Testout Chapter 5 Vocab

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Computer Restart

A good tip for any computer problem is to restart your system. Restarting turns the computer off, then on again. To restart your Windows system

Internet Service Technician

An Internet service technician works with telecommunications equipment and hardware. They build infrastructures for networking, telephones, radio, and other communications channels. If you've ever switched Internet providers, an IST probably came to your house to add the correct wiring and network adapters. The most important skill that a technician can possess is the ability to quickly troubleshoot and fix any issues that may arise from customers. They need to be quick problem solvers and have great communication and customer service skills.

Intranet

An intranet is like a miniature Internet. It's a private network, not a public one, but it uses many of the same technologies that are used on the Internet, such as websites and email. An organization's intranet may or may not be connected to the public Internet. A security boundary prevents devices on the Internet from accessing the devices within the intranet.

Browser extensions

Plug-ins and other browser extensions, such as the Adobe Flash Player, can be installed to enhance the appearance and functionality of websites. Keep in mind:Untrusted extensions can take advantage of security vulnerabilities.Extensions can be temporarily disabled on some browsers, or they can be deleted from the system.

Write Clearly and Concisely

A lot of Internet users are careless about how they communicate ideas in messages and posts. To respect other users' time and to make sure your ideas are communicated correctly, be sure your posts and email messages are:Clear. Read through your message and make sure your point is clearly stated. Remember, the reader may not have the same background that you have. Will they understand what you are trying to say?Concise. Be brief and to the point. Nobody likes to wade through a ten-page email or post trying to find important information.Readable. Use understandable terms when you write. Many Internet users prefer to use shorthand terms in their posts and messages, such as u r ("you are") and idk ("I don't know"). While using shorthand can reduce the amount of time needed to compose a message, it makes it much more difficult to read. It can also obscure the meaning and intent of your message, resulting in misunderstandings.

Cloud Hosting

A method of delivering applications by hosting them in the cloud.

Pop-up Blockers

A pop-up blocker is a feature of most web browsers. It prevents pop-up windows (such as advertisements) from being displayed. Web browsers often block pop-up windows to protect you from malware. Because legitimate websites also use pop-up windows. you can disable the pop-up blocker for specific sites.

Proxy Servers

A proxy server is a device that stands as an intermediary between an application such as a web browser and the internet. Keep in mind, a proxy server:Acts as a firewall. It intercepts all requests and uses filter rules to allow or deny internet traffic.Can improve performance on frequently used websites. It can also be used to prevent access to specific websites.

URL

A URL, or Uniform Resource Locator, is the reference or address to a resource on the Internet. An example of a website URL is http://www.testout.com/home/about/privacy. It consists of a protocol identifier (HTTP), a domain name (www.testout.com), and an optional path to the resource (home/about/privacy).

Cloud Storage

A cloud computing service that remotely maintains, manages, and backs up data and makes that data available to users over a network.

Microsoft OneDrive

A cloud storage service that is offered by Microsoft.

Use Advanced Search Options

All of the popular search engines have some kind of advanced search option. Advanced searches provide several ways to refine and narrow your search, including fields for "exact words" and fields for words you do not want to be found in the source. You can also narrow the search by language, region, domain, and file type. One important thing to note about advanced searches is that the search filters are cumulative. This means you can apply as many of the filters as you want and they will all be applied at the same time. If your search ends up being too narrow, you can go back and remove some of the filters or try alternative phrases.

File Attachment

An attachment is a separate file, such as a Microsoft Word document or a photo, that is sent through email. When you send an attachment, the recipient of your message will be able to download their own copy of the file to their computer. Be careful when opening email attachments. Sometimes malicious users will attach viruses or other malware to an email, so you should only open an attachment when it's from a source you recognize and trust.

Narrow Your Search

At the top of the list of search results, most search engines include a few options for narrowing your search to specific result categories. For example, you can click "News" and see news articles related to your search terms. Or you can click "Images or Videos" to view media results. Another option for narrowing your search is to return to the Search box and add or clarify search terms. You can also put some or all of the terms in quotations, which tells the search engine to display results containing that exact phrase instead of results that include each of the individual words.

Bcc

Bcc stands for blind carbon copy. People added to this field will receive the email, but their addresses will be hidden from other recipients.

Obey the Law

Be familiar with the laws in your jurisdiction surrounding computer use and cyber security, and abide by them. For example, in the United Kingdom, the Communications Act of 2003 criminalizes the act of being an overly aggressive Internet troll that targets a specific individual.

Show Consideration for Other Users' Time

Before making an online post or sending an email, make sure it is worth the time of those who will read it. A common violation of this rule occurs when someone forwards a mass email message of questionable origin to everyone in their address book. Before doing this, consider the following:Verify the authenticity of the information you are sending.Ask yourself whether the recipients actually need (or even want) to read it.

Certificates

Ecommerce and other websites that handle sensitive information should be certified to indicate they're using a secure protocol with data encryption.

IP Address

Every computing device that accesses the Internet is assigned a unique Internet Protocol (IP) address. These addresses consist of either four (IPv4) or eight (IPv6) parts. An example of a four-part IP address is 137.75.68.206.

Facebook

Facebook is the world's most popular social networking platform. People use Facebook to share pictures, videos, and content from other websites. Additionally, Facebook is often used as a tool for both public and private conversations between users.

HTML

Hypertext Markup Language (HTML) is the programming language that web pages use to display content through web browsers, such as Firefox or Google Chrome.

Investigate Author Biases

If you have any reason to doubt the reliability of an author's claim, find out more about his or her affiliations and investigate possible biases. What is the author's purpose? Is it simply to inform as objectively as possible, or is it to persuade you or sell you something? Does the author seem to be overly emotional or making outlandish claims?

Use Scholarly Sources for Academic Research

If you're working on academic or professional research, limit your searching to scholarly authors who have credentials in their field. Online academic databases such as Google Scholar are configured to limit search results to scholarly sources.

Compatible Browsers

If your web browser is not displaying website content properly, consider installing and using a different web browser. Keep in mind:A website may have been designed and programmed without taking into account the functionality of different browsers.Popular web browsers include Google Chrome, Mozilla Firefox, Apple Safari, and Microsoft Edge.

Instagram

Instagram is primarily for sharing photographs and videos with friends and followers. It is commonly installed on mobile devices, which can be used to take a picture and then immediately upload it to Instagram.

ISP

Internet Service Providers, or ISPs, manage an access point to the Internet. They don't manage the entire Internet. If you think of the Internet as a big freeway, then ISPs manage the on-ramp to the freeway. They're responsible for building the on-ramp and keeping it maintained and open, but they're not responsible for the Internet itself.

Junkmail

Junkmail refers to unwanted, unsolicited email, including product advertisements, hoaxes, dubious opinions, and scams. Most email clients include a feature that automatically filters out junkmail. Domains or email addresses that are not caught with standard email filters can be blocked manually and then sent to a junk folder. If a legitimate email is mistakenly flagged as junkmail, the address can be added to a "safe senders" list.

LinkedIn

LinkedIn is an entire social network dedicated to the professional world. Employers often use LinkedIn to search for candidates for positions in their companies. Job seekers use it to communicate their skills and expertise to potential employers.

Aerial Vehicles

One of the fastest growing markets in IoT is unmanned aircraft systems (UAS) because they provide large commercial and strategic opportunities. For example, these UAS systems (sometimes called drones) can help in industries, such as agriculture, filming, and the military.

IoT cars

Owners of internet-enabled cars can use phones to monitor gas usage and engine status. Online navigation software can be used instead of a separate Global Positioning System (GPS), and music apps can replace the need for a traditional radio.

Client-side scripting

Scripting languages such as PHP and JavaScript extend the functionality of web pages. Keep in mind:The code for scripting languages can be executed either on the web server or on the client-side within the web browser itself.Since client-side scripting takes place on the client, it poses a security risk on untrusted sites.You can deactivate client-side scripting in some web browsers. However, most websites rely on client-side scripting and it usually needs to be allowed.For greater control over the websites that can run scripts, you can install a script blocker add-on for the browser.

Sift Through Search Results

Search engines use complex algorithms that rank websites according to their popularity, responsiveness, and overall "relevance." These rankings influence which sites are displayed near the top of your search results. Most search engines also highlight links to related content sponsored by advertisers. As you sift through search results, if you're looking for products or services related to your search terms, you might want to consider clicking on an advertised link. Otherwise, you'll want to ignore them and scan the list for more reliable, objective information. It's often a good idea to click through a few pages of results, since the most relevant pages might not be at the top of the list.

The Web

Short for World Wide Web, the Web refers to the digital content that is delivered over the Internet, usually through a web browser.

Verify Facts

Since information on the Internet is not regulated by a fact-checking body, it's important to verify claims by looking at multiple sources. Don't trust one or two sources of unverified pieces of information.

Software Subscription

Sometimes called SaaS or on-demand software, software that requires a monthly or annual fee to use the software and receive regular updates.

Smart homes

The term smart home refers to a home with devices that can be controlled remotely over the internet with a smartphone or computer. Many smart homes have internet-enabled security systems. Indoor and outdoor security cameras record live video footage that the resident can view from a phone or tablet. The security systems have alarms that inform the police in the event of a break-in.

Cloud Computing

The use of remote services hosted on the internet to store, manage, and process data.

Social Media Marketer

The use of social media has changed dramatically over the years. It started as a way of connecting with friends and family, but today most companies and corporations have a social media presence. Using their creative skills, social media marketers write and edit content for social media platforms like Facebook, Instagram, LinkedIn, and YouTube. Creative content ideas can be communicated through a photograph, a blog post, a video, or any other innovative medium. Social media marketers also need skills in Search Engine Optimization (SEO) and web traffic metrics. And they need excellent communication skills and the ability to collaborate across teams.

Use the Browser Address Bar

To perform an online search, you can visit the website for your preferred search engine, such as google.com or bing.com, and then begin entering search terms. However, for a quick online search, you can enter search terms directly into the address bar of your web browser, which will forward them to the default search engine. If you enter the URL for a website, such as testout.com, the browser will display the website. But if you enter one or more search terms separated by a space, the terms will be processed by the default search engine.

Emergency and medical applications

To save human lives, emergency vehicles can use IoT systems for better response times. A smart ambulance system (SAS) can be integrated with an intelligent traffic control system (ITCS) that controls the timing of traffic lights in the path of the emergency vehicle.

Twitter

Twitter allows users to post short messages, videos, and pictures, which can be viewed by other Twitter users. Twitter is commonly used by celebrities, politicians, and other high-profile figures as a means of reaching out to large numbers of followers at once.

Reply All

Use this option to send a message to everyone included in an email: the sender, recipients listed in the To: field, and recipients in the Cc: field. Use the Reply All option only when your reply contains information that is critical for all recipients. Otherwise, use Reply and then add other recipients manually.

Forward

Use this option to send an email from your Inbox to another person. By default, a forwarded message will include all email attachments that were included with the original message. After selecting the Forward option, you can add a brief note at the top of the original message as needed.

VoIP

Voice over IP (VoIP) sends voice phone calls using the TCP/IP protocol over digital data lines. With VoIP, phone calls are made through a network connection rather than through a standard phone line. When you make the phone call, it is converted into digital data and sent through the network or over the Internet.

Web Designer

Web designers create, update, improve, and maintain web pages. They're in charge of the look and feel of a website, which needs to stay up to date with the latest trends in design. Web designers have a well-developed sense of color, font, layout, and images, which all work together to make a website appealing and useful. In addition to good design sense, web designers also need to be proficient in front-end coding languages like HTML, CSS, and JavaScript.

Safe Browsers

Whatever web browser you decide to use, make sure you're using the latest version. Consider the following:Older browsers often have security holes that are easy entry points for attackers. Be aware that some older browser versions are no longer supported by the company that created them.Many web applications enable functionality on a browser that may leave you vulnerable to attacks.

Browser Restart

When a web browser becomes unresponsive or slow, the problem can often be fixed by closing the browser and then opening it up again. This clears the computer's memory and lets you start with fresh content.

The Internet

While often used synonymously with the Web, the term Internet typically refers to the vast collection of networking hardware and physical computing devices that make up the Internet.

WiFi

WiFi is a technology that provides wireless Internet connectivity through wireless routers. A WiFi network uses radio waves to transmit data within a particular area referred to as a hotspot.

Reply

You'll often want to respond directly to the sender of an email without replying to the other recipients. To do this, use the Reply option rather than Reply All. If needed, you can then add other recipients to your reply manually. By default, a message reply will not include email attachments that were included in the original message.

Software as a Service (SaaS)

A term associated with cloud hosting. SaaS provides users with the applications they need to do their day-to-day work through the cloud.

Avoid Being a Troll

A troll is someone who deliberately tries to create conflict among users. Expressing your opinion is encouraged on the Internet; however, trolls are not usually interested in engaging in a healthy dialog. Instead, they seek to cause contention and disrupt the conversation. Trolling tactics include the following:Posting provocative, offensive, and even hateful messages to incite a response from other users.Posting off-topic messages in an attempt to start an argument.Posting obscene or menacing messages to harass another user.

Cc

Cc stands for carbon copy or courtesy copy. In your email program, add people to this field who should be kept in the loop, but aren't necessarily expected to respond.

Cookies

Cookies store data for specific websites. Cookies:Can contain information about your browsing habits, preferences, email account, and favorite sites.Can be saved on your computer for any length of time, sometimes for as long as the browser is open or even after you close it.Contain personal information that an attacker use.Have security settings for storage on your computer.

DNS

DNS, short for Domain Name System, is a protocol that associates domain names (such as web servers) with unique IP addresses. DNS servers translate URLs into machine-readable IP addresses.

TCP/IP

TCP/IP stands for Transmission Control Protocol/Internet Protocol. It is the suite of protocols or rules that facilitate Internet communication.

HTTP and FTP

The Hypertext Transfer Protocol (HTTP) is used to identify resources and transfer content on the web. Some web pages use the HTTPS protocol, which adds an additional layer of encryption to make data transfers more secure. The File Transfer Protocol (FTP) can also be used to transfer data between computers on a network.

Internet of Things

The Internet of Things refers to the network of physical devices that are connected to the Internet and capable of communicating and sharing data through sensors, network connectivity, barcodes, QR codes, and other technologies. The Internet of Things is made up of devices such as refrigerators, thermostats, street lights, and environmental tracking systems.

Caching

The browser cache is the storage location for images, sounds, web pages, and other information associated with a website. In addition to taking up space on the computer, data in the cache can be retrieved by someone with access to the computer.


Set pelajaran terkait

ME 383 Exam 3- CH 22: Machining Operations and Machine Tools

View Set

Quiz 2: Teams, Planning, Diversity, Motivation, Leadership Part 1

View Set

Chapter 7: Theories and Models Commonly Used for Health Promotion Interventions

View Set

Chapter 37 Alterations in function of gallbladder and exocrine pancreas

View Set