ISTM 210 Exam 2

Ace your homework & exams now with Quizwiz!

Aspects of a Good Website

-Content -Interactivity -Design

The four elements of a PivotTable are:

-Report Filter -Column Labels -Row Labels -Values.

Considerations When Choosing a Browser

-Security -Popup Blockers -Usability

Guest Speaker's name -name? -where he worked?

-Steve Williamson -shell

HTML (Hypertext Markup Language)

-invented by Tim Berners-Lee at CERN -facilitates the capability to move information through the Internet

IP adress

-unique, like a telephone number, assigned to all computers that communicate on the internet -32 bit number

Boolean logic is based on only two values: what are they? what do they represent?

0-false 1-true

function wizard

1. allows you to enter or select the inputs for the function 2. provides a description of the function and each argument 3. lists the function result based on the inputs you enter

Bookmarks

A browser will catalog frequently visited websites so the user doesn't have to remember the page URL

server or host

A computer that stores webpages on a network

peripheral device

A printer or scanner connected to a network is called what?

Dynamic website

A website that generates a web page directly from the server depending on the context of the user. Like Facebook.com.

Static website

A website that rarely, if ever, changes its contents and displays information the same way to all users.

network ready

Already comes with a NIC - most computers that are purchased today

HLOOKUP

An Excel function that looks up values that are displayed horizontally in a row.

Collaboration

Collaboration

physical cable system

Connects networks together

Back Up

Every computer system needs to be backed up on a regular basis to ensure that no computer files are lost

node

Every device connected to a network

Web Hosting

ISPs "rent" or host space to website owners and offer domain name registration so that they can be found on the Internet by clients, or users.

Internet

One peripheral benefit of a network is that a single Internet line can be wired to a server so that all of the clients can subsequently connect

web developers, or webmasters

People that produce websites

brick and morter

Selling using a physical building location

Ethernet card

The most common NIC

The top WDPs are?

Web.com and Wix.com

E-mail

a "store and forward" system of composing, sending, storing, and receiving messages over electronic communication systems like the Internet.

Internet service provider (ISP)

a business or organization that provides people with a way to access the Internet and World Wide Web.

network Hub

a central location of the computer network that serves as a traffic cop for network connection and communication

hyperlink

a clickable navigation element

website

a collection of web pages on a server that exists on the Web that can be requested by a client and displayed with a browser.

Email / Instant Messaging

a company employee must understand that an organization's email and instant messaging systems are to be used for business only and not for personal use

Metropolitan Area Network ( MAN)

a computer network that connects two or more LANs or CANs together but within the boundaries of a town or city.

Campus Area Network (CAN)

a computer network that connects two or more LANs that are located on a campus, like a university, or an organization's national headquarters, or even an industrial complex.

Local Area Network or LAN

a computer network that is relatively small, typically in a single building, but sometimes as small as a single room.

web server

a dedicated computer connected to the Internet that accepts Hypertext Transfer Protocol (HTTP) requests from Internet users ( clients) and fulfills the request by sending ( serving) HTML documents, or web pages via HTTP.

Online advertising

a form of sponsorship that uses the World Wide Web for delivering business-marketing messages to catch the attention of its customers.

intranet

a private version of the Internet that works the same way, but it is confined within an organization.

JavaScript

a programming language that is considered a client-side language in reference to websites.

password

a secret word or combination of keyboard characters typed in by a user to authenticate one's identity for joining a computer network.

thick client

a server on a network stores data files and serves them up to its clients, the clients would be required to have Microsoft Access or some other type of database application program (fat client) installed to read and work with the data

twisted pair

a specialized wire that cancels out electromagnetic interference from other electronic devices and increases reliability.

protocol

a standard language

Native Advertising

a type of online advertising that attempts to dupe a user into believing they are clicking on a legitimate news story when in fact they are clicking on an advertisement.

MAC (media access control) address

a unique 48-bit address called

search engine

a website that lets a user type in specific keywords or phrases and then returns a list of hits (hyperlinks) that best match the search criteria.

<meta ></meta> tags

additional pieces of information about the web page's author, web page description, and keywords, to help search engines find the web page

clients

all employees on the network

"Freeze Panes"

allows you to "Lock" rows and columns so that they don't disappear when you navigate through the data table.

"Fill" feature

allows you to automatically populate cells in a worksheet

workbook

an Excel file that stores all the information, previous calculations, and analyses that you may have already completed.

phishing

an email that looks like it is from a legitimate bank when, in reality, it is a ruse that attempts to fool users into voluntarily typing their social security numbers, bank passwords, and pin numbers.

blog

an online diary, originally called a "web log" and shortened to "blog

browser

application software that provides an interface that allows a user to display and interact with text, images, and other information located on the World Wide Web

Wide Area Networks ( WAN)

are computer networks that encompass a wide geographical area and connect LANs, CANs, and MANs together.

Peer-to-Peer Networks

are computer networks that generally connect computers directly to one another without the use of a server.

Sometimes static websites are referred to as?

brochure websites

show rooming

browse in store before purchasing online

web rooming

browse websites and purchase in store

virtual storefronts

businesses that have no retail outlets or even specific locations

AVERAGEIF function

calculate the average for a set of values that match a specific criterion.

COUNT function

calculate the number of cells in a specified set of cells that contain a number.

SUMIF function

calculate the total for a set of values that match a specific criterion.

EFFECT

calculates the annual percentage rate for an interest rate given the number of times per year that interest is charged.

RATE

calculates the interest rate earned for an investment given the number of payments made as part of the investment, the payment amount, and the current value of the investment.

NPER

calculates the number of payments that will be made to pay off a loan given the interest rate, payment amount, and original loan amount.

thin client

client computer or client software like a web browser in client/server network that depends on the server for computer processing that in turn serves up the information to the client.

JavaScript

client-side (user) programs that allow the browser to run small applications, like clocks and calendars that sometimes show up on a web page

CONCATENATE (text1,[text2],...)

combines blocks of text

line chart

compare the values of a particular category over time.

e-mail address

consists of user's name, a domain code, and a domain name, not unlike a URL.

worksheet

contains the actual data and calculations and is organized into a collection of cells arranged in the form of a table.

CAN-SPAM Act

controlling the assault of non-solicited porn and marketing act of 2003

PROPER (text)

converts a block of text to title-case (the first letter of each new word is capitalized)

Link elements

create elements that can become hyperlinks that allow web page users to navigate to different parts of a web site, or different parts of the World Wide Web

control Q

data analysis pops up

Cache

data that was duplicated from data on another computer, in this case, a web page.

<style ></style> tags

define an overall style for a webpage by describing fonts, colors, and other design elements.

<title ></title> tags

define the web page's title

Structural (Block) Elements

designed to tell a browser how to display and align elements like lists, headings and paragraphs.

COUNTIF function

determine the number of cells within a range of cells that contain a specific value.

Corporate Website

distribute information about a business to provide background information about their goods and services for public consumption

Electronic Commerce

distribution, buying, selling, advertising, and marketing of goods or services over the Web

Consumer-to-consumer (C2C)

e-commerce between individuals and is typically facilitated by a third party.

ring topology

each computer (node) is connected to two other computers in the network with the first and last computers being connected to each other.

Internet-enabled sensors

embedded in all sorts of devices and environments are growing at an alarming rate and have raised some legitimate concerns

upstream

find oil

Social network advertising

focused on social network websites like facebook.com

spreadsheet model

generally used to represent the logic of a more complicated logical process.

Network protocols are governed by

hardware, software, or an arrangement of both.

Broadband Internet access

high data-transmission rate Internet connection

Adobe Flash

integrate video on a browser, add animations, promote interactivity, and develop rich Internet applications.

carbon copy (CC)

lets all of the recipients know who else has received the same email.

worm

like a virus in that it spreads quickly and is extremely harmful but it does not need to attach itself to an existing program.

Metasearch engines

look and work like keyword searches but return the results of many search engines at once and eliminate duplicates hits.

ARPANET

made networks at UCLA that connected them and would eventually be come to known as the internet

virus

malicious computer program that can copy itself and infect a computer, typically without the user being aware of it.

star topology

named for the star-shape created by nodes that radiate around a central node in a spoke-like fashion

Web Browsing

network security policies should outline the user's access to the web as well as their web-browsing habits.

pure-play

no physical store

Banner ads

online ads with JPEGs or GIFs embedded into them that attract traffic to a website by linking to the website of the advertiser.

keyword search engines

only require the user to type in the keyword or phrase

Web Development Platforms (WDP)

places on the Web that would let you make a fully functioning, super-professional website with no special software and a minimum amount of expertise and money

Network Interface Controller ( NIC)

plugged into a slot on the motherboard inside of the computer and allows a network cable to be plugged in so it can interface or communicate with other computers

"Excel Help" area

provides access to Microsoft's extensive online help materials, information about how to get started with Excel, as well as information about the version of Excel you are using

Business-to-business (B2B)

refers to businesses distributing, buying, selling, advertising, and marketing goods or services over the Web to other businesses.

Topology

refers to the mapping of a physical network and logical interconnections between nodes

downstream

remove oil

SUBSTITUTE (text,old_text,new_text,[instance_num])

replaces specified characters, words, or phrases within a block of text with new characters, words, or phrases

network administrator

responsible for smooth network operations, network performance and implementation of new nodes, or even new networks.

Permissions

restrict or grant access to specific files and folders on a computer network to a user or group of users

MID(text,start_num,num_chars)

returns a specified number of character from the middle of a block of text

LEFT (text,[num_chars])

returns a specified number of characters starting from the beginning of a block of text

RIGHT(text,[num_chars])

returns a specified number of characters starting from the end of a block of text

TODAY ()

returns the current date

NOW ()

returns the current time

WEEKDAY (serial_number, [return_type])

returns the day of the week for a date

DAY (serial_number)

returns the day portion of a date (a number between 1 and 31)

HOUR function

returns the hour portion of a time as a number from 0 to 23

LEN (text)

returns the length, in number of characters, of a block of text

MINUTE function

returns the minute portion of a time as a number from 0 to 59

MONTH (serial_number)

returns the month portion of a date (a number between 1 and 12)

COUNTA function

returns the number of cells in a set of cells that are not blank.

SEARCH (find_text,within_text, [start_num])

returns the position of a specific character, word, or phrase within a block of text

SECOND function

returns the second portion of a time as a number from 0 to 59

WEEKNUM (serial_number, [return_type])

returns the week of the year for a date

YEAR (serial_number)

returns the year portion of a date (a number between 1900 and 9999)

Internet hosting services

run Internet servers to serve content, like webpages, to the Internet, or clients.

User Datagram Protocol (UDP)

send the entire file at once in a streaming fashion, it is much faster than TCP/IP. However, UDP does not guarantee a file's reliability.

Popups

separate browser windows that are programmed by website designers to open extra browser windows without user interaction

packets

smaller, more manageable pieces

Malware

software designed to damage a computer's system without the owner's knowledge.

network operating system ( NOS)

software that controls an entire network

Spyware

software that installs itself on a user's system without permission and gleans personal data and information about the user without their knowledge or permission.

Adware

software that routinely displays advertising to a computer system after the software is installed, usually without the user's consent.

firewall

specialized hardware and software that ensures that only authorized personnel can access and use an organization's intranet

Cells

store individual pieces of data or calculations

Cookies

text files that are used for tracking and maintaining specific information about users, such as site preferences and the contents of their electronic shopping carts.

Search Engine Results Pages or SERPs

the listing of hits, or web page hyperlinks, returned by a search engine in response to a keyword query

Hypertext Markup Language

the principal programming language resolved and rendered by browsers to display Web pages.

Voice over Internet Protocol (VoIP)

the routing of voice conversations, or typically, phone calls over the Internet.

Internet

the world's largest network and connects thousands of other networks together including LANs, CANs, MANs, and WANs

ping

to see if there is good connection

tracert

trace the route, where is this thing going to go?

computer network

two or more computers connected together to communicate and share resources.

Head Elements

typically define a web document's title, style, and additional information about the document's author, page description, and keywords to help search engines find the web page.

Content Website

typically dispense original content and are often supported by advertising.

Image Elements

use special tags to help the browser window display pictures, photographs, and images typically using the GIF or JPEG file formats

Presentational Elements

used in the body of a webpage and allow the HTML to create presentational effects like italics or bold for emphasis.

Format Painter

used to apply the format from one cell to another

Stacked column charts

used to compare categories of items or the same category over time; breaks the column bars into segments that represent subcategories that are consistent across the columns

Column charts

used to compare different categories of items or the same category over time

PivotTables

used to organize and summarize large amounts of data. PivotTables also allow us to change how we summarize data to look at it in different ways

Goal Seek

used to work backwards from an outcome calculation to determine an input condition necessary to arrive at the desired outcome.

VLOOKUP

used when there are more than two columns in the array (lookup table).

scenario manager

useful for examining the impact of several inputs to a spreadsheet model changing at the same time.

Trojan horse

usually a harmless or interesting looking program that, when executed, unleashes harmful viruses into a user's system.

Intranet websites

websites within a company that are used to support its employees and guarded by firewalls to authenticate its users

Business-to-consumer (B2C)

when commercial organizations sell to consumers over the Web. Examples include REI.com, overstock.com, and buy.com.

Connectivity

when one computer can connect to one or many other computers and share information and resources.

Caching

when the browser stores copies of previously viewed web pages that the user has already accessed that allows it to find them quickly without having to make another request to the originating server.

Browser hijacking

when the browser's settings are modified by Malware

bus topology or linear bus

where each of a network's nodes is connected to a common linear backbone that has two endpoints.

blind carbon copy (BCC)

works like the carbon copy except none of the recipients know who else received the same email, or whether anyone other than them received it at all


Related study sets

1.5.6 Linux Basics Practice Questions, 1.4.7 Practice Questions Windows Basics

View Set

ENGR 1182 Midterm I_ someone else as well

View Set

Chapter 18: Multinational Financial Management

View Set