Internet Technologies

¡Supera tus tareas y exámenes ahora con Quizwiz!

Hypertext Markup Language (HTML)

A computer language that web pages use to display content through web browsers.

You submitted the same paper from high school for a college class. Which form of plagiarism is this?

Self

A major capability of Alexa is its ability to do what?

Control smart devices

Small files that a website saves on your computer to remember your preferences are called ______________.

Cookies

Which of the following are considered asynchronous technologies? (Select two.)

Email Message boards

Intranet

A private network, usually hidden from the internet and protected by a security device, that uses the same technologies that are used on the internet and may or may not be connected to the internet.

Universal Resource Locator (URL)

The reference or address to a resource on the Internet. Example: http://www.testout.com/home/about/privacy

Which method should be used to search for an exact phrase?

Put the search terms in "quotes"

Which of the following charges resources used, such as bandwidth and processing power, by the second?

Google Cloud

Netiquette

Rules of etiquette that should be observed while using computer networks, such as the internet.

Files that you send along with an email message are called __________.

Attachments

Cloud Computing Business Solutions

Modern businesses are always looking for ways to make their processes more efficient, and cloud computing solutions are a way to do just that. With cloud computing, everything is done through the internet. Apps are distributed and run, data is stored, and other services are provided without having to dedicate space on local physical computers. This helps businesses reduce overhead costs created by running too many computers. These kinds of platforms also provide more security and flexibility than their traditional counterparts. There are many cloud computing solutions available today with more being created all the time. Several companies offer broad cloud computing suites that provide a variety of services for their clients. These include Microsoft Azure, Google Cloud, and Amazon Web Services (AWS). Currently, there is very little standardization between cloud services, meaning that no two providers offer the exact service in the same way. This can make it difficult for a business to use more than one cloud service provider at once. Microsoft Azure Microsoft Azure (formerly Windows Azure) is Microsoft's cloud computing business solution that's been operational since 2010. It encompasses a growing library of web-based business solutions. It also supports a wide variety of programming languages and both Windows and Linux operating systems. In order to keep all their services running, Microsoft has built data centers all across the world that provide services to more than 140 countries. Azure operates on a pay-as-you-go pricing model, which means you only pay for the services you use when you use them. Some applications use multiple Azure services and therefore involve different pay scales. Microsoft also offers discounts when businesses purchase long-term contracts for certain services. Some of Azure's services include the following: The ability to launch virtual machines that run both Linux or Windows. This is also known as providing Infrastructure as a Service (IaaS)An online environment to let developers easily create and manage websites. This is also known as providing a Platform as a Service (PaaS)Beta testing for mobile apps Cloud data storage Online messaging services Data analytics Monitoring and controlling devices on the Internet of Things (IoT)Machine learning services. (This term basically just means AI in almost all cases.)Data backup and disaster recovery Google Cloud Google's cloud-based business solutions package, known as Google Cloud, has been available to the public since 2011. It also operates on a pay-as-you-go basis like Microsoft Azure. It offers discount tiers for sustained use, for customized use, and for committed use of its products. Its largest focus is to help businesses build and deploy software and is especially adept at handling complex applications with many intricate parts. Google Cloud has large-scale (hyper-scale) data centers that allow you to use their immense computing power to get things done. Their cost model is set up differently from most competitors. Google charges you not for the machines themselves, but for the resources they use (bandwidth and processing power) per second. This option is best for those who need a long-term operating solution. Google Cloud currently provides over 90 different products as part of the brand, including the following: Cloud storage Cloud databases Virtual private clouds for organizations Data analytics Online text analysis Cloud speech to text and vice versa Online management tools Online security tools Management of IoT devices Amazon Web Services Amazon's cloud-based services platform, Amazon Web Services (AWS), has been around since 2006. Its services are also pay as you go and don't require any upfront costs. It can interface with any programming language or operating system. AWS breaks its services down into essential cloud services (virtual machines, cloud storage, application deployment, etc.) and optional support services. AWS offers the following and more: Hosting applications including SaaS programs Virtual machines that can be customized to be computer-optimized, memory-optimized, or storage-optimized machines Web hosting Data backup and storage, including long-term storage Delivering content to end users Providing database solutions Transcription and translation services IoT control Artificial Intelligence (AI) services Augmented Reality (AR) and Virtual Reality (VR) services Game development services

Email Etiquette

Netiquette refers to rules of etiquette that should be observed while using computer networks, such as the Internet. Using a computer to interact with other users tends to impart a sense of anonymity, which can cause you to behave in ways that are impolite or even offensive. To keep this from happening, Netiquette proposes a general set of guidelines that all network users should adhere to. The overarching rule of netiquette is this: Don't do or say anything to another person online that you would not do or say if you were looking at them face to face. Show Consideration for Other Users' Time Before making an online post or sending an email, make sure it is worth the time of those who will read it. A common violation of this rule occurs when someone forwards a mass email message of questionable origin to everyone in their address book. Before doing this, consider the following: Verify the authenticity of the information you are sending. Ask yourself whether the recipients actually need (or even want) to read it. Use Appropriate Spelling and Grammar The anonymity of the Internet frequently makes users careless about following spelling and grammar rules. This can make a message difficult to read and can even make it impossible to decipher. Also, avoid using all capital letters. On the Internet, this is considered "shouting." Write Clearly and Concisely A lot of Internet users are careless about how they communicate ideas in messages and posts. To respect other users' time and to make sure your ideas are communicated correctly, be sure your posts and email messages are:Clear. Read through your message and make sure your point is clearly stated. Remember, the reader may not have the same background that you have. Will they understand what you are trying to say?Concise. Be brief and to the point. Nobody likes to wade through a ten-page email or post trying to find important information.Readable. Use understandable terms when you write. Many Internet users prefer to use shorthand terms in their posts and messages, such as u r ("you are") and idk ("I don't know"). While using shorthand can reduce the amount of time needed to compose a message, it makes it much more difficult to read. It can also obscure the meaning and intent of your message, resulting in misunderstandings. Avoid Being a Troll A troll is someone who deliberately tries to create conflict among users. Expressing your opinion is encouraged on the Internet; however, trolls are not usually interested in engaging in a healthy dialog. Instead, they seek to cause contention and disrupt the conversation. Trolling tactics include the following: Posting provocative, offensive, and even hateful messages to incite a response from other users. Posting off-topic messages in an attempt to start an argument. Posting obscene or menacing messages to harass another user. If you encounter a troll, the best response is to just ignore them. Obey the Law Be familiar with the laws in your jurisdiction surrounding computer use and cyber security, and abide by them. For example, in the United Kingdom, the Communications Act of 2003 criminalizes the act of being an overly aggressive Internet troll that targets a specific individual. Reply You'll often want to respond directly to the sender of an email without replying to the other recipients. To do this, use the Reply option rather than Reply All. If needed, you can then add other recipients to your reply manually. By default, a message reply will not include email attachments that were included in the original message. Reply All Use this option to send a message to everyone included in an email: the sender, recipients listed in the To: field, and recipients in the Cc: field. Use the Reply All option only when your reply contains information that is critical for all recipients. Otherwise, use Reply and then add other recipients manually. Forward Use this option to send an email from your Inbox to another person. By default, a forwarded message will include all email attachments that were included with the original message. After selecting the Forward option, you can add a brief note at the top of the original message as needed. File Attachment An attachment is a separate file, such as a Microsoft Word document or a photo, that is sent through email. When you send an attachment, the recipient of your message will be able to download their own copy of the file to their computer. Be careful when opening email attachments. Sometimes malicious users will attach viruses or other malware to an email, so you should only open an attachment when it's from a source you recognize and trust. Cc Cc stands for carbon copy or courtesy copy. In your email program, add people to this field who should be kept in the loop, but aren't necessarily expected to respond. Bcc Bcc stands for blind carbon copy. People added to this field will receive the email, but their addresses will be hidden from other recipients. Junkmail Junkmail refers to unwanted, unsolicited email, including product advertisements, hoaxes, dubious opinions, and scams. Most email clients include a feature that automatically filters out junkmail. Domains or email addresses that are not caught with standard email filters can be blocked manually and then sent to a junk folder. If a legitimate email is mistakenly flagged as junkmail, the address can be added to a "safe senders" list.

Match each source on the left to its source type on the right.

A catalog of all the mayor's speeches and news articles about them Tertiary source correct answer: The transcript of a speech by the mayor Primary source correct answer: A news article about the mayor's speech Secondary source correct answer:

Messaging

A form of written communication similar to texting but is typically done with the use of an app like Facebook Messenger or WhatsApp, usually on a mobile device.

Streaming

A method of transmitting and receiving data (especially video and audio information) over a network as a steady, continuous flow, allowing playback while the data is being transferred.

On-Demand Streaming

A streaming method that allows users to select and watch or listen to video or audio when they choose, rather than at a scheduled broadcast time.

Live Streaming

A streaming method that transmits data in real time as it is created.

Which of the following is most likely to have peer-reviewed material written by an expert in the field?

Academic journal

Which digital assistant's voice was inspired by the voice of the supercomputer on the USS Enterprise in the Star Trek series?

Alexa

Digital Assistants

Almost every computer or smart device on the market today comes equipped with a digital assistant. Not only are these assistants part of smartphones and computers, but they are now common in smart home devices such as Amazon Dot and Google Home. Understanding the features of each will help you become a better user of various kinds of technology. These digital assistants can make a variety of tasks easier, especially by allowing you to control your device with just your voice. Digital assistants are based on artificial intelligence (AI) and a field of computing known as natural language processing (NLP), where a computer interprets natural human speech into commands that it can execute. Many of these assistants can learn and adapt over time to your speech patterns to become more accurate and helpful. Siri One of the earliest digital assistants was Siri, which debuted on the Apple iPhone 4S in 2011. It's now available on a wide variety of Apple devices, including the iPad, iPod Touch, Apple Watch, AirPods, HomePods, and on Mac computers that run macOS Sierra or later. The idea behind Siri was a virtual assistant that would respond to voice commands given in a natural way. Siri's capabilities have grown over the years and it currently can do things such as open programs, set reminders, play music, set alarms, send text messages, navigate to a destination, and run internet searches. One of the fun things that has set Siri apart are the variety of Easter eggs the developers have worked into the program. There a variety of humorous things you can ask Siri, which results in a tongue-in-cheek response, such as Beam me up, Scotty. You can also ask Siri to tell you a joke or beatbox (a form of vocal percussion) for you. Siri can also be used in a variety of languages in addition to English. These include German, French, Spanish, Mandarin Chinese, Russian, and many others. Cortana With the release of Windows 10, Microsoft unveiled its own digital assistant named Cortana. It was incorporated into Windows Phone (WP), Invoke smart speakers, Microsoft Band, and Surface Headphones, Xbox consoles, and Android phones. It was named after a fictional AU character in the Halo video game (a video game franchise on the Xbox). The voice actress for the character in the game reprised her role. Cortana functions similar to Siri and can recognize natural speech patterns to set reminders and answer questions. It uses the Microsoft search engine, Bing, which is incorporated into Microsoft products and the Microsoft Edge web browser. It's also available in other languages besides English. Amazon Echo Dot In 2014, Amazon released its digital assistant named Amazon Alexa (usually referred to as Alexa). It can interact with your voice, play music, set alarms, stream podcasts, play audio books, provide weather reports, traffic reports, and fetch information such as the news. The sound of Alexa's voice was inspired by the voice of the computer on USS Enterprise (from the tv series Star Trek). One of Alexa's major capabilities is its ability to control smart devices throughout a home, such as lighting, security systems, and even appliances like microwaves. Alexa's capabilities can be expanded by installing third-party skills (similar to apps) that give Alexa new abilities. Some Alexa-enabled devices wake up and start listening to you if you say Alexa. This is a privacy concern for some. Models are available that require you to push a button on the device to allow it to start listening. Google Assistant Google's first attempt at a virtual assistant was called Google Now. It was launched in 2012. It proactively gave users what it predicted they would need based on their search habits. By 2016, the company had transitioned into the new Google Assistant that allows two-way voice conversations with users. Google's AI assistant is available on a variety of mobile and smart home devices, such as speakers and appliances. It was originally available only on Google Pixel and Google Home but is now available on a variety of other Android devices. It's even available in limited form on Apple products. Google Assistant can be used hands-free by simply saying, "OK, Google" and then giving it a command. It has a feature called continued conversation, which means you don't have to repeat the wake up phrase once you've started talking to it. Google Assistant continues listening for a while after you've activated it as well. It can recognize different voices that it's become used to and tailor its responses accordingly. Google Assistant can take voice commands, run Google searches, control connected devices, play music, make appointments, send messages, read aloud notifications, translate in real time, play content through Chromecast (and other streaming devices), access information from your calendars, etc. It integrates with other Google services like Google Maps to provide directions and Google Play to provide entertainment.

Online Chat

An online written form of communication that is typically web based and used by businesses as customer service tools to assist online users who visit their websites.

Academic Source

Books or articles written by experts who have credentials in a particular field of study.

Social media marketers need the ability to do what?

Collaborate across teams

Texting, Messaging, and Online Chat

Communication technology has made tremendous progress in recent years. Smartphones, tablets, and laptops allow for easy communication though texting, instant messaging, and chat. In this lesson, we'll compare and contrast these different technologies. Though these terms are sometimes used synonymously, there are important distinctions between them. But in the end, what's important is that all these technologies allow people from every part of the world to connect in seconds. Texting "Merry Christmas" was the first text message ever sent. It was sent on December 3, 1992, by Neil Papworth, a former developer at Sema Group Telecoms. Since then, text messaging through means of Short Message Service (SMS), has outranked the typical phone call as a way to communicate and is used by 81% of all cellular phone users. SMS supports 160 characters per message, but most cell providers can divide long messages into smaller pieces for transmission and reassemble them on the other side. Multimedia Messaging Service (MMS) is an extension of SMS that supports picture, audio, and video messaging. SMS and MMS messages are typically sent though a messaging app on a smartphone and are saved as they're sent and received. These messages can be sent over a cellular network or the internet. Messaging Messaging is similar to texting but is typically done with the use of an app (like Facebook Messenger or WhatsApp), usually on a mobile device. With text messaging, you have to know the phone number or email address of the person you're texting. But with messaging, you can talk to anyone who is also using the app, giving you a greater reach. Messaging also allows you to see and share more content with others. For example, Facebook allows you to post items for sale so potential buyers can message you to arrange a deal. Businesses can create pages that allow consumers to message them about products or services. Online Chat Before the smartphone era, online chats were very popular. The CompuServe CB Simulator came out in 1980 and was the first online chat service that was available to the public. Nowadays, online web chats are primarily used by businesses as customer service tools to assist online users who visit their website. Online chats have also started to utilize AI technology to automate common responses to customers, allowing them the ability to quickly ask questions. Also, in many cases, it's easier for a customer to chat with a business then to call their customer service by phone. Since online chatting is typically web based and not mobile friendly, companies have been working to integrate SMS, Facebook Messenger, and voice messaging into online chats to allow for a better customer experience. A typical online chat isn't saved unless a copy of the chat is downloaded at the conclusion of the conversation. For this reason, you cannot go back to the chat after it's been closed and continue where you left off.

Which of the following runs exclusively from the cloud, relying on cloud technologies? (Select two.)

Dropbox Google Drive

Which of the following are advantages of cloud computing? (Select two.)

Easier collaboration Data security

What is one of the things that has set Siri apart from other digital assistants?

Easter eggs

Besides entering a URL to go directly to a website, what else can you enter in a browser address bar to explore the internet?

Enter one or more search terms for a topic.

Which option should you choose to send an email you've received to a new person?

Forward

In addition to good design sense, what else do web designers need to be proficient in?

Front-end coding languages

Which of the following is used to change traffic lights for emergency vehicles?

ITCS

Voice over IP

How VoIP Works VoIP, or voice over Internet Protocol, is a process that takes analog audio signals and turns them into digital data that's transmitted over the internet or a local area network (LAN). Instead of a traditional circuit-switched transmission over the public switched telephone network (PSTN), VoIP technology uses packet-switched protocols that transfer sound by emulating the movement of speech waves. Each block of data is labeled with the destination's address so the data can find its way to the correct destination. Using VoIP allows for free phone calls using a standard internet connection, bypassing a phone carrier and their charges. History of VoIP VoIP transmissions first began in 1973 as a result of the experimental Network Voice Protocol (NVP) invented for the ARPANET. It wasn't until 1995, however, that an Israeli telecom equipment provider named VocalTec created the first for-profit internet phone. Their phone allowed users to call each other through connected speakers and microphones that used the same software. VocalTec also came out with computer-to-telephone and phone-to-phone calling features, though the adoption of VoIP was meager at only around 1% due to a surplus of ads. By 1999, VocalTec encountered some competition when Teledvance entered the market with advanced VoIP capabilities. Teledvance didn't have to rely on disruptive advertising for revenue since by then the corporate market was desperately seeking for cost-effective alternatives to making calls over the internet. By 2003, 25% of all calls were VoIP calls due to the expansion of broadband connectivity. In the early 2000s, Session Initiation Protocol (SIP) evolved as a protocol that allowed developers to avoid the limitations of expensive hardware and create applications that could integrate with almost any smartphone platform. In 2003, Skype launched its beta software and emerged as one of the first applications to allow calls to landlines and cells phones using VoIP. Skype continued adding new features and by 2005 had integrated video chat into its software. Nowadays, Microsoft Skype for Business is available in 108 languages and offers many more features like instant messaging, video calls, online meeting capabilities, cloud productivity apps, and more. This made them hands down the leading contender in the VoIP market. In 2005, the number of registered Skype users was 50 million which later increased to 660 million by 2010, 300 million of them being active monthly users. Today, there are dozens of other programs and smartphone apps that allow you to make VoIP calls, including Google Talk, WhatsApp, and Apple FaceTime. Advantages and Disadvantages Since 2010, communication using VoIP has rapidly increased worldwide. One major reason for this adoption is its cost savings. As VoIP works off your current internet connection, companies can do away with traditional phone lines and have one account for internet and phone usage. Users can then communicate using VoIP from PC to PC with no additional charge. Using a VoIP system allows for better accessibility as location makes no difference, also allowing for video conferencing from multiple locations around the world. VoIP communication is possible simply if there's an internet connection available for all parties. Though cost savings and flexibility are major advantages to VoIP systems, they do come with a few disadvantages. VoIP systems rely fully on a stable internet connection with adequate bandwidth. In the event of a power or internet outage, VoIP becomes unavailable. Because of this, some businesses have a traditional backup phone line in case of emergencies. For most companies considering a VoIP system, the advantages far outweigh the disadvantages as it cuts expenses and eliminates the need for employees to be at the office in order to collaborate with coworkers. VoIP has changed the ways we collaborate and allows everyone to work together no matter where they are in the world.

Which of the following tech careers builds infrastructure for networking, telephones, radio, and other communication channels?

Internet service technician

Owners of internet-enabled cars can use their phones to do which of the following?

Monitor fuel usage

Which of the following typically does NOT save a conversation after it has taken place?

Online chat

Avoiding Plagiarism

Plagiarism is defined as taking someone else's work and passing it off as one's own. The word comes from the Latin root "plagiare," which means to steal. Plagiarism is considered an act of fraud and is the most frequently violated offense under most schools' academic code of conduct. In this lesson, we'll go over some different types of plagiarism to help you understand how to best avoid each one. History of Plagiarism The word "plagiary" was introduced into the English language in 1601. By the mid-1600s, allegations of plagiarism were common in every field, though not regarded as a problem until the 1700s. The first English copyright laws were passed in 1709 at a time when storytellers began to print literary works and society began to place a high price on their uniqueness. Today, many copyright laws are still based on those laws passed back in the 1700s. With the evolution of technology and science, these laws have been expanded to cover online, video, and musical works. Though plagiarism is considered an offense against the original author, a copyright violation is typically an offense against the copyright holder, which nowadays is typically not the same person as the author. In many cases, a copyright violation and plagiarism are basically the same. Common Types of Plagiarism There are many different types of plagiarism and most carry the same consequences. Let's discuss the different types and possible penalties that can follow. Direct Plagiarism Direct plagiarism is a word-for-word copy of someone else's work. This type of plagiarism can be avoided by citing or annotating the author in your work. Citing your sources also makes your work credible and can help you back up your research. The Modern Language Association (MLA), an organization created to develop rules on proper language and literature structure, has guidelines on how to properly cite your work. There are even websites like citationmachine.net that can help you easily create an MLA-formatted citation. Not citing your sources is an unethical form of writing and many schools' academic codes of conduct state that it can result in expulsion. Self-Plagiarism Self-Plagiarism is a lesser-known type of plagiarism. This is when someone submits their own previous work (or parts of it) without permission from all involved, typically a professor. A common example is someone submitting the same paper from high school for a college class. This type of plagiarism is harder to catch but is still considered unethical. Mosaic Plagiarism Mosaic plagiarism, or "patch writing," is similar to direct plagiarism. The difference is that it occurs when someone copies phrases from someone else's work and doesn't use quotation marks or a citation for the source. Mosaic plagiarism can also occur when synonyms are used to replace words while keeping the meaning of the original phrase. This type of plagiarism is also considered unethical and can have academic consequences if caught. Accidental Plagiarism Accidental plagiarism occurs when a person fails to quote (or misquotes) their sources unintentionally. This can also be inadvertently done by using comparable wording or sentence structure. Despite being unintentional, accidental plagiarism can carry the same consequences as other types of plagiarism. Avoiding Plagiarism Today there are numerous online tools that can help you avoid plagiarism by carefully scanning content and comparing it with your work. Copyleaks is a plagiarism-checker application that detects plagiarized and paraphrased content with AI technology. You can also avoid plagiarism by simply being careful to properly cite your sources and not use past literary works in your current writing. Following these guidelines will assure that your work is honest and ethical and will help you avoid unnecessary penalties in your future endeavors.

Which digital assistant is native on Apple devices like the iPad or Mac computers?

Siri

Which digital assistant was one of the earliest?

Siri

Some IP-enabled devices are not considered IoT devices. Which of the following is considered an IoT device?

Smart door lock

Digital Assistant

Software found on almost every computer or smart device that makes a variety of tasks easier, especially by allowing you to control your device with just your voice. Examples of digital assistants are Apple's Siri, Microsoft's Cortana, Amazon's Alexa, and Google's Google Assistant.

Which of the following is the MOST important skill an internet service technician can possess?

The ability to quickly troubleshoot and fix any issues that may arise from customers

Plagiarism

The act of taking someone else's work and passing it off as one's own.

Citation Style

The format used for citing academic sources, including author, date of publication, and journal title.

Buffering

The pre-loading of data from a stream into memory to help avoid interruptions while waiting for data that is received in bursts.

Which of the following is the BEST reason to search for articles in an online academic database?

The sources are more likely to be peer reviewed

Proxy Servers

Think of a proxy server as a gateway between you and the internet. It's a middle ground that provides extra security, privacy, and protection for the end user. When a proxy server is in place, the information is sent first to it and then to the end user, with the same thing happening in reverse. Many people use proxy servers because of the sheer number of malicious sites on the internet that can harm your computer or steal your personal information. Internet Protocol Addresses Every computer on the internet has a unique identifier known as an Internet Protocol (IP) address, which can be thought of as similar to a street address. Having an address system like we do allows us all to give directions to our homes and send mail in an easy and standardized way. The same is true with proxy servers. They have their own IP address, like a post office that collects mail and sorts it before it's sent out to its final destination. The same line of thinking applies to visiting a website with a proxy server— it makes the website request on your behalf. Following this, it receives the response from the website and sends it to you in your web browser. Sometimes, proxy servers change the data before sending it to you or back to the website. There are a few different categories of proxy servers, including the following: Transparent Proxy Servers: This kind of server tells websites that it is in fact a proxy server and passes along your IP address so that your identity and location are known. These are easy to set up and are often used on public computers, such as those at libraries and schools. Anonymous Proxy Servers: This kind of server tells websites that it is in fact a proxy server, but it doesn't pass along your IP address. This means that you remain private and helps you avoid being given content such as location-specific advertisements. Distorting Proxy Servers: This kind of server tells websites that it is in fact a proxy server, but then passes along a false IP address. This means that you appear to be in a different place than where you actually are. High-Anonymity Proxy Servers: These proxy servers periodically change the IP address they give out, making it the most secure and difficult to track of all the different types. Privacy and Performance One thing that a proxy server can do is change your IP address before it contacts the website. This masks where you are in the world and provides you a layer of privacy as you conduct your business on the internet. It can also encrypt your data while it's being transported. This means that it won't be readable while it's being transported. So even if someone intercepts your data, they won't be able to read it, which keeps you safe from having sensitive data fall into the wrong hands. A good proxy service can also help improve network performance. The proxy server does this by creating a cached version of websites that you visit often. This is like a copy that can be easily accessed when needed. The next time a person accesses a stored site location, the proxy server can use the cached copy of it instead of going all the way back out to the web for a new copy. When many people are trying to access the same high-use site at the same time, it can use cached copies in order to save on bandwidth and increase the network's overall performance. Companies can also use proxy servers to set up a virtual private network (VPN). A VPN is a direct connection to the company's network that can be accessed by remote users. This allows these remote users to privately and securely access company resources no matter where they are. Firewalls and Filtering One vital function of proxy servers is to provide filtering and firewall services. A firewall is a network security device (either hardware or software) that monitors all incoming and outgoing traffic and decides whether to allow it based on certain security rules. This means that a proxy service can block a person from accessing a website based on different criteria, such as the IP address, keywords it contains, or content. Individuals can put up filtering services on their own computers to block inappropriate content from children, and businesses often use filtering services to make sure their employees only access certain kinds of websites while on the job. Companies also use proxy servers to monitor employees' web activity by logging all the web addresses an employee visits. This helps cut down on cyber loafing, which is when an employee is wasting time on non-approved sites instead of doing work. Finally, a proxy server can be used to access resources that would otherwise be blocked. Some countries restrict access to certain internet resources. A proxy server that masks your location can be used to get around these restrictions.

When you stream video, the server doesn't verify that your computer received the files correctly. It just sends a continuous stream of data. This type of transmission has advantages and disadvantages. What issue can this potentially cause?

The video may become glitchy.

Which of the following are considered private technologies? (Select two.)

Video conferencing Instant messaging

Online Searching

Use the Browser Address Bar To perform an online search, you can visit the website for your preferred search engine, such as google.com or bing.com, and then begin entering search terms. However, for a quick online search, you can enter search terms directly into the address bar of your web browser, which will forward them to the default search engine. If you enter the URL for a website, such as testout.com, the browser will display the website. But if you enter one or more search terms separated by a space, the terms will be processed by the default search engine. Sift Through Search Results Search engines use complex algorithms that rank websites according to their popularity, responsiveness, and overall "relevance." These rankings influence which sites are displayed near the top of your search results. Most search engines also highlight links to related content sponsored by advertisers. As you sift through search results, if you're looking for products or services related to your search terms, you might want to consider clicking on an advertised link. Otherwise, you'll want to ignore them and scan the list for more reliable, objective information. It's often a good idea to click through a few pages of results, since the most relevant pages might not be at the top of the list. Narrow Your Search At the top of the list of search results, most search engines include a few options for narrowing your search to specific result categories. For example, you can click "News" and see news articles related to your search terms. Or you can click "Images or Videos" to view media results. Another option for narrowing your search is to return to the Search box and add or clarify search terms. You can also put some or all of the terms in quotations, which tells the search engine to display results containing that exact phrase instead of results that include each of the individual words. Use Advanced Search Options All of the popular search engines have some kind of advanced search option. Advanced searches provide several ways to refine and narrow your search, including fields for "exact words" and fields for words you do not want to be found in the source. You can also narrow the search by language, region, domain, and file type. One important thing to note about advanced searches is that the search filters are cumulative. This means you can apply as many of the filters as you want and they will all be applied at the same time. If your search ends up being too narrow, you can go back and remove some of the filters or try alternative phrases. Verify Facts Since information on the Internet is not regulated by a fact-checking body, it's important to verify claims by looking at multiple sources. Don't trust one or two sources of unverified pieces of information. Investigate Author Biases If you have any reason to doubt the reliability of an author's claim, find out more about his or her affiliations and investigate possible biases. What is the author's purpose? Is it simply to inform as objectively as possible, or is it to persuade you or sell you something? Does the author seem to be overly emotional or making outlandish claims? Use Scholarly Sources for Academic Research If you're working on academic or professional research, limit your searching to scholarly authors who have credentials in their field. Online academic databases such as Google Scholar are configured to limit search results to scholarly sources.

When might it be MOST helpful to clear your browser's cache of temporary Internet files?

When a website is not functioning as it should

Blogs and Wikis

What Is a Blog? The word "blog" comes from the combination of "web" and "log." The owner of the blog produces posts that appear on the main page, usually with the most recent post at the top. A blog post can contain text, images, video, or other media. They usually have a more casual, conversational style than most mainstream websites. Successful blogs are updated on a regular basis. Other people can subscribe to the blog to receive a notification whenever there's a new post. They can also leave comments on posts to express their opinion or answer a question that the blog's author asked in the post. Readers can also share blog posts on social media, which helps them gain a wider audience. Many small or private blogs use free hosting services. Larger, more popular blogs typically use paid hosting sites that offer additional features such as custom domain names, online marketplaces, and automated communication with subscribers. What Is a Wiki? A wiki is an online encyclopedia that uses hyperlinks to connect each entry to other relevant entries. The word comes from the Hawaiian word wiki-wiki, which means "quick." Most wikis are dedicated to a single topic, such as a TV show, video game, or specific historical period. The most well-known wiki is Wikipedia, which has entries on just about any subject you can imagine. Wikipedia articles are written and edited by volunteers around the world. Contrary to what many believe, information on Wikipedia is generally accurate and reliable—far more reliable, in fact, than most traditional encyclopedias. That said, Wikipedia should never be used as a primary source of information. If you're writing a research paper for school or want to be certain that an article is accurate, you should refer to the sources cited by the article to verify their authenticity. How Do You Start a Blog or Wiki? There are many hosting options that offer a free tier for blog hosting along with other paid tiers with additional features. The following are common sites where people can host their blogs: Blogger (free)WordPress (free and paid plans)Google Sites (free)Wix (free and paid plans)Squarespace (free and paid plans)Weebly (free and paid plans) The blogging platform you use should be based on the features that you need and your understanding of web design. Many blog-hosting sites provide powerful tools that let you customize the look and feel of your blog and add useful widgets to it, such as embedded contact forms, embedded calendars that like to an Outlook or Google calendar, or image slideshows. Whether or not you pay for hosting partially depends on whether your blog is monetized. If you're making money from your blog, either through selling products or through advertisement revenue, it may make sense to pay a monthly fee to have the site hosted. If not, it may make more sense to stay with a free option.

Which of the following lines will initiate an Internet search from the address bar of a web browser?

microsoft gov

Which of the following should be done to protect your identity when creating a social media profile?

Always review and set privacy settings.

Crowdsourcing

Crowdsourcing is reaching out to a group as a way to solve a problem. Sometimes, this means collecting ideas from users or professionals. Sometimes, it means pooling money or resources from a variety of people as a way to share the load. Because of advances in communication technology, crowdsourcing is easier than it's ever been. Financial Hardship Crowdsourcing Crowdsourcing is a popular way to raise funds for important projects or expenses. When many people spread out a financial burden, no one individual has to pay too much. There are two major categories of financial crowdsourcing: unexpected expenses and startup projects. Unexpected expenses or financial hardships can strike both individuals and businesses. A death in the family, a major accident or illness, or a natural disaster can cause sudden and potentially catastrophic financial needs. To help fill these needs, people use financial crowdsourcing platforms, such as GoFundMe, to ask people for donations of any size to help share the financial burden. A dollar amount is set as a goal and the donations continue until the goal is met. These kinds of fundraising campaigns are often shared on social media. The person who organizes the campaign can then use the platform to send periodic updates and thank you messages. Startup Crowdsourcing Often an individual or business will have an idea they want to get off the ground, but they lack the funds they need to get started. Financial crowdsourcing is a great way both to raise funds and to gauge the level of public interest. Platforms such as Kickstarter and Indie GoGo allow users to set a funding goal and then give them a specific timeframe in which to reach it. Contributors pledge, or commit, to give a certain amount of money to the project. If the total pledges reach the goal, the project is funded. Otherwise, the donations return to those who pledged them. As a way to encourage people to donate, the campaign can offer incentives at different donation levels. The more a person donates, the better the prize will be. Examples of incentives include free products, limited edition products, company swag, and just about anything else you can think of. Idea Crowdsourcing Another way that crowdsourcing can be used is to gather ideas to tackle a problem or design a new product. This can take the form of digital surveys or focus groups that help companies understand what their customers want and what innovations they'd like to see. There are many programs that allow companies to create surveys and organize the responses they get. These include Google Forms, Survey Monkey, Qualtrics, and Zoho Survey. Companies use the data from their surveys to inform decision making. Crowdsourcing and Social Media Crowdsourcing is most effective when it reaches the greatest number of people. That means that using social media platforms, such as Twitter, Facebook, and Instagram, is an integral part of any modern crowdsourcing campaign. The first step is to create social media pages for the campaign. People can then share these pages and follow them to get updates. Social media is also a great platform for targeted ads. These kinds of ads allow you to reach users that meet specific criteria, such as people living within a certain area, people who have a particular profession, or those who are within a certain age range. This helps you get the word out to the people who are most likely to respond. Many crowdsourcing campaigns also use multimedia, such as promotional videos, to foster participation.

Online Profiles and Identities

Social media can be an exciting way to share more about yourself and interact with new people. However, you do need to be cautious when configuring your own online identity and using it to interact with others online. The internet is full of people who use online profiles to misrepresent who they are for illegal or unethical purposes. Being a responsible online citizen is the best way to stay safe on social media. Your Online Identity Whenever you sign up for any form of social media or email, you're asked to complete a profile. Some parts of the profile are required while others are optional. You can provide as much or as little information as you'd like. When creating a profile, it's vital to understand that it's difficult to control who accesses your information once you've made it available. The more information you give out online, the higher potential there is for it to be misused. The following kinds of information are often found on social media profiles:A profile picture (typically a picture of the person whose profile it is)A username (either a person's real name or a username of the user's choosing)Contact information (this can include email, phone numbers, mailing addresses, etc.)Personal information (this can include a person's real name, age, location, etc.)Profile (this is usually a paragraph that lets a person describe him or herself)Links (a person can list links to other websites or social media accounts) Protecting Your Identity Most social media platforms that require you to create a profile have privacy settings. These settings allow you to decide which groups of people are allowed to see your profile. For example, on Facebook you can individually decide who gets to see various parts of your profile, such as your posts and personal information. You can set some things to the Everyone setting, which means that anyone on the internet can access your information. You can also set it to Friends, meaning only those with whom you are friends can see the information. You can also set it to Friends of Friends, which means that your friends and those who are friends with them are able to see your information. Finally, you can set it to Private/Only Me, which means that only you are able to see that information. It's a good idea to keep your personal email and phone number only visible to close friends (or not to post them at all). You should never post your address. Making this information available increases the chances that it could be misused for spam, unwanted phone calls, or worse. You can also set different privacy settings on each individual post. If a post reveals personal information, it's a good idea to restrict who can see it so that strangers can't tell too much about you. Protecting Your Social Media Identity There are many different internet security threats out there that you need to be aware of. These include the following: Hacked Social Media Accounts: If a hacker gets into your social media account, they can use it to send malicious messages, videos, and images to other people using your account. They may even try to create a copycat account that mimics your profile picture and username in order to trick other people into interacting with them. If this happens, report the fraudulent activity to the social network and change your password right away. It's important to choose a password that's strong, meaning that it's made up of a combination of lowercase letters, uppercase letters, numbers, and symbols. Misleading Profiles: One of the greatest threats of the internet is that it makes it easy for people to mask their true identities. Sometimes, people who want to hurt others or take advantage of them pretend to be someone else in order to lure their victims in. As a general rule, it's a good idea to never meet anyone in person whom you only know online. You should also not share personal information over the internet with anyone that you don't know personally. Phishing Attempts: Phishing happens when hackers try to pretend that they're sending a message from a friend or trusted company in an attempt to steal private information. For example, they might create a message that looks like it's from Amazon.com (possibly using logos) that says there's been a problem with an order and they need you to confirm your shipping information by clicking on a link. If you click on that link, you may compromise the security of your computer. As a rule, companies don't ask you click on links to verify your information. Always check the email address from which an email is sent and make sure that everything is spelled correctly. There may be slight variations in the email address, such as amazun.com instead of amazon.com. When in doubt, simply delete the email and call customer service to verify whether there is an actual problem.

Which of the following terms describes an enormous public network that connects billions of devices and networks around the world?

Internet

RSS Feeds and Podcasts

The acronym RSS originally stood for RDF Site Summary, but it's also been called "really simple syndication" or "rich-site summary." RSS is based on simple text files that are read by a program called an RSS reader to provide a stream of updates about a particular topic. These started out as only providing text updates, but then quickly expanded to updating with images, audio, and video. While RSS feeds are not nearly as popular today as they once were, they are still an excellent way to keep up to date on topics you're interested in. This is especially true for podcasts and other web content that includes regular updates. In this lesson, we'll explain a little more about both podcasts and RSS feeds. Podcasting Podcasts are like talk radio episodes that can be enjoyed on demand. There are thousands of podcasts available today, and many of them are free. People release podcasts about cooking, history, true crime, fashion, comedy, music, and about any other topic you can think of. Podcasts are split up into episodes, much like TV shows. One way you can make sure never to miss an episode of your favorite podcast is to subscribe to the RSS feed for that podcast. Every time a new episode is published, your feed will be updated and you'll be able to listen. Podcasts can be enjoyed through a variety of digital platforms, such as iTunes, directly from web browsers, podcast apps on smartphones, and more. Episodes can often be streamed live or downloaded so that you can listen to them later. Subscribing to an RSS Feed RSS Logo To subscribe to an RSS feed, you'll need to select an RSS reader. There are many free RSS readers available online, including Digg Reader, Freereader Online, CommaFeed, FlowReader, and Feedly. Once you've installed an RSS reader, you'll need to navigate to the blog or website that contains the RSS feed you want to subscribe to. Some websites include the orange and white RSS logo to show that a feed is available. After entering the URL for your desired feed, you will be subscribed. Check back later for new content that has been published in the feed. You can tailor your RSS feeds so that you receive custom updates on only the things you want to see. Setting Up Your Own RSS Feed If you have your own podcast or site that provides users with frequent updates, using an RSS feed is a great way to boost your traffic. In order to create one, you'll either need to use an RSS creation program or learn how to create the files by yourself (this is a much more complicated process). Blogging sites such as WordPress include built-in support for RSS feeds. RSS feed creation programs all require you to create a title for your feed (this should be the same as the name of your site or podcast). You should enter a URL for your website to give your listeners somewhere to connect with you and also have a description for your feed so that your listeners understand what sort of content you're producing. Most programs also allow you to add an image. Once you've created a feed, you need to add content to it. To do this, enter the title of your episode or post, a publishing date, and then the URL that will lead users directly to that content. Each piece of new content should come with a short description that helps drive user interest. After you've added all of your current content to the feed, export your feed into an XML file. This is the file that allows users to subscribe. This XML file should then be uploaded to your website in a prominent place so that users can access your feed. Some types of software will actually create a link to your feed that you can place on your site instead.

Internet of Things (IoT)

A computing concept that describes the network of everyday physical devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate with the internet.

Social Media Marketer

A professional who uses creative and technical skills to create content for social media platforms in order to reach and influence current and potential customers. The use of social media has changed dramatically over the years. It started as a way of connecting with friends and family, but today most companies and corporations have a social media presence. Using their creative skills, social media marketers write and edit content for social media platforms like Facebook, Instagram, LinkedIn, and YouTube. Creative content ideas can be communicated through a photograph, a blog post, a video, or any other innovative medium. Social media marketers also need skills in Search Engine Optimization (SEO) and web traffic metrics. And they need excellent communication skills and the ability to collaborate across teams.

Internet Service Technician

A professional who works with telecommunications equipment and hardware to build infrastructures for networking, telephones, radio, and other communications channels. An Internet service technician works with telecommunications equipment and hardware. They build infrastructures for networking, telephones, radio, and other communications channels. If you've ever switched Internet providers, an IST probably came to your house to add the correct wiring and network adapters. The most important skill that a technician can possess is the ability to quickly troubleshoot and fix any issues that may arise from customers. They need to be quick problem solvers and have great communication and customer service skills.

Web Application

A program or app that uses the internet and a web browser to complete a task. The user's computer interacts with a remote server to access the app.

Voice over IP (VoIP)

A technology that sends voice phone calls using the TCP/IP protocol over digital data lines.

Online Academic Research

Academic Source Academic sources are generally books or articles written by experts who have credentials in a particular field of study. These publications are typically reviewed and validated by other scholars who are experts in the field. This is what it means for an online journal article to be "peer-reviewed." Original scholarly research is carefully documented to show how it builds on the research of other experts. It's published by university presses, professional associations, or academic publishers. You can find academic sources in online versions of textbooks, journal articles, dissertations, conference proceedings, and scholarly books. Consumer-level Source Consumer-level sources are usually not written or peer-reviewed by experts. They might be published on a personal website, an online forum, a news website, or an online magazine. The audience for these sources is consumers of information — people looking for practical information to solve a problem, make a purchasing decision, or just become better informed on current events and issues. Consumer-level sources often incorporate rich media content such as online videos and photographs. If you're doing academic research, you might want to use consumer-level sources, but they should be used primarily to provide background information on your topic of interest. Primary Source Primary sources include things like original speeches, letters, poems, laws, scientific fieldwork, and artwork. Secondary Source Secondary sources are articles or books that review, analyze, or describe primary sources. Tertiary Source Tertiary sources compile or summarize material from other sources. They include bibliographies, abstracts, and online article indexes and databases. Online encyclopedias like Wikipedia are also considered tertiary sources. For academic research, tertiary sources are good places to find references for both primary and secondary sources. Online databases such as LexisNexis, JSTOR, Academic Search, and Google Scholar all provide search engines designed for locating academic sources. Citation Style A citation style prescribes the format you should use for citing academic sources, including author, date of publication, and journal title. Like any other academic assignment, you should check with your instructor to confirm the preferred citation style, such as MLA (Modern Language Association), APA (American Psychological Association), or the Chicago Manual of Style.

You are inadvertently using comparable wording or sentence structure. Which form of plagiarism are you engaging in?

Accidental

Web Designer

An IT professional who employs skills in color, font, layout, and images to create appealing and useful websites. Web designers create, update, improve, and maintain web pages. They're in charge of the look and feel of a website, which needs to stay up to date with the latest trends in design. Web designers have a well-developed sense of color, font, layout, and images, which all work together to make a website appealing and useful. In addition to good design sense, web designers also need to be proficient in front-end coding languages like HTML, CSS, and JavaScript.

Web Browser

An application for accessing information on the World Wide Web.

Podcast

An audio program split up into episodes that can be enjoyed on demand. Podcast topics can range from cooking, fashion, music, and about any other topic you can think of.

Wiki

An online encyclopedia that uses hyperlinks to connect each entry to other relevant entries.

Frank, a technician, has finished installing a wireless router. Jessica is connected to the WiFi. However, she can only see the company intranet pages. What should Frank do to troubleshoot the problem?

Configure the browser proxy settings.

Which digital assistant was named after an artificial intelligence in an Xbox video game?

Cortana

Downloading

Creating a copy of a file from a web or network server and saving it to your local computer. This allows a user to open the file at any time even if they don't have a network connection.

Crowdsourcing is reaching out to a group (crowd) as a way to solve a problem. Which of the following provides a way to raise funds without web development expenses?

Crowdsourcing platform

Online Streaming

Downloading When you download a file, you create a copy of a file from a web or network server and save it to your local computer. After the file has been downloaded, you can open it at any time, even if you don't have a network connection. You can also make changes to the file and create additional copies. Downloading uses the TCP protocol, meaning your computer and the server communicate back and forth to make sure the download is an exact copy of the original. While this ensures the quality of the downloaded file, it makes the process much slower. Live Stream Live streams transmit data in real time as it is created. Some examples are online video calls, traffic cams, and gamer streams. Live streams are kind of like listening to the radio. They send data directly to your device where it is played, then immediately discard it. Live streams can't be paused or stored, and you can't go back to a previous part of the stream. On-demand Stream The videos in this course are an example of on-demand streaming. With on-demand streaming, you can watch a video or listen to an audio file at any time if you have an Internet connection. Data is sent from a server to your device, which starts temporarily storing the data. This is called buffering. When there's enough data in the buffer, playback begins. With on-demand streaming, you can pause and skip to different parts of the file. However, the files are temporary and don't remain on your computer, so you can't modify them or make copies.

Samantha is being cyber-bullied by someone who is spreading lies about her involvement in a failed business. Which of the following are recommended actions that Samantha should take to help diffuse the situation? (Select two.)

Encourage friends and relatives to ignore the bullying. Respond to the bully in a calm, clear, and constructive manner.

Which of the following terms describes an organization that connects users to the Internet?

Internet Service Provider

John is using synonyms to replace words while keeping the meaning of the original phrase. Which form of plagiarism is he engaging in?

Mosaic

Software as a Service

One of the main categories of cloud computing is a branch known as software as a service (SaaS). It is also referred to as cloud-hosted applications. This is where a company offers a subscription to use a particular piece of software delivered over the internet. This model differs from the traditional delivery method that allows users to buy and install a perpetual license. It's popular and is used by major companies like Microsoft, Adobe, and Intuit. SaaS is used for email applications, customer relationship management (CRM) software, financial management, and human resources (HR) programs. Cloud Computing Cloud computing has been a revolutionary shift in the way that individuals and companies operate. Instead of storing everything locally on each individual machine, cloud computing allows you to do much of your work and storage over the internet. Things that are stored and shared in this way are said to be in the cloud. There are many advantages to this method of software usage, including the following: Lower costs - With cloud computing, you pay only for the services you need as long as you need them. This can lead to lower overhead costs for things such as maintenance and electricity. Greater speed - When much of the work is done in the cloud, more computing power can be put toward each task. This means that processes generally run faster. Easier collaboration - With cloud computing, it's simple for people to work together even when they're not geographically close. Data backup - If files are kept in the cloud, it's easier to make sure that you don't lose them. Even if your individual machine crashes, files can be restored from a cloud location. Data Security - Cloud computing has many technologies that help protect your data so that only authorized individuals can access it. The SaaS Model In a typical SaaS model, the software is hosted on a central server and users are charged a monthly fee to gain access to it. Under this model, the end user doesn't need a license because everything is hosted in the cloud.The end user also doesn't need any particular kind of hardware to host the software as it's taken care of by the host company. Many companies like this business model because it creates a steady stream of monthly revenue. Since the customer is only renting the software, access can be revoked if the customer stop paying. This is in contrast to traditional software, which is purchased for a one-time fee. Categories of SaaS Applications The following are categories of SaaS applications you may encounter:CRM management software such as Salesforce.Office tools such as Microsoft Office 365 (Word, Excel, and PowerPoint).Online storage solutions such as Dropbox, Google Drive, and Microsoft OneDrive.Customer service software such as Zendesk.Electronic signature and document management software such as DocuSign.Real-time messaging solutions such as Slack.Virtual meeting solutions such as GoToMeeting and Zoom.HR tools such as Workday.Course management tools such as Blackboard.Survey creation tools such as Qualtrics.Email services such as Gmail, HubSot, and Sendinblue.

Which of the following is a disadvantage of a VoIP system?

Relies fully on a stable internet connection

Which option should you use to respond to the sender of an email but not all the recipients?

Reply

Which option should you use to respond to every single person included on an email?

Reply All

Secondary Source

Resources such as articles or books that review, analyze, or describe primary sources.

Primary Source

Resources such as original speeches, letters, poems, laws, scientific fieldwork, and artwork.

Consumer-level Source

Resources such as personal websites, online forums, news websites, and online magazines whose audience is consumers of information -- people looking for practical information to solve a problem, make a purchasing decision, or just become better informed on current events and issues.

Tertiary Source

Resources that compile or summarize material from other sources including bibliographies, abstracts, and online article indexes and databases.

Facebook, Twitter, and Instagram

Social networks allow people to stay connected to each other online through sharing text, pictures, and videos. Three of the major players in the social media world are Facebook, Twitter, and Instagram. Though they all foster connection and communication, each of these platforms has a different focus and employs different guidelines for their users. Understanding these differences is the key to deciding which social networks best suit your needs. Like most social media platforms, Facebook, Twitter, and Instagram are free to use. They make money by showing targeted advertisements based on data generated by users. For privacy reasons, it's important that you never put anything on a social media platform that you don't want to be widely distributed. Facebook Facebook is currently the largest social networking platform in the world, boasting 2.45 billion active monthly users. It was originally designed for college students, but now it can be accessed by anyone 13 years or older who has a valid email address. On Facebook, each user creates a profile about themselves. They then invite other users to be their "friends." Once users are friends, they can see each other's profiles and share text, images, and videos. They can also communicate directly using Facebook's direct messaging service—Facebook Messenger. Facebook has added a variety of features over the years, including live video streaming and the ability to create dedicated groups and pages for businesses or causes. Facebook is so widely used that many websites have integrated with Facebook, allowing their users to sign into their website using their Facebook account. This streamlines the process and allows the website to draw information from the person's Facebook profile. Twitter Twitter is a microblogging platform. Users make public posts which can be viewed on their profile. The catch is that each post, or tweet, can only be up to 240 characters long. Each user can choose to "follow" other users whose content they wish to see. Posts from these users constitute each person's Twitter feed, which is displayed on the home page. Users can also retweet their favorite tweets. This adds the tweet to their followers' feeds. The quick, snappy nature of tweets make them easier to read on smaller screens, such as mobile devices. The constraint also forces users to distill their ideas to their most basic level. Academics, politicians, news outlets, and other influencers use Twitter to help get their messages out. Instagram Instagram is an image-sharing social network. Though it was acquired by Facebook in 2012, it remains a separate network that's more focused on photos. Unlike Facebook and Twitter, which allow users to upload content through a computer or mobile device, Instagram requires that new content be uploaded through a mobile app. Content that has already been uploaded can then be viewed on a computer. Like Twitter, Instagram users create a profile which other people, also known as followers, can "follow." Users can like, comment, and bookmark other peoples' posts. It also contains a direct message feature to send private communication between friends. Instagram is integrated with other social media sites. Photos can be shared from Instagram to other sites, such as Twitter and Facebook, with a single click. It also works well with businesses, who can create a free business account that allows them to track statistics related to their posts. One defining feature of Instagram is its built-in photo editing tools. After uploading a photo, users can apply a variety of filters to change the look of the photo, such as making it black and white or in a sepia tone. Photos can be cropped and rearranged, and settings like brightness, saturation, and hue can be tweaked to create different effects.

Internet of Things

Smart homes The term smart home refers to a home with devices that can be controlled remotely over the internet with a smartphone or computer. Many smart homes have internet-enabled security systems. Indoor and outdoor security cameras record live video footage that the resident can view from a phone or tablet. The security systems have alarms that inform the police in the event of a break-in.Thermostats can learn the residents' daily routines and adjust the temperature of the home accordingly. Even home appliances, like refrigerators and coffee makers, can be controlled over the internet by phone. IoT cars Owners of internet-enabled cars can use phones to monitor gas usage and engine status. Online navigation software can be used instead of a separate Global Positioning System (GPS), and music apps can replace the need for a traditional radio.Some cars and trucks can now use the internet to drive themselves. In the future, you may not even need a person behind the wheel. Other IoT innovations include the capability to automatically accelerate or brake a vehicle as needed.\ Emergency and medical applications To save human lives, emergency vehicles can use IoT systems for better response times. A smart ambulance system (SAS) can be integrated with an intelligent traffic control system (ITCS) that controls the timing of traffic lights in the path of the emergency vehicle.In other words, smart ambulances can communicate with traffic lights, changing them to green as they approach. This green corridor lets emergency vehicles arrive at the destination faster and more safely. Patients with heart or breathing problems can wear internet-enabled sensors that automatically contact emergency services when a problem is sensed. Aerial Vehicles One of the fastest growing markets in IoT is unmanned aircraft systems (UAS) because they provide large commercial and strategic opportunities. For example, these UAS systems (sometimes called drones) can help in industries, such as agriculture, filming, and the military.

Synchronous vs. Asynchronous Communication

Synchronous vs Asynchronous Technologies Online communication technologies are classified in a few different ways, including whether they're synchronous or asynchronous. Synchronous technologies are those which allow two or more groups to communicate in real time. This kind of messaging can be one to one, such as when two people are chatting back and forth, or one to many, such as when one person is live streaming a video and many other people are watching and interacting with it together. Examples of synchronous technologies include: Video conferencing (FaceTime, Google Hangouts) VoIP (Voice over Internet Protocol, an internet-based telephone technology) Live streaming (YouTube, Facebook Live) Private vs. Public Technologies The next distinction that can be made about online communication is whether they're public or private. Public means that anyone logged into the same website can see your message. Private means that only a single person or a limited group of people are able to see your message. There are many kinds of private communication, and email and texting can fit this description. With these kinds of communication, you only send your message to specific people by using their email addresses or phone numbers. Other kinds of private communication are instant messaging, video conferencing, and VoIP. You can also adjust the privacy settings on social media posts so that only a specific group of people can see them. Public communication includes blogs, forums, public social media posts, chat rooms, and live streaming. These kinds of communication are generally used for content that's meant to be freely shared and supposed to reach a wide audience. Categories of Communication When you take both these categories together, you create four distinct ones, as shown in the following chart. Choosing which technology you want to employ depends on your intended audience and whether or not you want your message to remain private or not. Private Asynchronous Email (Gmail, Hotmail, Yahoo, etc.) SMS/MMS Private social media posts (Facebook, Instagram, Twitter, etc.) Private Synchronous VoIP (internet telephone) Instant messaging (Skype) Video conferencing (Skype, FaceTime, Google Hangouts) Public Asynchronous Blogs (WordPress, Blogger, etc.) Forums (Reddit) Public social media posts (Facebook, Instagram, Twitter, etc.) Public Synchronous Chat rooms (Discord, Slack) Live streaming (Facebook Live, YouTube)

Wikipedia is considered which of the following sources?

Tertiary

Which of the following are primary sources? (Select two.)

The United States Constitution Jane Austen's Pride and Prejudice

What is a web designer responsible for?

The look and feel of a website

Caching

The storing of images, sounds, web pages, and other information associated with particular websites that allows a browser to redisplay data without having to reload it from the website.

Which of the following is considered part of a smart home?

Thermostat

A pop-up blocker is a web browser feature that _________________.

prevents unwanted advertisements

Which of the following is a valid email address?

[email protected]

Website Navigation Features

1. Link to home page Many corporate websites have their company logo near the top left of each page of their website. Generally, the logo is also a hyperlink to the website's home page. 2. Navigation bar Most corporate websites have a group of links that take you to pages of the website. This is usually called the navigation bar. A few options you'll commonly see in navigation bars are: About - This link gives you a general overview of the company's purpose and sometimes profiles of top company leadership. Catalog - Especially common for retail sites, this option takes you to the list of items available to purchase. News - This link takes you to a page where you can see recent changes and other happenings at the company. Contact - This lets you know your options for contacting the company. Contact information often includes a phone number, email addresses, and physical addresses. Support - Many software sites have a page dedicated to providing individualized help to customers who encounter problems. 3. Sign up/login The first time you use a new website, you'll often need to create an account to access certain features. This usually involves clicking a Sign Up button, then filling in a form with your personal information.If you already have an account, you can click Login to enter your username and password to gain access to your account. 4. Chat with a representative Companies frequently include an option to open a chat window, where you'll be connected with a customer service representative. This is a great way to get help immediately when you need it, rather than having to wait for support to get back to you.

Blog

A blog is a website that produces content in forms of blog posts that can contain text, images, video, or other media. Blogs usually have a more casual, conversational style than more mainstream websites.

Cloud Storage

A cloud computing service that remotely maintains, manages, and backs up data and makes that data available to users over a network.

Microsoft OneDrive

A cloud storage service that is offered by Microsoft.

Internet Service Providers (ISP)

A company that provides individuals and businesses access to the internet and other related services.

Internet of Things (IoT)

A computing concept that describes the network of physical devices and everyday devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate with the internet.

Proxy Server

A device that stands as an intermediary between an application such as a web browser and the Internet. A proxy server intercepts all requests and can use filter rules to allow or deny internet traffic.

Certificate

A digital document that contains encryption keys and is used for encryption and identification.

Pop-up Blocker

A feature of most web browsers that prevents pop-up windows such as advertisements from being displayed.

Social Media Marketing

A marketing tool used on social media to present a business and its message quickly and in the best light possible with the intent to interact with and influence potential customers and expand their business potential.

Cloud Hosting

A method of delivering applications by hosting them in the cloud.

IP Address

A numerical label that is assigned to devices so they can connect and communicate on a network.

You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research. Which of the following is the MOST likely cause of this problem?

A proxy server is filtering access to websites.

Match each term on the left to its definition on the right.

A service or software application that relies on shared resources over the Internet Cloud computing correct answer: A software application that accesses web applications and websites Browser correct answer: A company that provides access to the Internet Internet Service Provider correct answer: An interconnected global public computer network correct answer: Internet An information system that connects documents to each other by hypertext links correct answer: World Wide Web

Transmission Control Protocol/Internet Protocol (TCP-IP)

A set of rules that facilitates internet communication.

File Transfer Protocol (FTP)

A set of rules that govern the transfer of files between computers.

Hypertext Transfer Protocol (HTTP)

A set of rules that govern the transfer of web content between computers.

Cookie

A small piece of data sent from a website and stored on a user's computer by the web browser while the user is browsing. Cookies are designed to help websites remember information such as items in an online shopping cart and entries in a web form so that the website can customize a web page for the user.

Domain Name System (DNS)

A system and set of rules that associates domain names (such as web servers) with unique IP addresses so users can find and use network resources by an easily readable name instead of by IP address.

RSS

A system based on simple text files that are read by a program to provide a stream of updates or feed about a particular topic. RSS originally stood for RDF Site Summary but is also known as "really simple syndication" or "rich-site summary."

Wi-Fi

A technology that allows computers, smartphones, and other devices to communicate on a wireless network.

Asynchronous Technology

A technology that allows groups to communicate by taking turns, such as in emailing and text messaging.

Synchronous Technology

A technology that allows two or more groups to communicate in real time such as video conferencing, VoIP, or live streaming.

Software as a Service (SaaS)

A term associated with cloud hosting. SaaS provides users with the applications they need to do their day-to-day work through the cloud.

Crowdsourcing

A way of reaching out to a large group for help solving a problem. It can involve collecting ideas from users or professionals, or pooling money or resources from a variety of people.

Social Media Platform

A web-based technology to distribute information and encourage people to connect with others who share a common interest. Examples of social media platforms are Facebook, Twitter, LinkedIn, and Instagram.

Common Browser Features

Address Bar Near the top of browser windows is the address bar. This is where you can type the address for the website you want to visit. Another name for a web address is Uniform Resource Locator (URL). Hyperlinks On a web page, if you hover your cursor over certain words or images, the white arrow turns into a pointed finger. This lets you know there's a hyperlink to another webpage or to more information. Sometimes hovering over a hyperlink opens a dropdown menu. Navigation buttons If you've navigated to the wrong webpage, you can return to the previous page by clicking the left arrow (back button) in the upper left corner of the browser. From here, you can use the right button (forward button) to return to a page. Browser history In Chrome, to see a list of all the web pages you've previously visited, you can press and hold down the back button. Then select Show Full History. To return to one of these previously visited sites, click one of the links. Private browsing If you share your computer with someone and don't want Chrome to track your browsing activity, open a window in incognito mode. This is also called private browsing.Be aware that private browsing only prevents the web browser from tracking your activity. If you're using a computer at school or work, your browsing will still be visible to network administrators. Browser Settings To change the Chrome startup options and other settings, click the Chrome menu in the upper right-hand corner of the browser and select Settings. In Settings you can manage your Google account, change autofill settings, customize appearance configurations, manage the default search engine and browsers, and change the startup options. Search Engines Search engines are tools that gather relevant websites from around the internet and show them to you in a list. A search engine can help you find what you're looking for even if you don't remember the web address.Every search engine has a text entry box where you can type the information you're looking for. After clicking inside the text entry box, you can type words relevant to your search and press Enter to see the search engine results.You can also perform web searches directly from the address bar at the top of the web browser. In this case, the search will be performed by the web browser's default search engine.Typing words without an extension like .com or .org, will instruct the web browser to assume that you're entering search terms rather than a URL. The search results are identical to searches from a search engine.The Chrome browser uses Google as the default search engine. The Microsoft Edge browser sends search results from Bing. It is the default Microsoft search engine.When searching for information on the Web, consider using following search criteria. Use quote marks (" ") - Placing double quote marks around the phrase, tells the browser to look for an exact match.Example: "TestOut catalog" Use a hyphen (-) - Placing a hyphen at the beginning of a word will show only results that don't include the word following the hyphen.Example: recipes cookies -chocolate Use a plus (+) - Placing a plus at the beginning of a word will show only results that include the word following the plus.Example: recipes cookies +chocolate Use an asterisk (*) - The asterisk indicates a wild card and can be used in many ways.Example: Entering flying * shows results such as flying magazine, flying dog, and flying plane. Use OR - Using OR (all caps) shows results with either or both of the words surrounding the OR. Some browsers also use the pipe (|) to perform the same function.Example: Chocolate OR Vanilla Uses search operators (fields) - If the browser supports it, such as with Google Chrome, you can used search operators to find words in special places, such as the URL or title.Examples: inurl -Ford (Finds results with Ford in the URL, such as www.ford.com.)Google Chrome supports the following types of advanced operators:inurl - The search results show documents with the word contained in the URL of the web site.intitle- The search results are restricted to web pages containing a specific keyword in the title. Advanced search page - Many browsers have an advanced search page that can be used if you can't or don't want to use the above syntax manually. For example, if you go to https://www.google.com, you will see a Settings link in the lower right corner. To access the advanced search page, select Settings and then select Advanced search. Bookmarks To find a specific website more quickly in the future, you can add a bookmark. In Chrome, go to the upper right corner of the window and click the star symbol. Add the bookmark to the bookmarks bar and click Done. To return to the bookmarked page, you can click the Chrome menu and select Bookmarks. If you open a new tab in the browser, you can see the bookmark conveniently below the address bar. Extensions/Add-ons Most browsers let you extend or add features to the browser. These added features are called extensions, add-ons, and themes. For example, Google Chrome has an extension that lets you edit, create, and view your documents, spreadsheets, and presentations - all without internet access. In addition, extensions can sometimes add menu items to the toolbar. Although each browser may differ in the exact steps needed to manage extensions and add-ons, you usually have the option to remove or enable/disable them. Disabling an add-on temporarily stops the add-on from functioning, but can then be easily enabled or turned back on. For security reasons all add-ons should be digitally signed by the developer to ensure it is save to use. If an add-on is not digitally signed, it may contain malware.

Cloud Computing

Benefits of Cloud Computing Backup The cloud provides reliable backup solutions. That means you won't lose data when a local storage device fails. Accessibility The cloud gives you access to your data on any device and from any location. All you need is the right application and an internet connection. Collaboration Cloud-based applications give you the ability to share documents and collaborate with other people in creating and editing documents. Resource pooling Many businesses want to expand their computing resources without having to purchase and maintain additional in-house hardware. For these companies, low-cost cloud hosting solutions are a great option. Drawbacks of Cloud Computing Privacy and security concerns Data files stored on the cloud are susceptible to hackers, who gain access to cloud storage devices or capture data as it travels over the internet between the local device and the cloud. Nearly all cloud service providers use encryption for this reason. Internet connection issues While storing data on the cloud is a benefit when you need access from multiple devices, it's a problem when the internet connection goes down. Without a local copy of files, your productivity may be completely dependent on the quality of your internet connection. Cloud hosting outages Even if the internet is up and running, you may be unable to access the files when the cloud service is down. Google, Amazon, Microsoft, and other cloud hosting businesses work hard to avoid any downtime, but there will always be short periods of hardware or software failure. For this reason, you should keep an offline copy of any critically important files or applications. Cost Although some cloud computing or storage is offered for free with limited features (such as Microsoft's OneDrive and Google Drive), most require a subscription or purchase. The cost for the services will vary depending on the service and amount of data stored.

A service that lets you store data in a remote location over the Internet is called _____________.

Cloud storage

Microsoft OneDrive is a cloud solution that is designed to provide which of the following?

Cloud storage

Browser Security and Troubleshooting Features

Cookies Cookies store data for specific websites. Cookies: Can contain information about your browsing habits, preferences, email account, and favorite sites. Can be saved on your computer for any length of time, sometimes for as long as the browser is open or even after you close it. Contain personal information that an attacker use. Have security settings for storage on your computer. It's important to review the browser's cookie security settings. A common practice is to block third-party cookies that can be placed on your computer by advertisers and other sites with a domain name other than the one you're currently visiting. Browser extensions Plug-ins and other browser extensions, such as the Adobe Flash Player, can be installed to enhance the appearance and functionality of websites. Keep in mind: Untrusted extensions can take advantage of security vulnerabilities. Extensions can be temporarily disabled on some browsers, or they can be deleted from the system. If you need to install a plug-in to use a legitimate website, make sure you have the latest version of the plug-in. Some websites require that you install a browser extension to support new functionality. If an extension does not appear to be working, check to make sure it's enabled in the browser. In Chrome settings, open the Extensions tab and turn the extension on. In some cases, you may need to remove an extension that's incompatible with other extensions. Client-side scripting Scripting languages such as PHP and JavaScript extend the functionality of web pages. Keep in mind: The code for scripting languages can be executed either on the web server or on the client-side within the web browser itself. Since client-side scripting takes place on the client, it poses a security risk on untrusted sites. You can deactivate client-side scripting in some web browsers. However, most websites rely on client-side scripting and it usually needs to be allowed. For greater control over the websites that can run scripts, you can install a script blocker add-on for the browser. Certificates Ecommerce and other websites that handle sensitive information should be certified to indicate they're using a secure protocol with data encryption. To determine whether a website is using this safer protocol, look for the padlock symbol in the address bar. This indicates that the site is using a valid digital certificate. Caching The browser cache is the storage location for images, sounds, web pages, and other information associated with a website. In addition to taking up space on the computer, data in the cache can be retrieved by someone with access to the computer.When a website is not functioning as it should, a good troubleshooting tip is to clear the cache. This means delete the stored information. Always clear the web browser cache after you use a public computer to access the internet. In the Chrome browser, the option to clear browsing data is under More tools. Click the Clear data button, to delete the browsing history, download history, cookies, passwords, and other website data. Proxy Servers A proxy server is a device that stands as an intermediary between an application such as a web browser and the internet. Keep in mind, a proxy server: Acts as a firewall. It intercepts all requests and uses filter rules to allow or deny internet traffic. Can improve performance on frequently used websites. It can also be used to prevent access to specific websites. Provides an extra layer of security by shielding the network users IP addresses behind the proxy server's IP address. This creates online anonymity for the network users. May require the IP address and port of the proxy server configured on the client's browser. Some proxy servers work without the client software configuration. If you're using a school or public network and are able to access some websites but not others, the reason may be the network's proxy settings. Pop-up Blockers A pop-up blocker is a feature of most web browsers. It prevents pop-up windows (such as advertisements) from being displayed. Web browsers often block pop-up windows to protect you from malware. Because legitimate websites also use pop-up windows. you can disable the pop-up blocker for specific sites.To verify that a pop-up window from a specific site is allowed: Go to the Chrome menu in the upper-right corner. Go to Settings > Advanced Privacy and security > Site. Look in Pop-ups and redirects to see if the domain is allowed to use pop-up windows. Click Add and enter the domain name to add the site if it isn't listed. Safe Browsers Whatever web browser you decide to use, make sure you're using the latest version. Consider the following: Older browsers often have security holes that are easy entry points for attackers. Be aware that some older browser versions are no longer supported by the company that created them. Many web applications enable functionality on a browser that may leave you vulnerable to attacks. The safest policy is to disable functions that are not necessary for the application. If you determine a website is trustworthy, you can temporarily enable the functionalities as needed. Compatible Browsers If your web browser is not displaying website content properly, consider installing and using a different web browser. Keep in mind: A website may have been designed and programmed without taking into account the functionality of different browsers. Popular web browsers include Google Chrome, Mozilla Firefox, Apple Safari, and Microsoft Edge. To take advantage of security and bug fixes, be sure that you're running the latest version of the browser. Browser Restart When a web browser becomes unresponsive or slow, the problem can often be fixed by closing the browser and then opening it up again. This clears the computer's memory and lets you start with fresh content. Computer Restart A good tip for any computer problem is to restart your system. Restarting turns the computer off, then on again. To restart your Windows system: Click Start in the bottom-left corner of the screen. Click the Power icon. Click Restart. Always restart a computer before calling a technical support helpline, including TestOut's support team.

Which digital communication medium consists of top-level posts with threads of response posts?

Discussion board

What do cloud services provide to help with privacy and security concerns?

Encryption

Popular Social Media Platforms

Facebook Facebook is the world's most popular social networking platform. People use Facebook to share pictures, videos, and content from other websites. Additionally, Facebook is often used as a tool for both public and private conversations between users. Twitter Twitter allows users to post short messages, videos, and pictures, which can be viewed by other Twitter users. Twitter is commonly used by celebrities, politicians, and other high-profile figures as a means of reaching out to large numbers of followers at once. LinkedIn LinkedIn is an entire social network dedicated to the professional world. Employers often use LinkedIn to search for candidates for positions in their companies. Job seekers use it to communicate their skills and expertise to potential employers. Instagram Instagram is primarily for sharing photographs and videos with friends and followers. It is commonly installed on mobile devices, which can be used to take a picture and then immediately upload it to Instagram. Social media has some obvious benefits in terms of its ability to connect and bring people together. However, it also comes with some risks. Consider the following precautions: The sense of anonymity provided by the Internet can lead some people to post obnoxious or harmful comments that they would never consider making in person. Avoid being a "troll." Take advantage of privacy settings on social media sites. This will protect your biographical and personal contact information from malicious users .Be wary of strangers who might be misrepresenting themselves and their motives for the purpose of scamming or misleading other people. Because it's extremely difficult to erase online information, be careful what you post. Creating a professional online presence is particularly important when you're interviewing for a job. Hiring managers will often investigate the postings of prospective employees. Protect and carefully monitor your digital identity, which includes your patterns of online interaction and anything you post about yourself on social media. If you have children, closely monitor their social media use. Children are often more trusting of strangers and more likely to share personal information that would make them vulnerable to predators. A growing problem with social media is cyberbullying, the use of technology to intimidate, threaten, or abuse others. Anyone who uses the Internet or has a smartphone may be vulnerable to it. Cyberbullying can include posting embarrassing photos or videos on the Internet, harassing though text or instant messages, and spreading lies and rumors online. It can lead to an increased risk of anxiety, depression, and even suicide. It's important that you never take part in this nasty behavior or support those that do. If you are a victim or witness of cyberbullying, take the following suggestions by stopbullying.gov into consideration: Do not participate by liking, sharing, commenting on or forwarding these posts. This may limit the potential damage of the messages to victims and others. Do not retaliate or respond negatively to these posts. This only increases the potential to make the situation worse. If you feel safe doing so, respond to the person who created the hurtful content in a calm, clear, and constructive manner. Follow up with the person who was targeted. By doing this, you can send a powerful message that you care about the person and don't support negative behaviors.

Social Media Marketing

History of Social Media Social Media Logos For many, social media is a new concept. But in reality, this type of platform dates back to 1979 when Usenet was launched by the University of North Carolina. Usenet was a bulletin board system which allowed users to log in and interact by posting in online newsgroups. Dating sites peaked in the 1990s, which led to the development of social networks that were developed in the early 2000s. The first truly modern site of this kind was Friendster, which launched in 2002 and had millions of users until 2015 when it was sold. LinkedIn was launched in 2003 and is still a resource for professionals to reach out to one another, claiming over 660 million users in 2019. Myspace was also a social media platform that originated that same year and became well known by 2006. Similarly, Facebook was launched in 2004. The 2000s and 2010s also conceived social media sites and mobile apps like Photobucket, Flicker, YouTube, Instagram, Snapchat, and Twitter. Since 2000, social media has only grown larger, mostly due to tablets and smartphones that allow for instant access to media in real time. Importance of Social Media Social media is a game changer for any business. Its powerful and instantaneous reach allows business owners flexible, inexpensive communication to customers. A well-executed social media optimization (SMO) strategy can give a business an overwhelming advantage. To ensure the maximum benefit from social media, however, a business needs to set well-defined goals and objectives. A good SMO strategy aims to build a reputation with customers by establishing trust through good public relations and a secure navigation experience as well as encouraging engagement and sharing by making the overall experience fun, original, and simple. Savvy teams study competitors' business ideas and improve on their strong points. This is what Myspace did with Friendster and what Facebook subsequently did with Myspace. Social Engagement Social media engagement is the process of reaching out to customers and interacting with them through social media networks. This engagement creates a two-way street where a business can draw attention to a specific product or service. Every platform is different but most have some kind of feature that allows people to collectively organize themselves or their product (think YouTube channels or Facebook groups). Using these features, businesses can measure their engagement levels using cookies or whatever system the platform has built in to measure activity. In the era of viral videos, businesses are also using viral marketing to boost their business. Viral marketing is a message or post created with the intention of being shared over and over from one user to another. A popular example of viral marketing is the ALS ice bucket challenge that made its rounds on social media in 2014. In two months, the viral challenge made $115 million and gained increased media attention for millions. Facebook Facebook was founded by Mark Zuckerberg on February 4, 2004, and is undeniably the most popular social media platform with over 2.45 billion accounts as of 2019. This social networking site can easily be turned into a far-reaching promotion tool if used successfully. It's important to constantly stay updated with what the current market trends are as the nature of social media marketing is ever changing. Some of the latest Facebook trends are the use of cover photos for marketing as well as adverts for advertising. Adverts are shown to a specific audience of targeted Facebook users, and well-targeted adverts will get your business more likes, comments, and shares. Twitter Twitter is another social networking platform that allows users to read and write 280-character messages called tweets. A New York University undergraduate student named Jack Dorsey introduced the idea of using a message service to communicate with a small group. Initially called Twttr, it was first launched as an SMS-based communication platform. On March 21, 2006, Dorsey sent the first-ever tweet which read, "just setting up my twttr." Twitter marketing is also a powerful tool for businesses to reach new customers and promote their brand. The rapid back-and-forth nature of the site can help businesses find out if customers are talking about them (negatively or positively) and respond accordingly. Summary The main purpose of social media marketing is to present a business and its message quickly and in the best light possible. While the main goal is promotion, businesses as well as individuals can find many other benefits from social media marketing. According to the latest figures, the number of mobile device users has easily surpassed the number of desktop users. Social media marketing in the mobile age is increasingly important, if not absolutely essential.

Clickable text or images that take you to different sites on the World Wide Web are called __________.

Hyperlinks

A _________ is a private network that utilizes the same technologies as the Internet.

Intranet

Match the social media platform on the left with the description on the right. Some items can be used more than once or not at all.

Largest social media platform in the world Facebook correct answer: Most popular microblogging platform Twitter correct answer: Messaging platform that includes built-in photo editing tools Instagram correct answer: Social network focused on images Instagram correct answer: Provides live video streaming Facebook

Which of the following are common risks of using social media? (Select two.)

Online information that you post is difficult to remove. Anonymity can lead some people to post harmful comments.

Texting

Phone communication in written form sent through SMS (Short Message Service) that can be sent over a cellular network or the internet. Multimedia Messaging Service (MMS) is an extension of SMS that supports picture, audio, and video messaging.

After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem?

Proxy settings

Which medium does Wi-Fi use to send data between networks and devices?

Radio waves

The Web

Short for World Wide Web. Digital content that is delivered over the Internet, usually through a web browser.

Kickstarter and Indiegogo are crowdsourcing platforms primarily started for which type of crowdsourcing?

Startup

Client-Side Scripting

The process of transferring source code from a web server to a web browser and running that code directly in the browser.

Cloud Computing

The use of remote services hosted on the internet to store, manage, and process data.

The Internet

The worldwide system of interconnected computers and public networks.

OneDrive Cloud Storage

To use OneDrive, you must first have an account with Microsoft. If you do not have an account, you can register for one (for free) by visiting https://signup.live.com/. Unlike some cloud-based storage systems, such as Dropbox, Windows 8 and later systems have the OneDrive client software installed by default. After signing in to OneDrive, you can store files and folders in your OneDrive account. All of your OneDrive files remain available in your account, no matter what computer you access your account from. Using OneDrive makes it unnecessary to email files to yourself or to copy files to external storage devices to move them between systems. By default all users get 5GB of free storage on OneDrive. Additional storage can be purchased. Common OneDrive Management Tasks Access OneDrive account You can easily access your OneDrive storage on Windows 10 through File Explorer.From the Start menu, click File Explorer .On the left side of the window, select OneDrive .The files and folders that have been saved in your OneDrive account are displayed. You can use File Explorer to create, delete, copy, or move your OneDrive files. Open or save files in a OneDrive account You can save files to your OneDrive account from within applications running on your local computer by doing the following: Within the application, click File > Save As.Select OneDrive and browse to the desired folder. If necessary, give the file a name. Click Save. The file is saved over the internet to your OneDrive account. To open a file from your OneDrive account, do the following: Within the application, click File > Open. Select OneDrive. Browse and select the file, and then click Open. Open or save Microsoft Office Files in OneDrive account Microsoft Office applications are integrated with the OneDrive cloud storage service, allowing you to open files from or save files directly to your account. To save a file to your OneDrive account from within an Office application, do the following: Within the Office application, click File > Save As.Click OneDrive and browse to the desired folder. If necessary, give the file a name. Click Save. To open a file in an Office application, do the following: Within the Office application, click File > Open. Click OneDrive. Browse and select the file, then click Open. Access OneDrive account in a browser Your OneDrive account is accessible from a web browser. This allows you to access your information from computers that don't have the OneDrive client software installed. You can access your OneDrive account through a browser by completing the following steps:Open a web browser and access OneDrive.com.Click Sign In, and enter your Microsoft user name and password.Once done, you can access the files in your OneDrive account in a browser window. Peer-to-Peer File Sharing File sharing can usually be accomplished more efficiently using the cloud. You can do this using a process known as peer-to-peer sharing. This is done by installing peer-to-peer software (such as Gnutella, Xunlei, Bittorrent, etc.) and using it to locate and share the desired files. As you set up your file sharing software, you can determine how much disk storage to allocate to this service. In some cases, files can be split and retrieved from several sources and rebuilt during the download process.

Which of the following is used to identify specific hypertext resources on the World Wide Web?

Uniform Resource Locator

Which of the following technologies can be used to make a phone call over an Internet connection?

VoIP

All of the following formats may contain incorrect or misleading information. On which should you be MOST careful about trusting the information you come across as it may seem academically reviewed but in fact is not?

Wikis

Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser?

World Wide Web

Web Search

A search of the World Wide Web using a web browser, often done by visiting a web search engine site such as Google, Bing, or Yahoo.

Web browsers save website information in their _________, which helps the site load faster on future visits.

Cache

Martin just purchased a new computer and wants to surf the web. He is afraid his new computer may get infected by automatically installing viruses. What should he do to protect his computer?

Change browser settings to notify before downloading.

_____________ computing refers to services and applications that run remotely over the Internet.

Cloud

Which of the following is a category of SaaS applications?

Office tools

When protecting your online identity, which of the following is an internet security threat you need to be aware of?

Phishing attempts

What is the term for delivering an application over the internet called?

SaaS

There are many social media platforms available today. What are the top two primary ways that social media platforms generate revenue? (Select two.)

Selling user-generated data to other companies Targeted ads

Web Applications

Simply put, a web application is a program or app that uses the Internet and a web browser to complete a task. The user's computer interacts with a remote server to access the app. The user gives commands and requests information, and the requests are fulfilled by the server. The server sends back information to the web browser on the user's computer, and the browser then renders the information on the user's screen. A popular example of a web application is Google Apps. These are all programs that can be run from a web browser to complete various tasks, such as word processing (Google Docs), sending emails (Gmail), and online storage (Google Drive). Many similar apps are connected to the cloud, which means that multiple people can view and interact with the same file simultaneously. Some companies provide their software using the Software as a Service (SaaS) model. The users pay a monthly or annual fee and the company allows those users to access their software. Often, web applications are built directly into web pages in order to perform a specific function. For example, any time you've used an online shopping cart when purchasing something online, you've used a web application. Desktop Applications A desktop application is a traditional computer program. These types of programs have to first be installed on a computer. The computer runs the program from its hard drive each time it needs to be launched. Desktop applications have minimum hardware requirements, and a particular app is usually made for a specific operating system (most likely Windows, macOS, or Linux). A popular example of a desktop application is the traditional Microsoft Office bundle, which includes Microsoft Word, Microsoft Excel, and Microsoft PowerPoint. These programs run from a user's local machine in order to help them perform certain tasks. This is in contrast to the Microsoft 365 suite which contains web-based versions of each of these programs. Pros and Cons Both options have pros and cons. Web applications have the advantage of allowing easier collaboration. They can connect people in vastly different locations and allow them to work on the same project at the same time. They also have the advantage of being more compatible than most desktop applications. They can run on a variety of platforms and operating systems and don't have to be installed on the user's hard drive, which means they don't take up space on the user's computer. Desktop applications can be large and can require a significant investment for storage space. Web applications also help drive down costs for both the business and users because these kinds of applications usually require less support and maintenance. You don't even have to install a web app as long as you have a web browser set up. Desktop applications have the advantage of being less dependent on internet service. If there's an internet outage, web applications are rendered useless. Often, high-speed internet is required for you to take full advantage of them as well, which is a perpetual cost that comes along with their use. Desktop apps often only have be to purchased once, unlike many web applications which carry a monthly or yearly fee. Also, many desktop applications are easier to customize for your own personal use. Web applications take more of a one-size-fits-all approach. However, desktop applications can be limited by the hardware on which they're run. If the user's computer is outdated, the application may not run as intended. For web applications, much of the work is done by remote servers, which reduces the load on the user's computer. A lot of a web application's performance comes down to the Internet speed, which can be a pro or con depending on your situation.

Web services that help people meet, interact, and share content with other people online are called ____________.

Social Media

Which of the following describes the strategy that defines a businesses social media goals and objectives?

Social Media Optimization (SMO)

Browser Extension

Software that adds functionality to a web browser.

Software Subscription

Sometimes called SaaS or on-demand software, software that requires a monthly or annual fee to use the software and receive regular updates.

Internet Terminology

The Web Short for World Wide Web, the Web refers to the digital content that is delivered over the Internet, usually through a web browser. The Internet While often used synonymously with the Web, the term Internet typically refers to the vast collection of networking hardware and physical computing devices that make up the Internet. ISP Internet Service Providers, or ISPs, manage an access point to the Internet. They don't manage the entire Internet. If you think of the Internet as a big freeway, then ISPs manage the on-ramp to the freeway. They're responsible for building the on-ramp and keeping it maintained and open, but they're not responsible for the Internet itself. IP Address Every computing device that accesses the Internet is assigned a unique Internet Protocol (IP) address. These addresses consist of either four (IPv4) or eight (IPv6) parts. An example of a four-part IP address is 137.75.68.206. HTTP and FTP The Hypertext Transfer Protocol (HTTP) is used to identify resources and transfer content on the web. Some web pages use the HTTPS protocol, which adds an additional layer of encryption to make data transfers more secure. The File Transfer Protocol (FTP) can also be used to transfer data between computers on a network. URL A URL, or Uniform Resource Locator, is the reference or address to a resource on the Internet. An example of a website URL is http://www.testout.com/home/about/privacy. It consists of a protocol identifier (HTTP), a domain name (www.testout.com), and an optional path to the resource (home/about/privacy). DNS DNS, short for Domain Name System, is a protocol that associates domain names (such as web servers) with unique IP addresses. DNS servers translate URLs into machine-readable IP addresses. TCP/IP TCP/IP stands for Transmission Control Protocol/Internet Protocol. It is the suite of protocols or rules that facilitate Internet communication. HTML Hypertext Markup Language (HTML) is the programming language that web pages use to display content through web browsers, such as Firefox or Google Chrome. Intranet An intranet is like a miniature Internet. It's a private network, not a public one, but it uses many of the same technologies that are used on the Internet, such as websites and email. An organization's intranet may or may not be connected to the public Internet. A security boundary prevents devices on the Internet from accessing the devices within the intranet. VoIP Voice over IP (VoIP) sends voice phone calls using the TCP/IP protocol over digital data lines. With VoIP, phone calls are made through a network connection rather than through a standard phone line. When you make the phone call, it is converted into digital data and sent through the network or over the Internet. WiFi WiFi is a technology that provides wireless Internet connectivity through wireless routers. A WiFi network uses radio waves to transmit data within a particular area referred to as a hotspot. Internet of Things The Internet of Things refers to the network of physical devices that are connected to the Internet and capable of communicating and sharing data through sensors, network connectivity, barcodes, QR codes, and other technologies. The Internet of Things is made up of devices such as refrigerators, thermostats, street lights, and environmental tracking systems.

Which of the following is a disadvantage of web applications?

Web applications can carry a monthly or yearly fee.


Conjuntos de estudio relacionados

Real World Examples IB ECONOMICS

View Set

Установка заземлений

View Set

Critical Care Hesi practice questions:

View Set