Module 2: The World Wide Web
WiMAX (Worldwide Interoperability for Microwave Access)
Technology, also known as the 802.16 standard, that computers and devices use to communicate wirelessly across long distances
Accuracy
To check the _____ of an online resource, verify the facts that the resource provides.
Synchronous
Type of communication technology that requires all participants be online at the same time
Webmail
Type of e-mail that uses a browser and an e-mail account provided through an online service to send and receive e-mail
Browser
You can access Web apps from any device with a(n) _____ and an Internet connection.
EFS
You can encrypt specific files and folders in Windows using _____.
Reasonableness
Evaluate the _____ of an online resource by assessing its objectivity.
Second Life
A virtual world with a currency system that has an official market-driven exchange rate
Domain Name System
Every domain name and its corresponding IP address are entered into a world-wide database called the _____.
Top-Level Domain
Every domain name ends with an extension that indicates its _____.
Cookie
A _____ is a small text file that a Web page stores on your computer to identify you when you visit that Web site.
Content Aggregator
A _____ site gathers and organizes Web content, and may automatically downloads updates to subscribers.
Subject Directory
A ___________ is a catalog of Web pages organized by topic.
News Site
A ___________ is an excellent resource for facts and immediate reactions to current and recent events.
Specialty Search
A ____________ engine lets you search databases, news providers, or podcasts.
Scholarly Site
A ____________ includes information that's been written and researched thoroughly by experts, double-checked for accuracy, and reviewed by other experts.
Metasearch
A ____________ sends a query to many search engines at the same time.
Social Search
A _____________ lets you search blogs, microblogs, comments, and conversations on social media sites.
Protocol
A communications standard that specifies the method and speed that devices use to transmit data
Asynchronous
Because a blogger doesn't need to be online at the same time that readers are, a blog is considered _____ communication.
Encyption
Besides passwords and firewalls, you can add an additional layer of protection for your computer data by using _____.
Consumers
Businesses participate in social networks to encourage _____ to post messages with questions, comments, and ratings.
e-mail address
Components include a user ID, the "at" symbol, and the name of the e-mail provider
Search Phrase
Consists of multiple keywords
Search Engine
Creates a query based on your search criteria and stores the data it collects in a database.
Motion
Creating the appearance of _____ by displaying a sequence of still images is called animation.
Financial Fraud
Crime usually committed by identity thieves
Static Web Publishing
Displaying data from a Web database by converting a database report into an HTML document that a browser can display
DON'T
Drink hot coffee, leave laptop in freezing temps, use laptop at beach
Photo Sharing
Flicker, Shutterfly, and Photobucket are ________ social networks.
Photo
Flickr provides online _____ management.
Text Message
Form of communication that is also called SMS, for short message service
SaaS (Software as a Service)
Google Drive is an example of _____ , which runs software directly from the Internet.
How a third-party cookie can end up on your computer
Hosted ad on a Web site
Credibility
Identifying the author is one way to check the _____ of an online resource.
802.11
Standards that wireless fidelity devices use
Shred documents and monitor accounts
Steps you can take to protect personal information
OLED
Technology often used in head-mounted displays to display the game and respond to motion
Presence
Technology used in IM, which lets one computing device identify the status of another
Force Feedback
Technology used in game controllers that lets users feel resistance in response to their actions
Tabbed
You can use _____ browsing to access several Web pages in the same browser window.
Lock
Your browser is using a secure connection when it displays a _____ icon and "https://" in the Address bar.
Remove unwanted files
Your computer is running very slowly and you can no longer run your favorite program on your computer.
Call a technician
Your desktop computer won't work at all even though it's plugged in and has been turned on.
Tim Berners-Lee
invented the World Wide Web in 1989
DO
surge supressor, use magnetic cover, use compressed air
Private Browsing
In _____ mode, you can surf the Web without leaving history, temporary Internet files, or cookies.
Digital Certificate
Secure Web sites often use a _____, which verifies the identity of a person or an organization.
Google Alert
Set up ____________ if you want to be notified when new online information about a topic becomes available.
Local
Type of e-mail that uses an e-mail client and an e-mail account provided by an ISP to send and receive e-mail
Motion-Sensitive
Type of game console used by doctors to practice their fine motor skills
Cyberbullying
Uses Web technologies to humiliate, torment, or badger an individual
HTML 5
Version of HTML that provides tools for modern Web browsing
Open Web
Web sites on the _______________ are freely available to the public.
read the terms of use and privacy statements
determine how a web site uses your browsing history
Wiki
Everyone in your group can access and edit a collaborative Web site known as a(n) _____.
Hits
Search engines place the most relevant ___________ on the first few pages of search results.
e-mail server
A computer that routes e-mail messages through a network
Plug-Ins
A type of helper application that Web sites programmed in HTML 5 do not need or support
Dynamic Web Publishing
A way to display data from a Web database by creating Web pages on demand
Collaborative
A wiki is an example of a _____ Web site.
Boolean Operator
A word or symbol that identifies the relationship between keywords, such as AND, OR, and NOT
Link
A(n) _____ is a connection to a different area on the Web page, another Web page on the same site, or even a Web page on a different site.
W3C (World Wide Web Consortium)
Agency that sets standards and guidelines for the Web
Web Crawler
An automated program that uses hyperlinks to jump between Web pages and collect data
e-mail message
An electronic document transmitted on a computer network
Productivity
Applications that help you complete specific tasks are called _____ applications.
Vlogs
Authors of _____ mainly post video clips.
Software Development Kit
Kits that contain tools for creating drawings, game-playing interfaces, and multiplayer control
Support
Links or citations to reputable sources or authorities show the information has _____.
Microblog
Members of a(n) _____ such as Twitter can post messages of up to 140 characters or links to Web pages.
TCP/IP (Transmission Control Protocol/Internet Protocol)
Network protocol that defines how to route data across a network
Forum
Often uses a moderator to approve messages before they are posted for others to read
Profile
On a social network, you create an online form to create a virtual identity, or _____, which includes information you choose to describe yourself.
Instant Message
One-on-one real-time messaging
Usernames
Passwords, PINs, and ____ are the keys to your personal accounts with online retailers, banks, and social sites.
Douglas Engelbart
Patented the first mouse in 1970
HTML Tags
Pieces of code that control how a document is displayed on a Web page
GPS
Real-time location systems, such as RFID tags, use _____ technology.
Invisible Web
Restricted Web sites are also known as the Private Web or the ____________.
Blogosphere
The _____ is the worldwide collection of blogs.
Home
The _____ page appears when you first open a browser.
CARS
The _____checklist helps you evaluate a Web page before you use it as an information source.
ARPANET (Advanced Research Projects Agency Network)
The first computer network, consisting of four computers, created by the U.S. Department of Defense
Clean the device
The keys on your keyboard are sticky.
Internet
The largest network in the world, consisting of millions of interconnected networks.
Plug in power cord
The monitor attached to your computer is blank and makes no sound when you turn it on
Encrypition
The process of temporarily scrambling data so it is not readable is called ____________.
Keyword Stuffing
The unethical practice of manipulating meta keywords to push a Web site to the top of a search result list
Preferences
To customize search results, you can change _________ , such as the number of results displayed per page.
Word Stem
When preparing for a search, choose ________________ that make the search term unique and specific.
Streaming Video
When you play _____, the server transmits a small segment of a file that starts to play on your computer while the server is sending the next segment.
General Search
When you're looking for Web pages containing specific words or phrases, use a _______________ engine.
cloud storage
You can back up your files to remote servers over the Internet using ____, and you can then retrieve your data anytime from anywhere in the world.
change the batteries
Your wireless mouse is unresponsive, and the pointer is not moving.
_____ is an example of a professional networking site where you keep in touch with business contacts.
ICANN (Internet Corporation for Assigned Names and Numbers)
_____ is an organization that coordinates Internet addresses and domain names around the world.
ASPs (application service providers)
_____ provide software-based services over the Internet.