
When should I use Web 3.0? ➢ A hearing aid that allows you to hear better
➢ A software that translates text to speech while
• Web 3.0 can be used in search engine
you are driving
optimization to ensure fast and accurate results.
• These are assistive technologies existing around
• It can also be used to personalize display
us.
contents so that the content displayed matches
• Sometimes we just fail to notice them.
either the user’s preference, or the user’s needs.
NOTES S2Q3 Empowerment Technologies | 2
• Other examples: • If you are looking for a fast way to make money,
➢ Screen reader watch out — scammers have invented all sorts of
➢ Braille fake money-making opportunities to prey on
➢ Magnifier your enthusiasm and get hold of your cash.
➢ Wheelchair
➢ Walker 7. Jobs and employment
➢ Prosthetic limb • Jobs and employment scams trick you into
➢ Hearing aids handing over your money by offering you a
➢ Assistive listening devices ‘guaranteed’ way to make fast money or a high-
➢ Educational software paying job for a little effort.
➢ Home automation tools
8. Threat and extortion
ONLINE SAFETY AND SECURITY • Scammers will use any means possible to steal
STANDARDS AND PRACTICES your identity or your money — including
threatening your life or ‘hijacking’ your computer.
Online Safety and Security

• It is the awareness of the user in implementing 9. Unexpected money


counter measures to avoid compromise of • Scammers invent convincing and seemingly
sensitive personal data and assets. legitimate reasons to give you a false hope about
• Common threats faced by the netizens everyday offers of money.
include
o other netizens with malicious intent 10. Unexpected winnings
(scamming, phishing and other cybercrimes), • Don’t be lured by a surprise win.
o unsecured programmed web applications, • These scams try to trick you into giving money
and; upfront or your personal information in order to
o malwares (virus, worm, trojan horse, etc.). receive a prize from a lottery or competition that
you never entered.
Scamming
Social Engineering
Scamming
Social Engineering
• It is an act of the attacker that seeks to gain the
victim's trust takes advantage of the victim to • It is the act of the attacker to interact with and
perform further attacks. psychologically manipulate the victim which
leads to tricking the victim into performing an
Different Types of Scam
action desired by the attacker or giving out
1. Current COVID-19 (coronavirus) scams confidential information to the hacker.
• Scammers are using the spread of COVID-19 • It is also known as human hacking.
(coronavirus) to take advantage of people. • It is the manipulation of someone to divulge
confidential information that can be used for
2. Attempts to gain your personal information fraudulent purposes.
• Scammers use all kinds of sneaky approaches to
steal your personal details.
• Once obtained, they can use your identity to
commit fraudulent activities such as using your
credit card or opening a bank account.
The social
3. Buying or selling The social
engineer poses as
• Scammers prey on consumers and businesses engineer gathers
a legitimate
that are buying or selling products and services. information
person and builds
• Not every transaction is legitimate. about his/her
trust with his/her
victims.
victims.
4. Dating and romance
• Scammers take advantage of people looking for
romantic partners, often via dating websites, apps
or social media by pretending to be prospective
companions.

5. Fake charities Signs and Techniques of Social Engineering Attacks


• Scammers impersonate genuine charities and ask
Social Engineering Attacks
for donations or contact you claiming to collect
money after natural disasters or major events. • These come in many different forms and can be
performed anywhere where human interaction is
6. Investments involved.

NOTES S2Q3 Empowerment Technologies | 3


Signs of Social Engineering Attacks • This can be as simple of an act as holding a door
open for someone else.
• Knowing the red flags can help you avoid
• Once inside, they have full reign to access devices
becoming a victim.
containing important information.
• Here are social engineering tactics to watch for:
➢ Your “friend” sends you a strange message.
3. DNS spoofing
➢ Your emotions are heightened.
• It is also known as cache poisoning.
➢ The request is urgent.
• This is when a browser is manipulated so that
➢ The offer feels too good to be true.
online users are redirected to malicious
➢ You’re receiving help you didn’t ask for.
websites bent on stealing sensitive information.
➢ The sender can’t prove their identity.
• In other words, DNS spoofing is when your cache
Types of Social Engineering Attacks is poisoned with these malicious redirects.

1. Baiting 4. Physical breaches


• As the name indicates, these occur when a
• As its name implies, baiting attacks use a false
cybercriminal is in plain sight, physically posing
promise to pique a victim’s greed or curiosity.
as a legitimate source to steal confidential
• For example, attackers leave the bait — typically
data or information from you.
malware-infected flash drives — in conspicuous
• This might be as a colleague or an IT person —
areas where potential victims are certain to see
perhaps they’re a disgruntled former employee
them.
— acting like they’re helping you with a problem
2. Scareware on your device.
• In fact, they could be stealing your account logins.
• Scareware involves victims being bombarded
with false alarms and fictitious threats.
5. Watering hole attacks
• A common scareware example is the legitimate-
• It is a one-sweep attack that infects a single
looking popup banners appearing in your
webpage with malware.
browser while surfing the web, displaying such
• The webpage is almost always on a very popular
text such as, “your computer may be infected with
site — or virtual watering hole, if you will — to
harmful spyware programs”.
ensure that the malware can reach as many
3. Pretexting victims as possible.

• Here an attacker obtains information through a 6. Quid pro quo


series of cleverly crafted lies. The scam is often • It means a favor for a favor, essentially “I give you
initiated by a perpetrator pretending to need this and you give me that.”
sensitive information from a victim so as to • In the instance of social engineering, the victim
perform a critical task. coughs up sensitive information like account
• The attacker usually starts by establishing trust logins or payment methods and then the social
with their victim by impersonating. The pretexter engineer doesn't return end of the bargain.
asks questions to confirm the victim’s identity.
Persistent and Non-Persistent Cross-Site Scripting
4. Phishing
Cross-Site Scripting
• Phishing scams are email and text message
campaigns aimed at creating a sense of • It is a type of attack typically found in vulnerable
urgency, curiosity or fear in victims. web applications.
• An example is an email sent to users of an online • Attackers often take advantage of sites without
service that alerts them of a policy violation proper input validation to inject malicious
requiring immediate action on their part such as payload to attack the victim.
a required password change.
Persistent Cross-Site Scripting
Examples of Social Engineering Attacks
• These are attacks that get stored in the database
1. Email hacking and contact spamming of the server.
• Social engineers know this all too well, • This type of attack usually occurs on unsecured
commandeering email accounts and blogs and forums where user inputs are stored in
spamming contact lists with phishing scams and a database, but the website fails to validate the
messages. user’s input.
• These are meant to exist permanently on a
2. Access tailgating website and victimize people who visit the site
• It is also known as piggybacking. unless removed from the database.
• This is when a social engineer physically trails or
Non-Persistent Cross-Site Scripting
follows an authorized individual into an area
they do not have access to. • This is also known as Reflected XSS.
• It affects only the target victim.

NOTES S2Q3 Empowerment Technologies | 4


• The attacker usually sends the URL containing the 2. Suspicious pop-ups — Be cautious of pop ups that
non-persistent cross-site scripting malicious make outlandish claims — they are likely trying to
payload to the victim, and as soon as the victim entice you to click and accidentally download
clicks the URL, the victim will either be malware.
redirected to a phishing site, or have his/her
credentials stolen immediately. 3. Malvertising — Some malicious ads are easy to
catch.
How do we know if a website is secure or not?
o They typically appear unprofessional contain
1. Check the site URL. spelling/grammar errors, promote “miracle” cure
or celebrity scandals, or feature products that
• URL comes with the pattern. don't match your browsing history.
• The webpages we access daily are mostly o It is important to note that legitimate ads can also
composed of HTTP and HTTPS (Hypertext be injected with malware, so exercise caution
Transfer Protocol Secure). when clicking.
• The user should also verify if the URL they are
visiting is legitimate or not. 4. Phishing Kits — These are websites that imitate
• Do not trust URL shorteners because you never commonly visited sites, like banking websites, in order
know where they are taking you to. to trick users into handing over sensitive information.
o They may appear legitimate, but spelling and
2. Look for the “padlock” icon.
grammar errors will give them away.
• When accessing secured web pages, browsers
should be displaying a padlock icon. 5. Search engine warnings — Some popular search
• It is very important to know where the padlock engines will scan websites for malware, and place a
appears on your browser. warning on that site if it is definitely infected with
• When you click the padlock, it should display malware.
information regarding the HTTPS certification
All About Malware
issued by the Certificate Authority (CA) trusted by
the browser. Malware/s
Other tips on how to tell if a website is safe: • It comes from the English words “malicious” and
“software”.
a. Look for the “S” in HTTPS.
• It is a generic term referring to any software that
• If HTTPS sounds familiar, it should — many URLs
can disrupt normal business operations by
begin with “https'' instead of just “http” to
destructing the network infrastructure, database,
indicate that they are encrypted.
and life systems.
• These are generally designed to perform
b. Check for a website privacy policy.
destruction and sabotage to a system.
• A website's privacy policy should clearly
• Signs of malware infection may include degraded
communicate how your data is collected, used
performance, unusual system activities, ad
and protected by the website.
frequent pop-ups.
c. Find their contact information. How do we detect/prevent malware infection?
• Ideally a safe website will clearly display an email
address, a phone number, a physical address if • A malware infection can be detected with the help
they have one, return policy if applicable, and of either an anti-malware software or a firewall
social media accounts. software.

What is an anti-malware software?


d. Verify their trust seal.
• If you see an icon with the words “secure” or • An anti-malware software is a software
“verified”, it's likely a trust seal. downloaded and installed by the user to protect
• A trust seal indicates that the website works with the work stations from malware threats.
a security partner.
How does anti-malware detect malware through
database scan?
e. Know the signs of website malware.
• Even if a website has an SSL certificate, a privacy • Database scan detects malwares when the
policy, contract information, and a trust badge, it malwares signatures match the signatures
may still not be safe if it is infected with malware. found and stored in the database.
Signs of a Website Malware How about heuristic scan?
• Here are the signs of a website malware: • Heuristic scanning allows the anti-malware to
analyze the software more thoroughly hence,
1. Defacements — This attack is easily spotted allowing the anti-malware to detect possible
cybercriminals replace a site's content with their threats that are not yet discovered.
name, logo, and/or ideological imagery.

NOTES S2Q3 Empowerment Technologies | 5


What is a firewall? Be careful with swearing.
• It’s easy to forget your Nana is a friend on
- It acts as the fast line of defense that protects
Facebook and you could be offending people
the workstation or the whole network from
you’ve never met.
malware threats.
• If you must, better to @&%#! than spell it out.
What is a hardware firewall?
Check the scene.
- These are firewalls that come with a dedicated • If you are visiting a chatroom or site that's new to
hardware and are considered faster, more you, take a look around.
expensive, and harder to maintain. • Spend some time listening to the chat or reading
the archives.
What is a software firewall?
• Get a feel for the site.
- It can be downloaded and installed to a • Then go ahead and join in.
workstation dedicated for the firewall’s system
and has enough processing power to process the Before you send it…
inbound and outbound traffic. • Taking a moment for a quick check can save you
a lot of explaining later on...
To keep yourself safe from the threats of malware, it
is suggested that you do perform the following steps
Check before you hit send.
below:
• A quick read and a spell check can clear up any
➢ Install an anti-malware on your system. accidental misunderstandings and leave a better
➢ Always keep your anti-malware up-to-date. impression on your reader.
➢ Frequently use the anti-malware to scan your
system for malware. Don’t hit send when you are angry or upset.
➢ Visit only trusted websites. • Type it out if you have to, then save it, take a
➢ Backup important files on different break and re-read it later.
workstation or on a cloud storage service. • Once you’ve sent it, it could be in circulation for a
➢ Use strong passwords. long time.

ONLINE ETHICS AND ETIQUETTE Make sure your message is going to the right
person.
Netiquette
• Sounds obvious, but it happens to us all.
Netiquette • Autocomplete is a killer.
• Remember to double-check the email address in
• The word “netiquette” is derived from two words, the To: field (and the Cc: and Bcc: fields if you
namely network and etiquette. want to be thorough) before clicking ‘Send’.
• It is a set of dos and don’ts that netizens should
follow when surfing the internet. Think about whether it is worth sending.
• It is important for the netizens to know the proper • Chain emails, jokes, pictures of kittens doing cute
netiquette so that one can express freely without kitten things — they can take up a lot of time and
offending anyone. bandwidth, and annoy the people you're hoping
• It does not only cover how one communicate with to amuse, which runs the risk of getting
others; it also covers guidelines on one can unfriended, unfollowed or even blocked.
properly use resources online.

Online Behavior Do unto others...


• Remember there's a real person on the other end,
While you are writing… with real person feelings and real person rights.
• Email and texting, IMing and Facebook - they're
different to talking in person or on the phone. Respect people’s privacy.
• A little consideration can make sure you get your • It can be tempting to scroll through someone
message across in the nicest possible way. else’s emails or texts, but if they’re not addressed
to you, you shouldn’t be reading them.
Watch your tone.
• Words don’t convey facial expressions, gestures Don’t forward emails without asking first.
or tone. • Gossip takes on a whole other dimension when
• Humor and sarcasm can be difficult to translate it's written in black and white.
into an email, even with emoticons. • The possibility for people's words to be
misrepresented is as easy as Ctrl+C, Ctrl+V.
Uppercase Letters = Shouting • It only takes a moment to ask someone if they'd
• Use sparingly and if you really feel like shouting, mind if you shared something.
step away from the keyboard and take a few deep • They'll love you for it, and it's just plain respectful,
breaths. too.

NOTES S2Q3 Empowerment Technologies | 6


Remember there is a person at the other end. Advantages of Online Research Tools
• If you wouldn’t say it to them face-to-face, don’t
• Online research tools increase the pace of
send it in a message they can keep and share with
researchers when gathering and organizing data.
the world.
• Unlike traditional libraries, online research tools
are not limited to just textbooks and journals.
Person-to-person is still the safest.
In fact, there are good online resources that are
• If it’s a really private message, deliver it yourself
not in the form of written text, but in the form of
to the person it’s meant for.
either audio or video.
• Give them a call or catch up with them at work or
• If used efficiently, the internet is like a large
school instead.
library that can provide you with all the
• Remember, once you send it, it's out of your
information you need to perform your
control.
research. In spite of the advantages of online
Online Behavior in Writing Emails research tools, they also have a number of
disadvantages.
When communicating through email, one is expected to:
Disadvantages of Online Research Tools

• Unlike resources found in the library, some online


resources come with additional fee for you to
fully access their contents.
• Since everyone is free to post anything online,
articles published online more likely has gone
through lesser quality assurance checks as
compared to published books we found in
physical libraries.
• Anyone can just spend a few bucks to buy a
domain name and start publishing articles online.
These contents are not strictly moderated;
➢ Read and reply to messages promptly.
hence quality control is harder on the internet.
➢ Do not spam other people’s mail box – Avoid
forwarding useless advertisements and chain How do we determine whether a source is credible?
mails
➢ Use appropriate mail subject. • Check the URL:
➢ When using intellectual property online, do not A. We can easily determine the type of organization
behind the website.
forget to give credits to the owner of the
✓ .com is for commercial use
resource.
✓ .edu is for educational use
Intellectual Property ✓ .gov is for government use
✓ .org is usually for nonprofit organizations
• It is anything that is a result of one’s creativity.
✓ .net is usually for network service providers
• This may be an invention, a design, or any form of
✓ .mil are for military use only
art.
B. The URL often contains the name of the abbreviation
• Intellectual properties are protected by
of the organization or publisher’s name in its URL .
Intellectual Property Rights, a right of the
property owner to decide to whom the We should also take note of the following:
property will be shared, and gives the owner the
a. The credibility of the content publisher
right to sue anyone who uses the property
b. The content must be unbiased and of no commercial
without his/her authorization.
use
Internet has no borders but cultural differences are c. Who are the target audience of the article and how
still existing; therefore, we are expected to accept and recently was it published?
respect each other’s culture and norms. Refrain from d. The date of publishing
making racist jokes, participating in cyber bullying, or e. Citation and references
stalking someone without their knowledge. These actions
are considered abusive. When performing online research, we tend to be
easily distracted by the other contents on the internet.
ONLINE RESEARCH TOOLS This dramatically reduces our pace and productivity.
When performing online research, we must maintain
Online Research Tools self-discipline so that we can efficiently perform our
• These are a set of digital tools that aid the user in tasks.
performing research. Handy Tricks in Performing Online Research
• Just like any internet tool, online research tools
also have their advantages and disadvantages. Some handy tricks we can use when performing
online research, making the search easier and more
Advantages and Disadvantages precise:
of Online Research Tools
NOTES S2Q3 Empowerment Technologies | 7
1. Use of Boolean operators. BASIC PRINCIPLES OF DESIGN AND LAYOUT
• This involves adding the words “AND”, “OR”, and
“NOT” into the search keywords. A. Contrast
• The operators should be always capitalized. • Making important things stand out.
• Here is a list of Boolean operators and their • This adds visual interest to the design and creates
functions: visual hierarchy.
• It calls the attention of the viewer/reader.
Boolean • Using colors, bold, italics, underline, or changing
Functions
Operators font style and size are examples of ways in which
AND It retrieves items includes two or more designers can that create a contrast.
different contents together. (e.g. an article
that discusses “police” AND “drugs”)
OR It does not matter which concept shows
up in your results as long as one concept
is included. (e.g. “baby” OR “infant”; does
not matter which result you get they are
the same anyway)
NOT It removes search results you do not need
by filtering out search results. (e.g. when B. Repetition
you search for “computer” and laptops • It refers to applying consistency and repeating an
keep showing up, you can search aspect of the design.
“computer” NOT “laptop” to filter out • It acts as a visual key that unifies your design and
laptop results) helps maintain the attention of the viewer/reader.
• Using the same elements such as font style, font
size, format or graphic are some examples of
ways where designers can create repetition.
• Repetition is seen in templates.

C. Proximity
• It means putting related items closely together
2. Truncation and putting non-related items apart.
• Also called stemming, it is a technique that • It puts structure and organization in the design.
broadens your search to include various word • It helps identify which items are related.
endings and spellings. • It refers to putting related items closely together
• To use truncation, enter the root of a word and and putting non-related items apart.
put the truncation symbol at the end. • It puts structure and organization in the design.
• The database will return results that include any • It helps identify which items are related.
ending of that root word.
• Truncation symbols may vary by database;
common symbols include: *, !, ?, or #
• It is used at the end of the keyword and useful
when searching for concepts with multiple
ending.
• Examples:
✓ child* = child, childs, children, childrens, childhood
✓ Gene! = gene, genes, genetic, genetics, genetically,
general, generally, etc.
D. Alignment
3. Quotation marks (“”) • It means making text easier to read through
proper alignment.
• They are used to keep words together in search.
• It refers to how space is used, whether to align
• For example, if you search the keyword: jump
text to the right, left, or center.
street, it will return results for both jump and
• It gives order and strength in the design.
street, but if you added quotation marks, your
• Different alignments have different effects.
search engine will recognize the two words as one
word and will only return the result for “jump
street”.
NOTES S2Q3 Empowerment Technologies | 8

You might also like