Bluetooth is a technology often used in this type of network |
PAN |
Network technology best suited to networks of ten or fewer computers |
Peer to Peer |
Computers need this hardware to connect to a network |
NIC |
Company that offers internet access to individuals and businesses |
ISP |
This device connects 2 or more networks (or computers) and directs the flow of information along the network |
Router |
Wireless LANs and public hotspots use ___________ technology to connect to the internet |
Wi-Fi |
Bluetooth, 3G, and WiMAX are examples of ___________ |
Network Standards |
________ is a newer standard for cell network technologies |
LTE |
_______ allows computers to be networked through ordinary telephone wires |
HomePNA |
Your computer needs a _______ to access a network |
NIC |
Fiber Optic Cable |
|
USB |
|
Coaxial |
|
Ethernet RJ-45 |
|
Twisted Pair |
|
A private corporate network for use by employees to coordinate e-mail and communications |
Intranet |
Network architecture in which one or more high-powered computers provide resources or services to other computers on the network |
Client-Server |
A private secure path across a public network (usually the internet) |
VPN |
A network where each computer is equal to others and maintains its own operating system and application software |
Peer to Peer |
Type of network that allows an organization to permit outsiders, like customers or suppliers, to access part of its network |
Extranet |
The standard method of business communication |
|
Skype and Tango are examples of this type of service |
Video Chat |
Text messaging is based on this technology |
SMS |
You can use this device for video chatting as well as surfing the internet |
Smartphone |
Flickr, Google, Outlook.com, Dropbox, and iCloud provide this type of service |
Online Storage |
You use ________ when your telephone calls travel over the Internet instead of using traditional phone systems |
VolP |
Buying and selling products via electronic channels such as the Internet is called _________ |
E-Commerce |
With _______, you can access storage and applications over the Internet |
Cloud Computing |
The internet connects millions of computers connected through millions of _________ worldwide |
Networks |
_________ does not allow changing service or bandwidth because a website allows illegal media sharing |
Net Neutrality |
A collection of millions of websites |
World Wide Web |
The first graphical Web browser released in 1993 |
Mosaic |
Another term for Short Message Service (SMS), messages of less than 160 characters sent via a cellular network |
Text Messaging |
A collection of related web pages connected by hyperlinks |
Website |
A Hypertext Markup Language (HTML) document |
Webpage |
This person can manually submit a URL to a search engine |
Web Master |
These are descriptive data and words entered into the header section of a Web page when its created |
Meta Keywords |
A web site like www.google.com that is designed specifically to help you find information on the web |
Search Site |
A web crawler, an indexer, a database, and a query processor are all components of this |
Search Engine |
A search engine returns a list of these, which are links to web pages that match your search criteria |
Hits |
T/F – Servers that host part of the Domain Name System are called domain name servers, or DNS servers |
True |
T/F – File sharing sites like YouTube and Flickr let you post and share photos, music and other media |
True |
T/F – Some sites on the Internet have the same IP address |
False |
T/F – Sites that let you access your email account from public computers like the ones in the library are called file sharing sites |
False |
T/F – The .mobi TLD (top level domain) is used by sites that are optimized for mobile devices |
True |
T/F – The world wide database of domain names and corresponding IP addresses is called the Domain Name System |
True |
A forum temporarily saves messages and often uses a ___________ to approve messages before they are posted to read |
Moderator |
Synchronous communication that everyone who is communicating must be _______at the same time |
Online |
A system that lets people exchange short messages while they’re online |
Realtime Messaging |
A _________ or internet forum is an online discussion site where people participate in a conversation by posting messages |
Message Board |
A _________ program, used to participate in a newsgroup, is often provided with some e-mail software |
Newsreader |
Members of the public who report on current events |
Citizen Journalists |
Type of communication such as blogging, where authors and readers do not need to be online at the same time |
Asychronous |
A Web page listing journal entries that provide commentary and information, usually about a particular interest |
Blog |
A type of Web page that a group of people can comment on or make changes to |
Wiki |
A post to a microblog such as Twitter |
Tweet |
Using an RSS feed: Internet Explorer lists the feed in the Favorites Center |
4 |
Using an RSS feed: You click the Feeds button |
2 |
Using an RSS feed: Internet Explorer displays the Feeds button in orange |
1 |
Using an RSS feed: You click a bold feed name in the Favorites Center to display updated content from the Web site |
5 |
Using an RSS feed: You click a subscribe link on the Web page |
3 |
T/F – Video sharing sites such is YouTube and Vimeo provide a place to post short videos called clips |
True |
T/F – Social Networking sites never allow members to post messages on pages of other members |
False |
T/F – You can use Facebook’s live feed tool to broadcast content as you post it |
True |
T/F – You have no control over who views your social network information |
False |
T/F – To join a social network, you create an avatar |
False |
Social Networks, including synonyms for networks |
~networks social |
Pages about the exact phrase, social networking sites |
"social networking sites" |
Pages about social networks, social networking, and a social network |
Social network |
Information about Apple’s social networking technology |
Site:www.apple.com social networking |
Social networking sites other than Facebook |
Related:www.facebook.com |
Y/N – Scan the page for quotations from experts |
Yes |
Y/N – Make sure the information was published or updated |
Yes |
Y/N – Consider whether the page contains typos and grammar errors |
Yes |
Y/N – Make sure the photos and video clips show a sense of humor |
No |
Y/N – Consider whether the author has a conflict of interest |
Yes |
Engine that search web pages in its database that contains specific words or phrases |
General Search |
Service that connects you to a human librarian |
Online Reference |
Finds subjective content, such as comments, reviews and opinions |
Social Search Tool |
Engine that provides access to academic information for research |
Specialty Search |
Offers the convenience of searching many sources from one website |
Metasearch Engine |
T/F – Your computer should be password protected |
True |
T/F – There is no way to track your cell phone once it is lost |
False |
T/F – With cloud storage, you can retrieve your data anytime from anywhere in the world |
True |
T/F – Your best protection from losing your data is to backup your files to your hard drive |
False |
T/F – Firewalls inspect data transmitted between a computer and external recipients to prevent unsolicited data exchanges |
True |
T/F – A thief must physically steal your computer to gain access to its files and data |
False |
Computer taken over by hackers to perform malicious tasks across a network |
Bot |
Common forms include viruses, Trojan horses, and worms |
Malware |
Software secretly installed on networked computers that tracks and transmits personal data without your knowledge or permission |
Spyware |
Displays unwanted advertisements in banners or pop-up windows on your computer |
Adware |
Used by commercial web site vendors to identify users and customize web pages |
Cookie |
A high level of encryption for wireless devices |
WPA2 |
Method used to verify the identity of computer users |
Authentication |
A strong password |
Jo$e185#ntK |
Security feature often built into operating systems |
Firewall |
A unique name you create to identify yourself to a computer system |
Username |
A slowed down WIFI connection can be the result of this |
Piggybacking |
Type of malware that spreads without human interaction, sending itself out to everyone in your address book |
Worm |
Type of malware that is spread when you distribute infected files, especially as e-mail attachments |
Virus |
Type of malware that collects bits of data, like your surfing habits |
Spyware |
Scam that looks like a genuine message or web site, but tries to get you to reveal sensitive information |
Phishing |
Indication that a web site is secure for shopping |
https:// |
Indication that a website is not secure |
Misspelled company name |
E-mails that might appear to come from your bank or credit card company, asking you for email logon or personal information |
Phishing |
Online payment method to avoid |
Money transfer |
One secure method of online payment |
Electronic wallet |
Excessive use of gaming, video, research & surfing, texting, blogging, social networking & shopping coupled with the inability to stop |
Signs of internet addiction |
A way to relieve overall stress on body and breakup workflow |
App that reminds you to take a break |
Swiping, tapping, pinching a tablet, or clicking and dragging a mouse repeatedly |
Causes of RSI’s |
Straining to read at an awkward angle or viewing a screen for too long |
Causes of headaches & eyestrain |
Having eyes even with the top third of a monitor |
Relieves eye and neck strain |
Using text messages to get you to download a mobile app that steals your information |
Smishing |
The process used to verify or identify computer users |
Authentication |
A type of fraudulent e-mail that typically contains misspellings and dire warnings |
Phishing |
Using physical features such as fingerprints, facial recognition, & retinal scans to verify a person’s identity |
Biometrics |
A way to adjust security settings offered by Internet Explorer |
SmartScreen filter |
Present hardware and software that meets a buyer’s needs |
Computer seller |
Write programming code |
Software developer |
Assemble computer parts |
Manufacturer |
Set up computer equipment for other employees |
IT department |
Collection of software development tools |
IDE (Integrated Development Environment) |
Word processing interface that programmers use to write code |
Program editor |
Examines software code line by line to identify errors |
Debugger |
Converts assembly code into machine code |
Assembler |
Repository of pre-existing software code for common functions |
Code library |
A data retrieval tool that finds specified data within a database |
Query |
A collection of records |
Table |
A data entry tool used to input data into a database |
Form |
The display format you choose when working with a database object on the screen |
View |
All of the fields for a single database entity |
Record |
Do this with devices you don’t want, rather than discarding them |
Donate (image) |
Electronic trash is often shipped overseas |
Trash (image) |
Devices that become e-waste |
Electronic devices (image) |
Indication that a product was built using energy-efficient standards |
Energy Star (image) |
Certification a company or recycling business can receive from the international non-profit environmental group, Basil Action Network |
e-Stewards enterprise (image) |
T/F – Manufacturers are making an effort to build energy-efficient computers and use recyclable cases and packaging |
True |
T/F – Refilling ink and toner cartridges unfortunately consumes more energy than manufacturing new ones |
False |
T/F – Energy vampire devices draw power even when they are turned off or in standby mode |
True |
T/F – One reason to move to a paperless society is that printers are becoming prohibitively expensive |
False |
T/F – Before donating a computer, you should use a program to wipe the hard disk to remove all its data |
True |
Y/N – Receiving permission from a photographer to use one of his photos |
Yes |
Y/N – Copying a photo from a website and then using it without requesting permission |
No |
Y/N – Copying a quotation from a website and citing the source |
Yes |
Y/N – Copying content from a Wikipedia article, changing the words, and using text without citing the source |
No |
Y/N – Downloading a video in the public domain and using it is a presentation |
Yes |
CompConFinal
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price