ITF+ Chapter 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Streaming

A method of transmitting and receiving data (especially video and audio information) over a network as a steady, continuous flow, allowing playback while the data is being transferred.

Tertiary Source

Resources that compile or summarize material from other sources including bibliographies, abstracts, and online article indexes and databases.

Netiquette

Rules of etiquette that should be observed while using computer networks, such as the internet.

URL

A URL, or Universal Resource Locator , is the reference or address to a resource on the Internet. An example of a website URL is http://www.testout.com/home/about/privacy . It consists of a protocol identifier ( HTTP ), a web server and domain name ( www.testout.com ), and an optional path to the resource ( home/about/privacy ).

Blog

A blog is a website that produces content in forms of blog posts that can contain text, images, video, or other media. Blogs usually have a more casual, conversational style than more mainstream websites.

Citation Style

A citation style prescribes the format you should use for citing academic sources, including author, date of publication, and journal title. Like any other academic assignment, you should check with your instructor to confirm the preferred citation style, such as MLA (Modern Language Association), APA (American Psychological Association), or the Chicago Manual of Style.

Cloud Storage

A cloud computing service that remotely maintains, manages, and backs up data and makes that data available to users over a network.

Microsoft OneDrive

A cloud storage service that is offered by Microsoft.

Internet Service Providers (ISP)

A company that provides individuals and businesses access to the internet and other related services.

Cloud Hosting

A method of delivering applications by hosting them in the cloud.

HTML

Hypertext Markup Language (HTML) is the programming language that web pages use to display content through web browsers, such as Firefox or Google Chrome.

Investigate Author Biases

If you have any reason to doubt the reliability of an author's claim, find out more about his or her affiliations and investigate possible biases. What is the author's purpose? Is it simply to inform as objectively as possible, or is it to persuade you or sell you something? Does the author seem to be overly emotional or making outlandish claims?

Plagiarism

The act of taking someone else's work and passing it off as one's own.

Caching

The browser cache refers to the storage location for images, sounds, web pages, and other information associated with particular websites. In addition to taking up space on your computer, data in the cache could be retrieved by someone with access to your computer. To provide some level of protection, you should clear the Web browser cache after you use a public computer to access the Internet. In the Chrome menu, under More tools, you can see the option to clear browsing data. Sometimes, when a website is not functioning as it should, a good troubleshooting tip is to "clear the cache," or delete this stored information. In Chrome, when you click the Clear data button, you delete your browsing and download history, cookies, passwords, and other website data.

Citation Style

The format used for citing academic sources, including author, date of publication, and journal title.

Synchronous Technology

A technology that allows two or more groups to communicate in real time such as video conferencing, VoIP, or live streaming.

Hypertext Markup Language (HTML)

A computer language that web pages use to display content through web browsers.

Internet of Things (IoT)

A computing concept that describes the network of everyday physical devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate with the internet.

Internet of Things (IoT)

A computing concept that describes the network of physical devices and everyday devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate with the internet.

Proxy Server

A device that stands as an intermediary between an application such as a web browser and the Internet. A proxy server intercepts all requests and can use filter rules to allow or deny internet traffic.

Certificate

A digital document that contains encryption keys and is used for encryption and identification.

Pop-up Blocker

A feature of most web browsers that prevents pop-up windows such as advertisements from being displayed.

Messaging

A form of written communication similar to texting but is typically done with the use of an app like Facebook Messenger or WhatsApp, usually on a mobile device.

Computer Restart

A good tip for any computer problem you may run into is to restart your system, which will turn the computer off, then on again. To restart your Windows system, click the Start button at the bottom-left corner of the screen. Click the Power icon, then click Restart. This is a step you should always take before you call a technical support helpline, including TestOut's support team.

Social Media Marketing

A marketing tool used on social media to present a business and its message quickly and in the best light possible with the intent to interact with and influence potential customers and expand their business potential.

IP Address

A numerical label that is assigned to devices so they can connect and communicate on a network.

Pop-up Blockers

A pop-up blocker is a feature of most web browsers that prevents pop-up windows such as advertisements from being displayed. The reason web browsers often block pop-up windows is to protect you from malware. However, since legitimate websites also use pop-up windows, you can disable the pop-up blocker for specific sites. To verify that pop-up windows from specific sites are allowed, go to the Chrome menu in the upper-right corner of the window and then Settings. From there, open the Advanced settings and go to Privacy and security, then Site settings. In the Pop-ups and redirects section, you'll see whether the domain is allowed to use pop-up windows. If you want to allow another site, click Add and then enter its domain name

Intranet

A private network, usually hidden from the internet and protected by a security device, that uses the same technologies that are used on the internet and may or may not be connected to the internet.

Social Media Marketer

A professional who uses creative and technical skills to create content for social media platforms in order to reach and influence current and potential customers.

Internet Service Technician

A professional who works with telecommunications equipment and hardware to build infrastructures for networking, telephones, radio, and other communications channels.

Web Application

A program or app that uses the internet and a web browser to complete a task. The user's computer interacts with a remote server to access the app.

Proxy Servers

A proxy server is a device that stands as an intermediary between an application such as a web browser and the Internet. It intercepts all requests and uses filter rules to allow or deny Internet traffic. Proxy servers can improve performance on frequently-used websites. They can also be used to prevent access to specific websites. If you're using a school or public network and are able to access some websites but not others, the reason may be the network's proxy settings.

Web Search

A search of the World Wide Web using a web browser, often done by visiting a web search engine site such as Google, Bing, or Yahoo.

Web Designer

An IT professional who employs skills in color, font, layout, and images to create appealing and useful websites.

Transmission Control Protocol/Internet Protocol (TCP-IP)

A set of rules that facilitates internet communication.

File Transfer Protocol (FTP)

A set of rules that govern the transfer of files between computers.

Hypertext Transfer Protocol (HTTP)

A set of rules that govern the transfer of web content between computers.

Cookie

A small piece of data sent from a website and stored on a user's computer by the web browser while the user is browsing. Cookies are designed to help websites remember information such as items in an online shopping cart and entries in a web form so that the website can customize a web page for the user.

On-Demand Streaming

A streaming method that allows users to select and watch or listen to video or audio when they choose, rather than at a scheduled broadcast time.

Live Streaming

A streaming method that transmits data in real time as it is created.

Domain Name System (DNS)

A system and set of rules that associates domain names (such as web servers) with unique IP addresses so users can find and use network resources by an easily readable name instead of by IP address.

RSS

A system based on simple text files that are read by a program to provide a stream of updates or feed about a particular topic. RSS originally stood for RDF Site Summary but is also known as "really simple syndication" or "rich-site summary."

Wi-Fi

A technology that allows computers, smartphones, and other devices to communicate on a wireless network.

Asynchronous Technology

A technology that allows groups to communicate by taking turns, such as in emailing and text messaging.

Voice over IP (VoIP)

A technology that sends voice phone calls using the TCP/IP protocol over digital data lines.

Software as a Service (SaaS)

A term associated with cloud hosting. SaaS provides users with the applications they need to do their day-to-day work through the cloud.

Crowdsourcing

A way of reaching out to a large group for help solving a problem. It can involve collecting ideas from users or professionals, or pooling money or resources from a variety of people.

Social Media Platform

A web-based technology to distribute information and encourage people to connect with others who share a common interest. Examples of social media platforms are Facebook, Twitter, LinkedIn, and Instagram.

Academic Source

Academic sources are generally books or articles written by experts who have credentials in a particular field of study. These publications are typically reviewed and validated by other scholars who are experts in the field. This is what it means for an online journal article to be "peer-reviewed." Original scholarly research is carefully documented to show how it builds on the research of other experts. It's published by university presses, professional associations, or academic publishers. You can find academic sources in online versions of textbooks, journal articles, dissertations, conference proceedings, and scholarly books.

Use Advanced Search Options

All of the popular search engines have some kind of advanced search option. Advanced searches provide several ways to refine and narrow your search, including fields for "exact words" and fields for words you do not want to be found in the source. You can also narrow the search by language, region, domain, and file type. One important thing to note about advanced searches is that the search filters are cumulative. This means you can apply as many of the filters as you want and they will all be applied at the same time. If your search ends up being too narrow, you can go back and remove some of the filters or try alternative phrases.

Web Browser

An application for accessing information on the World Wide Web.

File Attachment

An attachment is a separate file, such as a Microsoft Word document or a photo, that is sent through email. When you send an attachment, the recipient of your message will be able to download their own copy of the file to their computer. Be careful when opening email attachments. Sometimes malicious users will attach viruses or other malware to an email, so you should only open an attachment when it's from a source you recognize and trust.

Podcast

An audio program split up into episodes that can be enjoyed on demand. Podcast topics can range from cooking, fashion, music, and about any other topic you can think of.

Intranet

An intranet is like a miniature Internet. It's a private network, not a public one, but it uses many of the same technologies that are used on the Internet, such as websites and email. An organization's intranet may or may not be connected to the public Internet. A security boundary prevents devices on the Internet from accessing the devices within the intranet.

Wiki

An online encyclopedia that uses hyperlinks to connect each entry to other relevant entries.

Online Chat

An online written form of communication that is typically web based and used by businesses as customer service tools to assist online users who visit their websites.

Narrow Your Search

At the top of the list of search results, most search engines include a few options for narrowing your search to specific result categories. For example, you can click "News" and see news articles related to your search terms. Or you can click "Images or Videos" to view media results. Another option for narrowing your search is to return to the Search box and add or clarify search terms. You can also put some or all of the terms in quotations, which tells the search engine to display results containing that exact phrase instead of results that include each of the individual words.

Bcc

Bcc stands for blind carbon copy. People added to this field will receive the email, but their addresses will be hidden from other recipients.

Academic Source

Books or articles written by experts who have credentials in a particular field of study.

Cc

Cc stands for carbon copy or courtesy copy. In your email program, add people to this field who should be kept in the loop, but aren't necessarily expected to respond.

Consumer-level Source

Consumer-level sources are usually not written or peer-reviewed by experts. They might be published on a personal website, an online forum, a news website, or an online magazine. The audience for these sources is consumers of information — people looking for practical information to solve a problem, make a purchasing decision, or just become better informed on current events and issues. Consumer-level sources often incorporate rich media content such as online videos and photographs. If you're doing academic research, you might want to use consumer-level sources, but they should be used primarily to provide background information on your topic of interest.

Cookies

Cookies are files that store data for specific websites. This data may contain information about your browsing habits and preferences, or even your email account and favorite sites. They can be saved on your computer for any length of time, sometimes for as long as the browser is open or even after you close it. If an attacker has access to these files, they can gather your personal information. It's important to review the security settings for cookie storage on your computer. A common practice is to block third-party cookies, which are placed on your computer by advertisers and other sites with a domain name other than the one you're currently visiting.

Downloading

Creating a copy of a file from a web or network server and saving it to your local computer. This allows a user to open the file at any time even if they don't have a network connection

DNS

DNS, short for Domain Name System , is a protocol that associates domain names (such as web servers) with unique IP addresses. DNS servers translate URLs into machine-readable IP addresses.

Private Browsing

If you share your computer with someone else and don't want Chrome to track your browsing activity, you can open a window in incognito mode. This is also called private browsing. Be aware that private browsing will only prevent the web browser from tracking your activity. If you're using a computer at school or work, your browsing will still be visible to network administrators.

Certificates

Ecommerce and other websites that handle sensitive information should be certified to indicate they're using a secure protocol with data encryption. To determine whether a website is using this safer protocol, you can look for the padlock symbol in the address bar. This will let you know that the site is using a valid digital certificate.

Use Scholarly Sources for Academic Research

If you're working on academic or professional research, limit your searching to scholarly authors who have credentials in their field. Online academic databases such as Google Scholar are configured to limit search results to scholarly sources.

Navigation Buttons

If you've navigated to the wrong webpage, you can always click on the left arrow in the upper left corner of the browser, called the back button, to return to the previous page. From here, you can use the right button or forward button to return to go back to a website.

IP Address

Every computing device that accesses the Internet is assigned a unique Internet Protocol (IP) address. These addresses consist of either four (IPv4) or eight (IPv6) parts. An example of a four-part IP address is 137.75.68.206.

Facebook

Facebook is the world's most popular social networking platform. People use Facebook to share pictures, videos, and content from other websites. Additionally, Facebook is often used as a tool for both public and private conversations between users.

Compatible Browsers

If your web browser is not displaying website content properly, you might want to consider installing and using a different web browser. Sometimes a particular site might have been designed and programmed without taking into account different browser functionality. Popular web browsers include Google Chrome, Mozilla Firefox, Apple Safari, and Microsoft Edge. To take advantage of security and bug fixes, be sure that you're running the latest version of the browser.

Browser History

In Chrome, to see a list of all the web pages you've previously visited, you can click and hold down the Back button. Then select Show Full History. To return to one of these previously visited sites, simply click one of the links.

Instagram

Instagram is primarily for sharing photographs and videos with friends and followers. It is commonly installed on mobile devices, which can be used to take a picture and then immediately upload it to Instagram.

ISP

Internet Service Providers , or ISPs, manage an access point to the Internet. They don't manage the entire Internet. If you think of the Internet as a big freeway, then ISPs manage the on-ramp to the freeway. They're responsible for building the on-ramp and keeping it maintained and open, but they're not responsible for the Internet itself.

Junkmail

Junkmail refers to unwanted, unsolicited email, including product advertisements, hoaxes, dubious opinions, and scams. Most email clients include a feature that automatically filters out junkmail. Domains or email addresses that are not caught with standard email filters can be blocked manually and then sent to a junk folder. If a legitimate email is mistakenly flagged as junkmail, the address can be added to a "safe senders" list.

LinkedIn

LinkedIn is an entire social network dedicated to the professional world. Employers often use LinkedIn to search for candidates for positions in their companies. Job seekers use it to communicate their skills and expertise to potential employers.

Live Stream

Live streams transmit data in real time as it is created. Some examples are online video calls, traffic cams, and gamer streams. Live streams are kind of like listening to the radio. They send data directly to your device where it is played, then immediately discard it. Live streams can't be paused or stored, and you can't go back to a previous part of the stream.

Address Bar

Near the top of browser windows is the address bar. This is where you can type the address for the website you want to visit. Another name for a web address is URL, or Uniform Resource Locator.

Hyperlinks

On a web page, if you hover your cursor over certain words or images, the white arrow turns into a pointed finger. This lets you know there's a hyperlink to another webpage or to more information. Sometimes hovering over a hyperlink opens a dropdown menu.

IoT Cars

Owners of Internet-enabled cars can use their phones to monitor their gas usage and engine status. Online navigation software can be used instead of GPS, and music apps can replace the need for a traditional radio. In coming years, cars and trucks will use the Internet to drive themselves, without needing a person behind the wheel. Driverless cars will create a massive impact on the transportation industry and change the way we think about getting around.

Texting

Phone communication in written form sent through SMS (Short Message Service) that can be sent over a cellular network or the internet. Multimedia Messaging Service (MMS) is an extension of SMS that supports picture, audio, and video messaging.

Browser Extensions

Plug-ins and other browser extensions such as the Adobe Flash Player can be installed to enhance the appearance and functionality of websites. Untrusted extensions can take advantage of security vulnerabilities. Extensions can be temporarily disabled on particular browsers, or they can be deleted from the system. If you need to install a plug-in to use a legitimate website, make sure it's up-to-date with the latest version. Some websites require that you install a browser extension to support new functionality. If the extension does not appear to be working, check to make sure it's enabled in the browser. In Chrome settings, open an Extensions tab and turn the extension on. In some cases, you may need to remove an extension that's incompatible with others.

Primary Source

Primary sources include things like original speeches, letters, poems, laws, scientific fieldwork, and artwork.

Secondary Source

Resources such as articles or books that review, analyze, or describe primary sources.

Primary Source

Resources such as original speeches, letters, poems, laws, scientific fieldwork, and artwork.

Consumer-level Source

Resources such as personal websites, online forums, news websites, and online magazines whose audience is consumers of information -- people looking for practical information to solve a problem, make a purchasing decision, or just become better informed on current events and issues.

Client-Side Scripting

Scripting languages such as PHP and JavaScript are used to extend the functionality of web pages. The code for scripting languages can be executed either on the web server or on the client-side within the web browser itself. Since client-side scripting is a security risk on untrusted sites, it can be deactivated in some web browsers. However, since most modern websites rely on client-side scripting, it usually needs to be allowed. For greater control over which websites can run scripts, you could also choose to install a script blocker add-on for your browser.

Search Engines

Search engines are tools that gather relevant websites from around the Internet and show them to you in a list. Every search engine has a text entry box where you can type the information you're looking for. A search engine can help you find what you're looking for even if you don't remember the web address. After clicking inside the text entry box, you can type words relevant to your search and press Enter to see the search engine results. You can also perform web searches directly from the address bar at the top of the web browser. In this case, the search will be performed by the web browser's default search engine. Typing words without an extension like .com or .org, will instruct the web browser to assume that you're entering search terms rather than a URL. The search results are identical to searches from a search engine. The Chrome browser uses Google as the default search engine. The Microsoft Edge browser sends search results from Bing, which is the default Microsoft search engine.

Sift Through Search Results

Search engines use complex algorithms that rank websites according to their popularity, responsiveness, and overall "relevance." These rankings influence which sites are displayed near the top of your search results. Most search engines also highlight links to related content sponsored by advertisers. As you sift through search results, if you're looking for products or services related to your search terms, you might want to consider clicking on an advertised link. Otherwise, you'll want to ignore them and scan the list for more reliable, objective information. It's often a good idea to click through a few pages of results, since the most relevant pages might not be at the top of the list.

Secondary Source

Secondary sources are articles or books that review, analyze, or describe primary sources.

The Web

Short for World Wide Web , the Web refers to the digital content that is delivered over the Internet, usually through a web browser.

The Web

Short for World Wide Web. Digital content that is delivered over the Internet, usually through a web browser.

Verify Facts

Since information on the Internet is not regulated by a fact-checking body, it's important to verify claims by looking at multiple sources. Don't trust one or two sources of unverified pieces of information.

Digital Assistant

Software found on almost every computer or smart device that makes a variety of tasks easier, especially by allowing you to control your device with just your voice. Examples of digital assistants are Apple's Siri, Microsoft's Cortana, Amazon's Alexa, and Google's Google Assistant.

Browser Extension

Software that adds functionality to a web browser.

Software Subscription

Sometimes called SaaS or on-demand software, software that requires a monthly or annual fee to use the software and receive regular updates.

TCP/IP

TCP/IP stands for Transmission Control Protocol/Internet Protocol . It is the suite of protocols or rules that facilitate Internet communication.

Tertiary Source

Tertiary sources compile or summarize material from other sources. They include bibliographies, abstracts, and online article indexes and databases. Online encyclopedias like Wikipedia are also considered tertiary sources. For academic research, tertiary sources are good places to find references for both primary and secondary sources. Online databases such as LexisNexis, JSTOR, Academic Search, and Google Scholar all provide search engines designed for locating academic sources.

HTTP and FTP

The Hypertext Transfer Protocol (HTTP) is used to identify resources and transfer content on the web. Some web pages use the HTTPS protocol, which adds an additional layer of encryption to make data transfers more secure. The File Transfer Protocol (FTP) can also be used to transfer data between computers on a network.

Internet of Things

The Internet of Things refers to the network of physical devices that are connected to the Internet and capable of communicating and sharing data through sensors, network connectivity, barcodes, QR codes, and other technologies. The Internet of Things is made up of devices such as refrigerators, thermostats, street lights, and environmental tracking systems.

Buffering

The pre-loading of data from a stream into memory to help avoid interruptions while waiting for data that is received in bursts.

Client-Side Scripting

The process of transferring source code from a web server to a web browser and running that code directly in the browser.

Universal Resource Locator (URL)

The reference or address to a resource on the Internet. Example: http://www.testout.com/home/about/privacy

Caching

The storing of images, sounds, web pages, and other information associated with particular websites that allows a browser to redisplay data without having to reload it from the website.

Smart Homes

The term "Smart Home" refers to a home with devices that can be controlled remotely over the Internet with a smartphone or computer. Many smart homes have Internet-enabled security systems. Indoor and outdoor security cameras record live video footage that the resident can view from their phone or tablet, and alarms inform the police in the event of a break-in. Thermostats can learn the residents' daily routines and adjust the temperature of the home accordingly. Even home appliances, like refrigerators and coffee makers, can be controlled over the Internet by phone.

Cloud Computing

The use of remote services hosted on the internet to store, manage, and process data.

On-demand Stream

The videos in this course are an example of on-demand streaming. With on-demand streaming, you can watch a video or listen to an audio file at any time if you have an Internet connection. Data is sent from a server to your device, which starts temporarily storing the data. This is called buffering. When there's enough data in the buffer, playback begins. With on-demand streaming, you can pause and skip to different parts of the file. However, the files are temporary and don't remain on your computer, so you can't modify them or make copies.

The Internet

The worldwide system of interconnected computers and public networks.

Browser Settings

To change the Chrome startup options and other settings, click the Chrome menu in the upper right-hand corner of the browser and select Settings. In Settings you can manage your Google account, change autofill settings, customize appearance configurations, manage the default search engine and browsers, and change the startup options.

Bookmarks

To find a specific website more quickly in the future, you can add a bookmark. In Chrome, go to the upper right corner of the window and click the star symbol. Add the bookmark to the bookmarks bar and click Done. To return to the bookmarked page, you can click the Chrome menu and select Bookmarks. If you open a new tab in the browser, you can see the bookmark conveniently below the address bar.

Use the Browser Address Bar

To perform an online search, you can visit the website for your preferred search engine, such as google.com or bing.com, and then begin entering search terms. However, for a quick online search, you can enter search terms directly into the address bar of your web browser, which will forward them to the default search engine. If you enter the URL for a website, such as testout.com, the browser will display the website. But if you enter one or more search terms separated by a space, the terms will be processed by the default search engine.

Emergency and Medical Applications

To save human lives, emergency vehicles can use IoT systems for better response times. A Smart Ambulance System (SAS) is integrated with an Intelligent Traffic Control System (ITCS), which controls the timing of traffic lights in the path of the emergency vehicle. In other words, smart ambulances can communicate with traffic lights, changing them to green as they approach. This "green corridor" lets emergency vehicles arrive at their destination faster and more safely. Patients with heart or breathing problems can wear Internet-enabled sensors that automatically contact emergency services if they sense a problem.

VoIP

Voice over IP (VoIP) sends voice phone calls using the TCP/IP protocol over digital data lines. With VoIP, phone calls are made through a network connection rather than through a standard phone line. When you make the phone call, it is converted into digital data and sent through the network or over the Internet.

Twitter

Twitter allows users to post short messages, videos, and pictures, which can be viewed by other Twitter users. Twitter is commonly used by celebrities, politicians, and other high-profile figures as a means of reaching out to large numbers of followers at once.

Reply All

Use this option to send a message to everyone included in an email: the sender, recipients listed in the To: field, and recipients in the Cc: field. Use the Reply All option only when your reply contains information that is critical for all recipients. Otherwise, use Reply and then add other recipients manually.

Forward

Use this option to send an email from your Inbox to another person. By default, a forwarded message will include all email attachments that were included with the original message. After selecting the Forward option, you can add a brief note at the top of the original message as needed.

Safe Browsers

Whatever web browser you decide to use, make sure you're using the latest version. Older browsers often have security holes that are easy entry points for attackers if they're not patched. Some older browser versions are no longer even supported by the company that created them. Since many web applications enable different functionalities on your browser that leave you vulnerable to attacks, the safest policy is to disable most functions that are not absolutely necessary for the application. Then, if you determine a website is trustworthy, you can temporarily enable the functionalities as needed.

Browser Restart

When a web browser becomes unresponsive or slow, the problem can often be fixed by closing the browser and then opening it up again. This clears the computer's memory and lets you start with fresh content.

Downloading

When you download a file, you create a copy of a file from a web or network server and save it to your local computer. After the file has been downloaded, you can open it at any time, even if you don't have a network connection. You can also make changes to the file and create additional copies. Downloading uses the TCP protocol, meaning your computer and the server communicate back and forth to make sure the download is an exact copy of the original. While this ensures the quality of the downloaded file, it makes the process much slower.

The Internet

While often used synonymously with the Web, the term Internet typically refers to the vast collection of networking hardware and physical computing devices that make up the Internet.

WiFi

WiFi is a technology that provides wireless Internet connectivity through wireless routers. A WiFi network uses radio waves to transmit data within a particular area referred to as a hotspot.

Reply

You'll often want to respond directly to the sender of an email without replying to the other recipients. To do this, use the Reply option rather than Reply All . If needed, you can then add other recipients to your reply manually. By default, a message reply will not include email attachments that were included in the original message.


Ensembles d'études connexes

SLHS 539 quizzes, quiz questions, and final learning objectives

View Set

I can describe travel problems and accidents

View Set

1984 Quiz 1 (Chapter 1-7) Palmer

View Set

fundamentals midterm previous quizzes

View Set

Major Depressive Disorder and Bipolar Disorder

View Set

AP environmental science math formulas

View Set

CBI Practice Exam 2 - KnowledgeEquity

View Set