CIW review

Ace your homework & exams now with Quizwiz!

Data modeling vs. ontology

A business ontological study is meant to help create various complex systems. Data modeling is meant for databases only. In data modeling, the most important consideration is the database's ability to process data. A business ontology is meant to describe how a business (i.e., domain) is organized and how it processes data. In a business ontology, the way an application processes data is not considered.

Ajax

Ajax (Asynchronous JavaScript and XML) is a programming methodology for the Web that enables Web applications to interact with users in much the same way they do with desktop applications. Ajax allows you to create interactive Web applications using HTML, CSS, the Document Object Model (DOM), JavaScript and XMLHttpRequest. You can use Ajax to create dynamic and interactive Web pages without the need to refresh or reload the page. Ajax will work only on the more advanced browsers (6.x or higher).

Cookies

As you learned in a previous lesson, cookies are small text files placed on Web site visitors' computers so that Web site managers can customize their sites to their visitors' preferences. For example, a cookie might be used to store information about your actions, such as the options you clicked on a Web page. Cookies are stored on any computer that uses a Web browser, including PCs, smartphones and tablets.

Diffusion of innovation

Closely related to the technology adoption life cycle is the "diffusion of innovation" theory, which describes how, why and at what rate new ideas and technologies spread through cultures. In 1991, Geoffrey A. Moore explored the diffusion of innovation theory and its applicability to the marketing of high-tech products.

How the Internet works

Every computer connected to the Internet uses a protocol suite called Transmission Control Protocol/Internet Protocol (TCP/IP), which enables computers to communicate with one another. TCP enables two computers to establish a communication link and exchange packets of data; IP specifies the format and addressing scheme of the packets. Dissimilar systems can then communicate and exchange data provided that both use TCP/IP.

HTML

HTML résumés are generally created to post as Web pages or, in some cases, to send as HTML-based e-mails. (However, consider that many people do not appreciate HTML-based e-mails and prefer text-only format with appropriate attachments.) HTML, or "Web-ready," résumés are useful if you have your own Web site or have access to Web space. Some Web sites offer free Web-space hosting and your ISP may include a Web-space hosting service. HTML documents use the .htm or .html file name extension.

Spam

Just as junk mail can fill your mailbox at home, junk e-mail can clutter your Inbox. Such unsolicited mail is called spam. Spam is unsolicited e-mail sent to multiple users and is often made to appear as if it came from a trusted source.

What are plug-ins?

Plug-ins are applications associated with a specific platform (such as Windows or Apple OS X) and sometimes with a specific browser (such as Chrome, Firefox or Internet Explorer). The primary goal of a plug-in is to provide efficient integration of multimedia formats with the browser and computer. Without this integration, a user would have to download multimedia files and play them back later with a separate application. Plug-ins allow multimedia data types to execute directly from a browser, allowing immediate viewing and listening, thus enhancing your Web experience.

Collaboration

Presencing requires collaboration among a number of devices (for example, mobile phone, electronic calendar, instant messaging client) and the presence services with which each of them is connected. For presence to work with MPOP, multiple devices must be able to intercommunicate, and the status information must be appropriately handled by all the connected presence services.

Crowdsourcing

Some cloud computing applications use crowdsourcing (also known as collaborative filtering) to help you define and refine choices you make in a cloud computing application to personalize its content. As you learned in a previous lesson, crowdsourcing occurs when a task ordinarily performed by one person is outsourced to a large group or community in order to obtain and analyze large amounts of data.

T and E carriers

T carriers refer to T1 and T3 lines, which are dedicated digital telephone lines that have much greater bandwidths than ISDN lines. T1 lines can transmit data at 1.544 megabits per second (Mbps), and T3 lines can transmit data at 44.736 Mbps. Many businesses lease T1 lines from phone companies to connect to ISPs.

Text format

Text résumés (also known as plaintext or ASCII résumés) are intended to be entered into keyword-searchable résumé databases and applicant-tracking systems used by most large employers. Text résumés contain little formatting and are not necessarily designed to be visually impressive. However, they are not vulnerable to viruses and can be read by many different programs on many different platforms. Text résumés can be used to post directly to job boards, or to paste into the body of an e-mail message.

network

a group of two or more computers connected so they can communicate, share resources and exchange information with one another. In a networked environment, computers are connected to a network server, which acts as the central repository of programs and data to which all users connected to the network have access.

domain name

and the IP address refer to the same resource (for example, an FTP or Web server), but the domain name is much easier to remember. Without DNS, users would be forced to enter numerical IP addresses every time they need access to any resource on the Interne

Microformats

are data formats that add human-readable metadata to existing code so that the data can be processed by other software. The use of microformats allows bloggers to incorporate information from Web sites into their blog entries without making it necessary for the reader to visit the Web site. Initially, the main drawback to using microformats was that the blogger needed to possess programming knowledge and skills to create the microformat instructions to integrate Web sites with blog posts. However, Firefox version 3 (and higher) and Internet Explorer version 8 (and higher) include native support for microformats.

Search engines

are powerful software programs that make it easy to find information on the Internet. A search engine consists of a large database that contains information about Web pages that have been registered with the search engine. Most search engines allow you to browse general categories, search for specific topics or find detailed information based on narrowly defined criteria.

wide area network (WAN)

consists of two or more LANs that span a wide geographic area. For example, a large business may have offices in several locations across the country or around the world. Each site has its own LAN with which to share resources and data locally, but it also needs to communicate with the other sites.

Collaboration

eb 2.0 is a paradigm shift in the way the Internet is used compared with the days of Web 1.0. Web 2.0 involves a more open approach to the Internet that concentrates on developing the information-sharing and collaboration capabilities of the Web. Web 2.0 enables the use of crowdsourcing, in which users who access the Internet, view media and use the Web become active contributors, helping to customize the available technology and media for their own purposes, as well as for those of their communities.

Presence

information is a status indicator that conveys a person's willingness and ability to engage in communications. For example, when a user signs in to a social networking or instant messaging (IM) service, his status (e.g., online) is advertised (or published) to the people on his contacts list. A user's presence information, or presence state, is provided to a presence service via a network connection.

call center

is a centralized office used for the purpose of processing a large volume of requests by phone. Traditionally, a call center has been a large, open workspace filled with workstations that each include a computer, a telephone and a headset, with one or more supervisor stations in the workspace. A typical call center is shown in Figure 2-20.

database

is a collection of data that can be sorted and searched using search algorithms. Databases are useful for storing, manipulating, managing and querying large amounts of data

Instant messaging (IM)

is a computer-based method of communication in which users can type and view messages sent to one or more recipients, and view the responses immediately. IM services use the Internet for the most part, although it is possible for IM services to also send messages to mobile phones, and vice-versa.

virtual domain

is a hosting service in which one domain name server hosts multiple domain names. For example, if you register your domain name yourcompany.com, users can enter www.yourcompany.com to access your site, even if your Web site is hosted by a third-party ISP whose domain name is webserver.com. Users enter only your domain name, not the domain name of the third party.

virus

is a malicious program designed to damage computer systems, from stand-alone computers to entire networks. Specifically, a virus is a program that assumes control of system operations, and damages or destroys data. Viruses are loaded onto your computer without your knowledge and run without your consent. All computer viruses are man-made and are often designed to spread to other computer users through networks or e-mail address books.

Wikis

is a page or collection of Web pages that can be viewed and modified by anybody with a Web browser and access to the Internet. When you open a wiki, you can read what the wiki's community has already written.

trojan

is a program that appears to be harmless but actually produces harmful results. They are named for the mythical Trojan horse that brought down the kingdom of Troy.

worm

is a self-replicating program or algorithm that consumes system and network resources. The difference between a worm and a virus is that a worm automatically spreads from one computer to another, whereas a virus requires some form of action from an end user, administrator or program. A worm can reside in active memory and replicate on the network.

Spyware

is a software application that is secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes. Many Internet-based applications contain spyware. Companies with both good and bad reputations have included spyware code in their software. Spyware can also be placed on a user's system by a virus or by an application downloaded from the Internet.

Uniform Resource Identifier (URI)

is a way to refer to information or resources, whether they are on the World Wide Web, on a personal computer system or elsewhere. A URI is a text string that can refer to documents, resources or people.

illicit server

is an application that installs hidden services on systems. Many illicit servers, such as NetBus and Back Orifice (a play on Microsoft's Back Office), are remote control or remote access programs.

Java

is an object-oriented language developed by Sun Microsystems. Java concentrates on distributed objects over a network (for example, the Internet), and is often used when data needs to be shared across the network.

Authentication

is the process of verifying the identity of a user who logs on to a computer system, or verifying the integrity of transmitted data. Before providing (or "serving") pages, servers require authentication. Browsers must be able to engage in the authentication process.

Paradigm shift

n 1962, Thomas Kuhn defined and popularized the concept of a "paradigm shift" in reference to the philosophy of science. A paradigm is a common belief in a theory and its principles. A paradigm shift is a change from one way of thinking to another; it is a revolutionary transformation that is driven by agents of change.

Malware

or malicious software, refers to programs or files whose specific intent is to harm computer systems. Malware is an electronic form of vandalism that can have global implications. You must be aware of malware to be able to detect and remove malicious code before it causes harm to your systems and networks. Malware includes computer viruses, worms, trojans and illicit servers, each of which will be discussed in this section.

digital certificate

proves the identity of an individual or company over the Web. A digital certificate is equivalent to an ID card and is digitally signed by the certificate creator.

Social networking

refers to the grouping of individuals with common interests or goals into specific groups or communities. Online social networking is conducted through Web sites because there are potentially millions of Internet users who have interests in specific topics about which they would like to share information and opinions.

blog

s a collection of personal thoughts posted on a public Web site. A blog is essentially an electronic journal or public diary. Blogs are an example of a Web 2.0 methodology that emphasizes user interaction. The act of adding to a blog is known as blogging.

Web 2.0

s a term coined in 2004 by Tim O'Reilly of O'Reilly Media. It does not mean a second version of World Wide Web software. Rather, it refers to the changing trends in the use of World Wide Web technology and Web design since the early days of the Web when most Web pages were static, when users simply retrieved information, and when Internet connections were slow. Web use before the "bursting of the dot-com bubble" in 2001 is now referred to as Web 1.0.

ActiveX

was first developed by Microsoft, but was then turned over to an independent organization, The Open Group. ActiveX is a strategic initiative that incorporates object-oriented programming tools and technologies. ActiveX is Microsoft's response to Java applets

backbones

which used the same protocols as NSFnet and connected to it through gateways. These private networks did not restrict network use, so the Internet became usable for commercial purposes.


Related study sets

208 Final- Chapter 21: Conflict, Workplace Violence && Negotiation

View Set

Word List 'mis' - bad or badly, wrong

View Set

Chapter 33 Assessment of the Cardiovascular System practice questions

View Set

Chapter 2 - Prenatal Development, Pregnancy and Birth

View Set

Practice test MGT 325 ch 1-6,8,9

View Set

PN Adult Medical Surgical Online Practice 2023 A

View Set