Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number:

Size: px
Start display at page:

Download "Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number:"

Transcription

1 Unit 1: Your School Standards: 01.04, 02.01, (School Website, Yearbook, Newspaper, Personnel Interviews) 1. List major clubs at your school: 2. What is the purpose of FBLA? 3. What services are available at these school offices/faculty members? a. Student Affairs: b. Guidance Counselor: c. Media Specialist: d. Registrar: e. School Resource Officer: f. College & Career Counselor: Unit 2: Your Success Standards: 01.02, (Cornell Notes, Internet Research, CRISS Strategies) 1. List and describe proven note-taking techniques: 2. List and describe proven ways to learn a chapter in a textbook: 3. List and describe proven ways to locate information on the Internet: Unit 3: Your Technology Standards: 01.01, 01.07, 02.02, 02.03, 02.07, 02.08, 02.09, 02.10, 02.11, 03.01, 03.02, (CIW Internet Business Associate online materials, e-book, and Industry Certification) CIW-IBA, Lesson 1 1. Web Development Team 2. Web Maintenance Team 3. Company Network and Computer Team a. PC repair technicians, Server administrators, Network engineers b. Website designer, Web application developer, Web architect, Mobile application developer, Website project manager c. Web site analyst, SEO analyst

2 4. What are some of the ways to look for a job in the Information Technology field? 5. When hunting for a career in the Information Technology field, what are some of the different resume formats that should be used? 6. W3C 7. Ontology 8. ROI 9. Technology Adoption Life Cycle 10. CEO 11. OWL 12. ISO 9000 Standards a. The amount of time it takes a person or a company to accept and use emerging technology b. Group of people that create and encourage Web page standards and guidelines c. Study of how a part of an organization is organized d. Language used to define the organizational structure relationships e. Benefit (or reward) of buying new equipment or software f. Highest-ranking corporate officer in charge of the total management of a company g. Group that develops technical specifications for intellectual, scientific, and technological activities worldwide CIW-IBA, Lesson 2 1. Crowd-sourcing 2. Wikis 3. Web Mashups 5. SMS 6. Netiquette 7. VoIP a. Website that integrates content and scripts from multiple Websites b. Changing trends in the use of WWW technology and Web design, focused on collaboration c. Protocol used for text messaging d. A technology that converts voice into data packets for transmission online e. A task that outsourced to a large group of people in order to analyze a huge amount of data f. Proper ways to write online communication g. Website that can be viewed and modified by anyone

3 CIW-IBA, Lesson 3 1. WAN 2. Client 3. Server 4. DSL Modems 5. T/E Lines 6. Fiber Optic Cables 7. LAN a. Transmission lines that use light rays for communication and have extremely fast bandwidths b. A group of networked computers and printers located in on office or building c. A group of networked computers and technology that are located in various places far away from each other d. Dedicated digital telephone lines that have very fast transmission speeds, available in both the United States and Europe e. A piece of technology that uses services or programs from a server f. Technology generally connected to a home computer that provides dedicated transmission lines using telephone lines g. A large capacity computer that provides storage and services to other computers 8. HTTP 9. POP3 10. SMTP 11..org 12..edu 13. IP Address 14. Cloud Computing 15. FTP a. Internet protocol used for outgoing s b. Internet protocol used for transferring Web pages c. Domain used for universities and colleges d. The ability to store and access personal files on the Internet e. Internet protocol used for uploading and downloading files f. Domain used for not-for-profit Websites g. Domain name that is made up of numbers h. Internet protocol used for incoming messages CIW-IBA, Lesson 4 1. Browsers 2. Plug-ins 3. Cookies 4. Interpreter 5. Cache 6. Web server 7. URL a. Storage on your computer of the Websites you have visited b. A large computer that stores all the files used for a Website c. Applications that are installed to view multimedia on Websites d. Software that translates programming languages on a Website e. Text files that save personal information for identification on a Website f. Software used to view Web pages, such as Internet Explorer, Chrome, Firefox, Opera, and Safari

4 g. The address of a Web page CIW-IBA, Lesson 5 1. HTML5 2. PDF 3..jpg 4..gif 5. audio 6. C++, Java 7. video a. Image file format for simple, animated images b. Object-oriented programming languages c. A version of Web page coding that does not require plugins, and offers geolocation (GPS) d. File types include.avi,.mov,.mp4, and.ogg e. Image file format for photographs f. Sound files, such as mp3,.au, and.wav g. A document file that can be viewed and accessed on the Internet after the visitor downloads the Adobe Reader viewer CIW-IBA, Lesson 6 1. Tables 2. Relational Databases 3. Query 4. Keywords 5. Boolean Operators 6. Written Permission 7. Validate Sources a. Specific word or words that are entered into a search engine in order to locate information b. Where databases are normally stored because they are divided into rows and columns (records and fields) c. Special characters (+ -!) entered into a search engine that include or remove results from the search. d. The legal way to get authorization to use copyrighted material e. A question put into a search engine or database to locate information f. This includes: consider the author, compare information on 2-3 other Websites, look for grammatical errors, look for bias towards a topic g. Multiple amounts of information in databases that are related through common fields CIW-IBA, Lesson address 2. Reply 3. Forward 4. PIM 5. benefits 6. SPAM 7. CAPTCHA a. Sending an you received to other people b. Organization of time and tasks through the use of software c. Unsolicited d. Made up of a username and a domain name e. Technology that is used to determine that an order or is coming from an actual person f. Not private, specific rules about use, communication can be saved, cannot use for personal reasons g. Speed, ability to send file attachments, record of communication that was sent or received h. Answering an

5 8. Company owned CIW-IBA, Lesson 8 1. Worm 2. Trojan 3. Spyware 4. Patches 5. Protect Yourself Shopping Online 6. Encryption 7. SSL 8. U.S. Copyright laws 9. International Copyright 10. Software Licensing 11. Trademarks a. Process of converting information into unreadable or scrambled data b. Although entities agree to follow, it does not exist c. Program disguised as a harmless application that actually is very harmful to a computer system d. Protection of personal works as soon as they are written or published e. A file that is inserted into an existing software application designed to repair or fix a known problem f. The agreement on the amount of times it can be used, downloaded, or installed g. A program secretly installed on a user s computer used to gather information and relay it back to an outside party h. Includes anti-virus, firewalls, look for closed padlock icon on browser, look for SSL, encryption, and digital certificates i. Self-replicating program that consumes system resources j. Protocol used for online shopping that provides encryption and digital certificates k. Company logos, phrases, and mottos that are used to identify the company CIW-IBA, Lesson 9 1. Listserve 2. Peer-to-Peer 3. IPCONFIG 4. End User Licensing Agreement 5. Open-source Licensing 6. MIME 7. Derived works a. A collection of information that is collected and distributed to an authorized group of people b. Software that is based upon one or more existing pieces of software c. Technology that is used to identify a file type, associate it with a program, and open it on your computer if you have the program it needs d. Removes restrictions on how many computers can have software installed e. A network in which each computer has both server and client capabilities f. Acceptance of the policies about how many computers can have specific software installed

6 g. Utility used to display your system s Internet Protocol configuration and address CIW-IBA, Lesson Task 2. Scope 3. Scope Creep 4. Needs Analysis 5. Statement of Work 6. SWOT Analysis 7. GANTT Chart 8. Project Triangle a. A method of visually showing the project on a timeline, and identified assignments with deadlines b. The goals and assignments of a project c. A strategic planning method that looks at the project team and their strengths, weaknesses, opportunities, and threats d. Gradual increase of time and money needed for a project as a result of additional requirements e. The major factors that influence the success of a project time, money, and scope f. Acquiring information from a customer about the goals and objectives of a project g. A contract that outlines the project goals and specifies how those goals will be met h. A unit of work that must be accomplished Unit 4: Your Tools Standards: 04.01, (Microsoft Word, Microsoft Power Point) 1. Microsoft Word 2. Microsoft Power Point 3. Microsoft Excel 4. Parts of a Letter 5. Parts of a Memo 6. Parts of a Table 7. Slide Transition 8. Slide Animation a. TO, FROM, DATE, SUBJECT b. Use to create letters, memos, research papers, and tables c. Visual change in the slide as it changes to another slide d. Address, date, complimentary close, greeting, body, addressee e. Use to create organizational charts, sales records, and payroll sheets f. Movement of text or graphics as they appear (and/or exit) the slide g. Use to create visually appealing presentations h. Columns, cells, rows

7 9. Identify (label) the following parts of a Word document, and indicate how you would include them (what do you click): Unit 10: Your Future Standards: 01.05, 01.06, 02.12, ( - Online Career Planning) 1. Visit the following online Websites. List information about career planning that you locate at these Websites: a. b.

Web Foundations Series Internet Business Associate

Web Foundations Series Internet Business Associate Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved

More information

CIW 1D CIW Foundations Exam v5.

CIW 1D CIW Foundations Exam v5. CIW 1D0-510 CIW Foundations Exam v5 TYPE: DEMO http://www.examskey.com/1d0-510.html Examskey CIW 1D0-510 exam demo product is here for you to test the quality of the product. This CIW 1D0-510 demo also

More information

E-companion. Quiz for IT-knowledge

E-companion. Quiz for IT-knowledge E-companion Quiz for IT-knowledge 1. The is used in combination with other keys to perform shortcuts and special tasks. A) Control (Ctrl) key B) Function key C) Toggle key D) Windows key 2. is the place

More information

1D CIW: Web Design Specialist. Course Outline. CIW: Web Design Specialist Apr 2018

1D CIW: Web Design Specialist. Course Outline. CIW: Web Design Specialist Apr 2018 Course Outline CIW: Web Design Specialist 22 Apr 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5.

More information

CIW: Web Design Specialist. Course Outline. CIW: Web Design Specialist. ( Add-On ) 16 Sep 2018

CIW: Web Design Specialist. Course Outline. CIW: Web Design Specialist.   ( Add-On ) 16 Sep 2018 Course Outline 16 Sep 2018 ( Add-On ) Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant

More information

Using the Internet and the World Wide Web

Using the Internet and the World Wide Web Using the Internet and the World Wide Web Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Understand the difference between the Internet and the World Wide Web. Identify

More information

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. Name: Class: Date: The Internet and WWW True/False Indicate whether the sentence or statement is true or false. 1. A search engine is a program that performs keyword searches for information on the Internet.

More information

The process by which a user can associate specific permissions to each username.

The process by which a user can associate specific permissions to each username. Jargon Buster A Antispyware A program that detects and removes malicious programs on your computer called spyware. Once it is installed can collect information without the users consent, that can be almost

More information

RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations

RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations Throughout high school, as students take courses to prepare themselves for college and the working world, they should

More information

POS Perkins Statewide Articulation Agreement Documentation Coversheet

POS Perkins Statewide Articulation Agreement Documentation Coversheet POS Perkins Statewide Articulation Agreement Documentation Coversheet Student Name: Secondary School Name: Secondary School Address: CTE Program of Study: CIP # CIP Program Name Grade 9 1. CAREER AND TECHNICAL

More information

Communication Technology/Technicians & Support Services CIP Task Grid

Communication Technology/Technicians & Support Services CIP Task Grid Unit/Standard Number High School Graduation Years 2015, 2016, and 2017 Communication Technology/Technicians & Support Services CIP 10.9999 Task Grid Secondary Competency Task List 100 COMMUNICATION TECHNOLOGY

More information

Internet. Class-In charge: S.Sasirekha

Internet. Class-In charge: S.Sasirekha Internet Class-In charge: S.Sasirekha COMPUTER NETWORK A computer network is a collection of two or more computers, which are connected together to share information and resources. Network Operating Systems

More information

Discovering Computers Chapter 2 The Internet and World Wide Web

Discovering Computers Chapter 2 The Internet and World Wide Web Discovering Computers 2009 Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Discuss the history of the Internet Describe the types of Web sites Explain how to access and connect to the Internet

More information

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks. Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area

More information

Chapter 2 The Internet and World Wide Web

Chapter 2 The Internet and World Wide Web Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Explain how to access and connect to the Internet Explain how to view pages and search for information on the Web Describe the types of Web

More information

Computers: Information Technology in Perspective, 11e

Computers: Information Technology in Perspective, 11e Computers: Information Technology in Perspective, 11e Larry Long and Nancy Long Chapter 3 Going Online Copyright Prentice Hall, Inc. 1 Objectives Once you have read and studied this chapter, you will have

More information

Lesson 1: Introduction to IT Business and Careers

Lesson 1: Introduction to IT Business and Careers Lesson 1: Introduction to IT Business and Careers Lesson 1 Objectives Define Information Technology (IT) job roles Review career opportunities in the IT industry Describe the importance of successfully

More information

Communication Technology/Technicians & Support Services CIP Task Grid

Communication Technology/Technicians & Support Services CIP Task Grid 1 Secondary Task List 100 COMMUNICATION TECHNOLOGY AND SAFETY PROCEDURES 101 Explain Communication Technology and why it is important. 102 Demonstrate safety procedures in the field of communications technology

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define

More information

CONTENTS. Internet Basics. Internet Explorer. Search Engines. . Advantages and Disadvantages of the Internet. Some good websites

CONTENTS. Internet Basics. Internet Explorer. Search Engines.  . Advantages and Disadvantages of the Internet. Some good websites USING THE INTERNET CONTENTS Internet Basics Internet Explorer Search Engines E-Mail Advantages and Disadvantages of the Internet Some good websites 2 WHAT IS INTERNET? A computer network Two or more connected

More information

Vocabulary Bank organized by module

Vocabulary Bank organized by module Vocabulary Bank organized by module Module 1: Choosing a Computer Application: also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software

More information

The Internet and World Wide Web. Chapter4

The Internet and World Wide Web. Chapter4 The Internet and World Wide Web Chapter4 ITBIS105 IS-IT-UOB 2016 The Internet What is the Internet? Worldwide collection of millions of computers networks that connects ITBIS105 IS-IT-UOB 2016 2 History

More information

Scale Yourself. Lesson 3: Introduction to Internet Technology. Computer Technology 3/13/2015

Scale Yourself. Lesson 3: Introduction to Internet Technology. Computer Technology 3/13/2015 Computer Technology Lesson 3: Introduction to Internet Technology Learning Goal: Students will be able to understand the elements of a network. Scale Yourself 4 I do understand the elements of a network.

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

CompTIA E2C Security+ (2008 Edition) Exam Exam.

CompTIA E2C Security+ (2008 Edition) Exam Exam. CompTIA JK0-015 CompTIA E2C Security+ (2008 Edition) Exam Exam TYPE: DEMO http://www.examskey.com/jk0-015.html Examskey CompTIA JK0-015 exam demo product is here for you to test the quality of the product.

More information

STUDY GUIDE CHAPTER 7

STUDY GUIDE CHAPTER 7 STUDY GUIDE CHAPTER 7 True/False Indicate whether the statement is true or false. 1. Every Web page has a unique address called a(n) Uniform Resource Locator. 2. Web 3.0 refers to innovations like cloud

More information

This project has been funded with support from the European Commission. This communication reflects the views only of the author, and the Commission

This project has been funded with support from the European Commission. This communication reflects the views only of the author, and the Commission Curriculum: 8 Competences Kit Partner: Marie Curie Association, Plovdiv Bulgaria Number of module: 4 Title of module: DIGITAL COMPETENCE Number of Units: Authors: Mariya Goranova Valkova Delyan Marinov

More information

The Internet. and the World Wide Web

The Internet. and the World Wide Web The Internet and the World Wide Web Discussion What is the internet? What do you use the internet for? History Advanced Research Projects Agency created ARPANET in the late 1960s. 1970s more universities

More information

F9A0 04 (ESKINT2): Using the Internet 2

F9A0 04 (ESKINT2): Using the Internet 2 F9A0 04 (ESKINT2): Using the Internet 2 4 SCQF credit points at SCQF level 5 Description: This is the ability to set up and use appropriate connection methods to access the internet; make the best use

More information

Discovering Computers Your Interactive Guide to the Digital World

Discovering Computers Your Interactive Guide to the Digital World Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Discuss the evolution of the Internet Identify and briefly describe various broadband Internet connections and

More information

CompuScholar, Inc. Alignment to Utah's Web Development I Standards

CompuScholar, Inc. Alignment to Utah's Web Development I Standards Course Title: KidCoder: Web Design Course ISBN: 978-0-9887070-3-0 Course Year: 2015 CompuScholar, Inc. Alignment to Utah's Web Development I Standards Note: Citation(s) listed may represent a subset of

More information

Test Code: 8095 / Version 1

Test Code: 8095 / Version 1 Pennsylvania Customized Assessment Blueprint Communication Technologies PA Test Code: 8095 / Version 1 Copyright 2016 NOCTI. All Rights Reserved. General Assessment Information General Assessment Information

More information

VISUAL SUMMARY PEOPLE INFORMATION SYSTEMS. Information Technology, the Internet, and You. Rev.Confirming Pages

VISUAL SUMMARY PEOPLE INFORMATION SYSTEMS. Information Technology, the Internet, and You. Rev.Confirming Pages Rev.Confirming Pages VISUAL SUMMARY Information Technology, the Internet, and You INFORMATION SYSTEMS The way to think about a microcomputer is to realize that it is one part of an information system.

More information

Chapter 2 The Internet and World Wide Web

Chapter 2 The Internet and World Wide Web Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Discuss the history of the Internet Describe the types of Web sites Explain how to access and connect to the Internet Recognize how Web pages

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011 Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

8 9 Before: Computers are categorized into three main categories from least to most powerful: microcomputers minicomputers mainframe computers Today:

8 9 Before: Computers are categorized into three main categories from least to most powerful: microcomputers minicomputers mainframe computers Today: 1 Computer, Internet, and Network Basics 2 Computer Basics A computer system includes a computer, peripheral devices, and software Computer refers to a device that accepts data as input, processes data,

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II Adopted: July 2000 Revised : April 2004; August 2009; June 2014; February 2018 INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst

More information

09-Jan-17. Objectives Overview. The Internet. Objectives Overview. Evolution of the Internet. Evolution of the Internet. Discovering Computers 2012

09-Jan-17. Objectives Overview. The Internet. Objectives Overview. Evolution of the Internet. Evolution of the Internet. Discovering Computers 2012 Objectives Overview Discuss the evolution of the Identify and briefly describe various broadband connections and state differences between broadband connections and dialup connections Describe the types

More information

A Comprehensive Guide. IC3 - Module 1: Computing Fundamentals

A Comprehensive Guide. IC3 - Module 1: Computing Fundamentals Appendix A A Comprehensive Guide to IC 3 IC3 - Module 1: Computing Fundamentals Standardized Coding Number Objective 1.1 Objectives & Abbreviated Skill Sets Page Identify types of computers, how they process

More information

Introduction to the Internet. Part 1. What is the Internet?

Introduction to the Internet. Part 1. What is the Internet? Introduction to the Internet Part 1 What is the Internet? A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected

More information

Metrics that Matter Setup. v12.7

Metrics that Matter Setup. v12.7 Metrics that Matter Setup v12.7 Metrics That Matter Setup Page 2 of 16 Contents Client Settings... 3 Supported Browser Configurations... 3 Screen Resolution... 3 Smartphone Device Support... 4 Pop-Up Blocker

More information

ELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12

ELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12 ELECTRONIC MAIL RAYMOND ROSE Computer Technology Department 2011/12 ELECTRONIC COMMUNICATION Systems for exchanging information and news were the first applications developed for network communication.

More information

All answers and help topics pertaining to Docsafe

All answers and help topics pertaining to Docsafe All answers and help topics pertaining to Docsafe What is Docsafe? With Docsafe it is possible to digitally receive, store and manage private documents. You can also add your own documents. With Docsafe,

More information

CPET 499/ITC 250 Web Systems. Topics

CPET 499/ITC 250 Web Systems. Topics CPET 499/ITC 250 Web Systems Week 1 Web System Infrastructure, Protocols, and Applications Paul I-Hai Lin, Professor Dept. of Computer, Electrical, and Information Technology College of Engineering, Technology,

More information

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing Motivation For Networking Information access Interaction among cooperative application programs Resource sharing CS422 -- PART 1 13 2003 Practical Results E-mail File transfer/access Web browsing Remote

More information

3. How is technology used to serve our advertisements on other Sites that you visit and what choices do you have?

3. How is technology used to serve our advertisements on other Sites that you visit and what choices do you have? Privacy Policy for U.S. Websites Scope. This Privacy Policy applies to personal information collected online, used and disclosed by Stanley Black & Decker, Inc. s affiliates including but not limited to

More information

Unit 11: Computer Networks

Unit 11: Computer Networks Unit 11: Computer Networks Level: 1 and 2 Unit type: Mandatory or Optional specialist Guided learning hours: 60 Assessment type: Internal Unit introduction Computer networking is an important part of our

More information

Outside the Box: Networks and The Internet

Outside the Box: Networks and The Internet Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Training UNIFIED SECURITY. Signature based packet analysis

Training UNIFIED SECURITY. Signature based packet analysis Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that

More information

KULLEĠĠ SAN BENEDITTU Boys Secondary, Kirkop

KULLEĠĠ SAN BENEDITTU Boys Secondary, Kirkop KULLEĠĠ SAN BENEDITTU Boys Secondary, Kirkop Mark HALF-YEARLY EXAMINATION 2013/14 Levels 5-6-7-8 FORM 3 ICT TIME: 1h 30min Section A Question 1 2 3 4 5 6 7 8 Max. Mark 6 4 8 3 18 2 6 2 Mark Section B Question

More information

Grade 9 :The Internet and HTML Code Unit 1

Grade 9 :The Internet and HTML Code Unit 1 Internet Basic: The internet is a world-wide system of computer networks and computers. Each user makes use of an internet service provider (ISP). The ISP will set up a user account which will contain

More information

Web Systems. Lecture 1. An Overview of Web Systems

Web Systems. Lecture 1. An Overview of Web Systems Web Systems Lecture 1 An Overview of Web Systems Paul I-Hai Lin, Professor of Electrical and Computer Engineering Technology Dept. of Computer, Electrical, and Information Technology College of Engineering,

More information

Acknowledgment and Disclaimer:

Acknowledgment and Disclaimer: What is the Internet Acknowledgment and Disclaimer: This presentation is supported in part by the National Science Foundation under Grant 1240841. Any opinions, findings, and conclusions or recommendations

More information

Five9 Virtual Contact Center Online Help and Browser Usage Guidelines

Five9 Virtual Contact Center Online Help and Browser Usage Guidelines Cloud Contact Center Software Five9 Virtual Contact Center Online Help and Browser Usage Guidelines Five9 Virtual Contact Center Online Help Overview The Five9 Virtual Contact Center (VCC) Online Help

More information

Internet: An international network of connected computers. The purpose of connecting computers together, of course, is to share information.

Internet: An international network of connected computers. The purpose of connecting computers together, of course, is to share information. Internet: An international network of connected computers. The purpose of connecting computers together, of course, is to share information. WWW: (World Wide Web) A way for information to be shared over

More information

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ. Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ. Email: jh_zhang@hdu.edu.cn Copyright 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet

More information

ETSY.COM - PRIVACY POLICY

ETSY.COM - PRIVACY POLICY At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,

More information

Introduction to Information Technology

Introduction to Information Technology EXAM INFORMATION Items 64 Points 73 Prerequisites NONE Grade Level 9-12 Course Length ONE SEMESTER DESCRIPTION The Intro to IT course is for students interested in pursuing a career in the field of Information

More information

Digital Information Technology (2017/2018)

Digital Information Technology (2017/2018) Digital Information Technology (2017/2018) Florida 8207310.2017 This document provides the correlation between interactive e-learning curriculum, and the Digital Information Technology (2017/2018) standards,

More information

Elementary Computing CSC 100. M. Cheng, Computer Science

Elementary Computing CSC 100. M. Cheng, Computer Science Elementary Computing CSC 100 1 Internet (2) TCP/IP and IP Addresses Hostnames and Domain Name System Internet Services Client/Server and Peer- 2- Peer Applications SPAMs & Phishing, Worms, Viruses & Trojans

More information

VISUAL SUMMARY ACCESS INTERNET AND WEB. The Internet, the Web, and Electronic Commerce

VISUAL SUMMARY ACCESS INTERNET AND WEB. The Internet, the Web, and Electronic Commerce VISUAL SUMMARY The Internet, the Web, and Electronic Commerce INTERNET AND WEB Internet Launched in 1969 with ARPANET, the Internet consists of the actual physical network. Web Introduced in 1991 at CERN,

More information

Everyone will be working with a minimum of seven files on the network. All computers in the network must be able to connect to the laser printer.

Everyone will be working with a minimum of seven files on the network. All computers in the network must be able to connect to the laser printer. Purpose - Why the Client Needs the Network: The client needs the network for their office in a nearby town for their small company Mesh Networking Solutions. These people are all using stand-alone computer

More information

Total Test Questions: 64 Levels: Grades 9-12 Units of Credit:.50

Total Test Questions: 64 Levels: Grades 9-12 Units of Credit:.50 DESCRIPTION The Intro to IT course is for students interested in pursuing a career in the field of Information Technology. Students will be introduced to the different aspects of information technology

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 13, 2011 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2011-75 minutes This examination

More information

Setting up to download Grants Group Application Forms

Setting up to download Grants Group Application Forms Setting up to download Grants Group Application Forms Guidance on setting up Adobe Reader Although it is in common use, we recognise that you may not use Adobe Reader as your preferred pdf reader but it

More information

Sage 300 People & Web Self Service Technical Information & System Requirements

Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People Architecture The Sage 300 People application is a 2-tier application with the program and database residing

More information

Computer networks 2013

Computer networks 2013 Chapter 4 EXERCISE 1 1 Describe what is meant by each of the following: a Router b Bridge c Proxy server Answers: see the Glossary. 2 Many small businesses have computer networks. a List three advantages

More information

Discovering Computers Chapter 2 The Internet and World Wide Web

Discovering Computers Chapter 2 The Internet and World Wide Web Discovering Computers 2008 Chapter 2 The Internet and World Wide Web Just remember It took 38 years for radio to reach 50 million users 13 years for television to reach 50 million users Less than 4 years

More information

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers Router Router is a Microprocessor controlled device that forwards data packets across the computer network. It is used to connect two or more data lines from different net works. The function of the router

More information

Chapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts

Chapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts E-commerce 2015 business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver Chapter 3 E-commerce Infrastructure: The Internet, Web, and Mobile Platform Copyright 2015 Pearson

More information

1. Web Technology... 6

1. Web Technology... 6 TABLE OF CONTENTS 1. Web Technology... 6 1.1. Introduction (Hypertext, URL, Domain Name)...6 1.2. Web Browser and ISP...8 1.3. Upload and download files...10 1.4. Control of Internet...10 2. E-mail components

More information

Computer Applications I Vocabulary (Frameworks)

Computer Applications I Vocabulary (Frameworks) Computer Applications I Vocabulary (Frameworks) Unit 1: Introduction to the Operating System, Computer Systems, and Networks 1. Access keys shortcut keys; keys used in combination to create actions or

More information

Tennessee. Trade & Industrial Course Web Page Design II - Site Designer Standards. A Guide to Web Development Using Adobe Dreamweaver CS3 2009

Tennessee. Trade & Industrial Course Web Page Design II - Site Designer Standards. A Guide to Web Development Using Adobe Dreamweaver CS3 2009 Tennessee Trade & Industrial Course 655745 Web Page Design II - Site Designer Standards A Guide to Web Development Using Adobe Dreamweaver CS3 2009 ation Key SE Student Edition LE Learning Expectation

More information

CIW: JavaScript Specialist v2.0. Course Outline. CIW: JavaScript Specialist v Jun 2018

CIW: JavaScript Specialist v2.0. Course Outline. CIW: JavaScript Specialist v Jun 2018 Course Outline 14 Jun 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant & JAWS Compatible

More information

School Installation Guide ELLIS Academic 5.2.6

School Installation Guide ELLIS Academic 5.2.6 ELLIS Academic 5.2.6 This document was last updated on 2/16/11. or one or more of its direct or indirect affiliates. All rights reserved. ELLIS is a registered trademark, in the U.S. and/or other countries,

More information

Docufide Client Installation Guide for Macintosh

Docufide Client Installation Guide for Macintosh Docufide Client Installation Guide for Macintosh This document describes the installation and operation of the Docufide Client Application at the sending school installation site. The intended audience

More information

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved. Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,

More information

HTML, XHTML, and CSS. Sixth Edition. Chapter 1. Introduction to HTML, XHTML, and

HTML, XHTML, and CSS. Sixth Edition. Chapter 1. Introduction to HTML, XHTML, and HTML, XHTML, and CSS Sixth Edition Chapter 1 Introduction to HTML, XHTML, and CSS Chapter Objectives Describe the Internet and its associated key terms Describe the World Wide Web and its associated key

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2004 Kerio Technologies. All Rights Reserved. Printing Date: April 25, 2004 This guide provides detailed description on configuration of the local network

More information

PRIVACY POLICY Let us summarize this for you...

PRIVACY POLICY Let us summarize this for you... PRIVACY POLICY Let us summarize this for you... We promise to never sell your personal information. This site collects usage information to provide a better web experience for our users. If you purchase

More information

Installation Guide Advanced Authentication Server. Version 6.0

Installation Guide Advanced Authentication Server. Version 6.0 Installation Guide Advanced Authentication Server Version 6.0 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

All Adobe Digital Design Vocabulary Absolute Div Tag Allows you to place any page element exactly where you want it Absolute Link Includes the

All Adobe Digital Design Vocabulary Absolute Div Tag Allows you to place any page element exactly where you want it Absolute Link Includes the All Adobe Digital Design Vocabulary Absolute Div Tag Allows you to place any page element exactly where you want it Absolute Link Includes the complete URL of the linked document, including the domain

More information

National Unit Specification: general information. The Internet (Higher) NUMBER DM4F 12. Information Systems (Higher)

National Unit Specification: general information. The Internet (Higher) NUMBER DM4F 12. Information Systems (Higher) National Unit Specification: general information NUMBER DM4F 12 COURSE Information Systems (Higher) SUMMARY This Unit is designed to develop knowledge and understanding of the operating principles of the

More information

QuickBooks Online Student Guide. QuickBooks Online Education Introduction

QuickBooks Online Student Guide. QuickBooks Online Education Introduction QuickBooks Online Student Guide QuickBooks Online Education Introduction 2 Introduction The Intuit Education Program is dedicated to empowering educators and students to advance their skills and expertise

More information

Web Page, Digital/Multimedia and Information Resources Design CIP Task Grid

Web Page, Digital/Multimedia and Information Resources Design CIP Task Grid Secondary Task List 100 SAFETY IN THE MULTIMEDIA LABORATORY 101 Explain the Safety Data Sheet (SDS) system for hazardous chemicals and materials. 102 RESERVED 103 RESERVED 104 Practice correct ergonomic

More information

Chapter 2A. The Internet s History

Chapter 2A. The Internet s History Chapter 2A The Internet and the World Wide Web 1 The Internet s History At about 10:30 PM on October 29th, 1969, a connection was established over a 50 kbps line provided by the AT&T telephone company,

More information

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Introduction to Computer Science William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Chapter 4: Networking and the Internet No one owns the Internet, and only one

More information

What Is Voice SEO and Why Should My Site Be Optimized For Voice Search?

What Is Voice SEO and Why Should My Site Be Optimized For Voice Search? What Is Voice SEO and Why Should My Site Be Optimized For Voice Search? Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols

More information

CompTIA Network+ N ucertify Course & Labs. Course Outline. CompTIA Network+ N ucertify Course & Labs.

CompTIA Network+ N ucertify Course & Labs. Course Outline. CompTIA Network+ N ucertify Course & Labs. Course Outline CompTIA Network+ N10-006 ucertify Course & Labs 06 Jul 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Office 365. Quick Start User Guide

Office 365. Quick Start User Guide Office 365 Quick Start User Guide Contents What is Office 365?... 5 How to Sign In to Office 365... 5 To Sign Out when you are done... 5 Why Use Office 365?... 5 Office 365 Home Page... 6 Top right-hand

More information

ACE Chapter 4 review. Name: Class: Date: True/False Indicate whether the statement is true or false.

ACE Chapter 4 review. Name: Class: Date: True/False Indicate whether the statement is true or false. Name: Class: Date: ACE Chapter 4 review True/False Indicate whether the statement is true or false. 1. Today s Internet joins together networks of over 300 million computers, or Internet hosts, to create

More information

LUMINARE. Caitlin Curtin President and CEO. Jeffrey Schneider Vice President, Technology. Using Intranets for Training and Performance Support

LUMINARE. Caitlin Curtin President and CEO. Jeffrey Schneider Vice President, Technology. Using Intranets for Training and Performance Support LUMINARE Using Intranets for Training and Performance Support Caitlin Curtin President and CEO Jeffrey Schneider Vice President, Technology What is an Intranet? An enterprise s private network of computers

More information

Resource:http://whatis.techtarget.com/

Resource:http://whatis.techtarget.com/ A1 Terminology Urichuck Resource:http://whatis.techtarget.com/ Term Definition Image Blog Short for Web log, a blog is a Web page that serves as a publicly accessible personal journal for an individual.

More information

Networks and Communications MS216 - Course Outline -

Networks and Communications MS216 - Course Outline - Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the

More information

IMMERSIVE TERMS AND DEFINITIONS

IMMERSIVE TERMS AND DEFINITIONS IMMERSIVE TERMS AND DEFINITIONS 100 Interstate Blvd Edgerton, WI 53534-9399 800-410-6245 www.amsolutionswi.com Abbreviations CSS-Cascading Style Sheet GIF-Graphic Interchange Format GURL-Generic URL HTML-Hyper

More information

PLATO Learning Environment (v2.0) System and Configuration Requirements

PLATO Learning Environment (v2.0) System and Configuration Requirements PLATO Learning Environment (v2.0) System and Configuration Requirements For Workstations July 30, 2010 Windows XP Home and Professional (SP3) Windows Vista Home/Premium/Business/Ultimate Windows 7 Home/Premium/Business/Ultimate

More information