Emerging Technology in Business (CIW) Name: Course Review (1

Emerging Technology in Business (CIW)
Course Review (1 semester class)
Course Number: 8207010
Name: ___________________
Period: _____
Unit 1: Your School
Standards: 01.04, 02.01, 02.06 (School Website, Yearbook, Newspaper, Personnel Interviews)
1. List major clubs at your school:
2. What is the purpose of FBLA?
3. What services are available at these school offices/faculty members?
a. Student Affairs:
b. Guidance Counselor:
c. Media Specialist:
d. Registrar:
e. School Resource Officer:
f. College & Career Counselor:
Unit 2: Your Success
Standards: 01.02, 01.03 (Cornell Notes, Internet Research, CRISS Strategies)
1. List and describe proven note-taking techniques:
2. List and describe proven ways to learn a chapter in a textbook:
3. List and describe proven ways to locate information on the Internet:
Unit 3: Your Technology
Standards: 01.01, 01.07, 02.02, 02.03, 02.07, 02.08, 02.09, 02.10, 02.11, 03.01, 03.02, 03.03 (CIW –
Internet Business Associate online materials, e-book, and Industry Certification)
CIW-IBA, Lesson 1
_____ 1. Web Development Team
_____ 2. Web Maintenance Team
_____ 3. Company Network and Computer Team
a. PC repair technicians, Server
administrators, Network engineers
b. Website designer, Web application
developer, Web architect, Mobile
application developer, Website project
manager
c. Web site analyst, SEO analyst
Emerging Technology in Business (CIW)
Course Review (1 semester class)
Course Number: 8207010
Name: ___________________
Period: _____
4. What are some of the ways to look for a job in the Information Technology field?
5. When hunting for a career in the Information Technology field, what are some of the different
resume’ formats that should be used?
_____6. W3C
_____7. Ontology
_____8. ROI
_____9. Technology Adoption Life
Cycle
_____10. CEO
_____11. OWL
_____12. ISO 9000 Standards
CIW-IBA, Lesson 2
_____ 1. Crowd-sourcing
_____2. Wikis
_____3. Web 2.0
_____4. Mashups
_____5. SMS
_____6. Netiquette
_____7. VoIP
a. The amount of time it takes a person or a company to
accept and use emerging technology
b. Group of people that create and encourage Web page
standards and guidelines
c. Study of how a part of an organization is organized
d. Language used to define the organizational structure
relationships
e. Benefit (or reward) of buying new equipment or
software
f. Highest-ranking corporate officer in charge of the
total management of a company
g. Group that develops technical specifications for
intellectual, scientific, and technological activities
worldwide
a. Website that integrates content and scripts from
multiple Websites
b. Changing trends in the use of WWW technology and
Web design, focused on collaboration
c. Protocol used for text messaging
d. A technology that converts voice into data packets for
transmission online
e. A task that outsourced to a large group of people in
order to analyze a huge amount of data
f. Proper ways to write online communication
g. Website that can be viewed and modified by anyone
Emerging Technology in Business (CIW)
Course Review (1 semester class)
Course Number: 8207010
CIW-IBA, Lesson 3
_____ 1. WAN
_____2. Client
_____3. Server
_____4. DSL Modems
_____5. T/E Lines
_____6. Fiber Optic Cables
_____7. LAN
_____8. HTTP
_____9. POP3
_____10. SMTP
_____11. .org
_____12. .edu
_____13. IP Address
Name: ___________________
Period: _____
a. Transmission lines that use light rays for communication
and have extremely fast bandwidths
b. A group of networked computers and printers located in on
office or building
c. A group of networked computers and technology that are
located in various places far away from each other
d. Dedicated digital telephone lines that have very fast
transmission speeds, available in both the United States and
Europe
e. A piece of technology that uses services or programs from a
server
f. Technology generally connected to a home computer that
provides dedicated transmission lines using telephone lines
g. A large capacity computer that provides storage and
services to other computers
a.
b.
c.
d.
e.
f.
g.
h.
Internet protocol used for outgoing emails
Internet protocol used for transferring Web pages
Domain used for universities and colleges
The ability to store and access personal files on the Internet
Internet protocol used for uploading and downloading files
Domain used for not-for-profit Websites
Domain name that is made up of numbers
Internet protocol used for incoming email messages
_____14. Cloud Computing
_____15. FTP
CIW-IBA, Lesson 4
_____1. Browsers
_____2. Plug-ins
_____3. Cookies
_____4. Interpreter
_____5. Cache
_____6. Web server
_____7. URL
a. Storage on your computer of the Websites you have visited
b. A large computer that stores all the files used for a Website
c. Applications that are installed to view multimedia on
Websites
d. Software that translates programming languages on a
Website
e. Text files that save personal information for identification
on a Website
f. Software used to view Web pages, such as Internet
Explorer, Chrome, Firefox, Opera, and Safari
g. The address of a Web page
Emerging Technology in Business (CIW)
Course Review (1 semester class)
Course Number: 8207010
Name: ___________________
Period: _____
CIW-IBA, Lesson 5
_____1. HTML5
_____2. PDF
_____3. .jpg
_____4. .gif
_____5. audio
_____6. C++, Java
_____7. video
a. Image file format for simple, animated images
b. Object-oriented programming languages
c. A version of Web page coding that does not require plugins, and offers geolocation (GPS)
d. File types include .avi, .mov, .mp4, and .ogg
e. Image file format for photographs
f. Sound files, such as mp3, .au, and .wav
g. A document file that can be viewed and accessed on the
Internet after the visitor downloads the Adobe Reader
viewer
CIW-IBA, Lesson 6
_____1. Tables
_____2. Relational Databases
_____3. Query
_____4. Keywords
_____5. Boolean Operators
_____6. Written Permission
_____7. Validate Sources
a. Specific word or words that are entered into a search engine
in order to locate information
b. Where databases are normally stored because they are
divided into rows and columns (records and fields)
c. Special characters (+ - !) entered into a search engine that
include or remove results from the search.
d. The legal way to get authorization to use copyrighted
material
e. A question put into a search engine or database to locate
information
f. This includes: consider the author, compare information on
2-3 other Websites, look for grammatical errors, look for
bias towards a topic
g. Multiple amounts of information in databases that are
related through common fields
CIW-IBA, Lesson 7
_____1. Email address
_____2. Reply
_____3. Forward
_____4. PIM
_____5. Email benefits
_____6. SPAM
_____7. CAPTCHA
_____8. Company owned email
a.
b.
c.
d.
e.
Sending an email you received to other people
Organization of time and tasks through the use of software
Unsolicited email
Made up of a username and a domain name
Technology that is used to determine that an order or email
is coming from an actual person
f. Not private, specific rules about use, communication can be
saved, cannot use for personal reasons
g. Speed, ability to send file attachments, record of
communication that was sent or received
h. Answering an email
Emerging Technology in Business (CIW)
Course Review (1 semester class)
Course Number: 8207010
Name: ___________________
Period: _____
CIW-IBA, Lesson 8
_____1. Worm
_____2. Trojan
_____3. Spyware
_____4. Patches
_____5. Protect Yourself Shopping Online
_____6. Encryption
_____7. SSL
_____8. U.S. Copyright laws
_____9. International Copyright
_____10. Software Licensing
_____11. Trademarks
a. Process of converting information into unreadable or scrambled data
b. Although entities agree to follow, it does not exist
c. Program disguised as a harmless application that
actually is very harmful to a computer system
d. Protection of personal works as soon as they are
written or published
e. A file that is inserted into an existing software
application designed to repair or fix a known
problem
f. The agreement on the amount of times it can be
used, downloaded, or installed
g. A program secretly installed on a user’s computer
used to gather information and relay it back to an
outside party
h. Includes anti-virus, firewalls, look for closed
padlock icon on browser, look for SSL,
encryption, and digital certificates
i. Self-replicating program that consumes system
resources
j. Protocol used for online shopping that provides
encryption and digital certificates
k. Company logos, phrases, and mottos that are used
to identify the company
CIW-IBA, Lesson 9
_____1. Listserve
_____2. Peer-to-Peer
_____3. IPCONFIG
_____4. End User Licensing Agreement
_____5. Open-source Licensing
_____6. MIME
_____7. Derived works
a. A collection of information that is collected and
distributed to an authorized group of people
b. Software that is based upon one or more existing
pieces of software
c. Technology that is used to identify a file type,
associate it with a program, and open it on your
computer if you have the program it needs
d. Removes restrictions on how many computers can
have software installed
e. A network in which each computer has both
server and client capabilities
f. Acceptance of the policies about how many
computers can have specific software installed
g. Utility used to display your system’s Internet
Protocol configuration and address
Emerging Technology in Business (CIW)
Course Review (1 semester class)
Course Number: 8207010
Name: ___________________
Period: _____
CIW-IBA, Lesson 10
_____1. Task
_____2. Scope
_____3. Scope Creep
_____4. Needs Analysis
_____5. Statement of Work
_____6. SWOT Analysis
_____7. GANTT Chart
_____8. Project Triangle
a. A method of visually showing the project on a timeline,
and identified assignments with deadlines
b. The goals and assignments of a project
c. A strategic planning method that looks at the project
team and their strengths, weaknesses, opportunities, and
threats
d. Gradual increase of time and money needed for a project
as a result of additional requirements
e. The major factors that influence the success of a project –
time, money, and scope
f. Acquiring information from a customer about the goals
and objectives of a project
g. A contract that outlines the project goals and specifies
how those goals will be met
h. A unit of work that must be accomplished
Unit 4: Your Tools
Standards: 04.01, 04.03 (Microsoft Word, Microsoft Power Point)
_____1. Microsoft Word
_____2. Microsoft Power Point
_____3. Microsoft Excel
_____4. Parts of a Letter
a.
b.
c.
d.
e.
_____5. Parts of a Memo
_____6. Parts of a Table
_____7. Slide Transition
_____8. Slide Animation
f.
g.
h.
TO, FROM, DATE, SUBJECT
Use to create letters, memos, research papers, and tables
Visual change in the slide as it changes to another slide
Address, date, complimentary close, greeting, body,
addressee
Use to create organizational charts, sales records, and
payroll sheets
Movement of text or graphics as they appear (and/or exit)
the slide
Use to create visually appealing presentations
Columns, cells, rows
Emerging Technology in Business (CIW)
Course Review (1 semester class)
Course Number: 8207010
Name: ___________________
Period: _____
9. Identify (label) the following parts of a Word document, and indicate how you would include them
(what do you click):
4
1
2
5
3
Unit 10: Your Future
Standards: 01.05, 01.06, 02.12, 04.02 (www.flvc.org, www.bls.gov/ooh - Online Career Planning)
1. Visit the following online Websites. List information about career planning that you locate at
these Websites:
a. http://www.flvc.org/flvc/portal
b. http://www.bls.gov/ooh