Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number: 8207010 Name: ___________________ Period: _____ Unit 1: Your School Standards: 01.04, 02.01, 02.06 (School Website, Yearbook, Newspaper, Personnel Interviews) 1. List major clubs at your school: 2. What is the purpose of FBLA? 3. What services are available at these school offices/faculty members? a. Student Affairs: b. Guidance Counselor: c. Media Specialist: d. Registrar: e. School Resource Officer: f. College & Career Counselor: Unit 2: Your Success Standards: 01.02, 01.03 (Cornell Notes, Internet Research, CRISS Strategies) 1. List and describe proven note-taking techniques: 2. List and describe proven ways to learn a chapter in a textbook: 3. List and describe proven ways to locate information on the Internet: Unit 3: Your Technology Standards: 01.01, 01.07, 02.02, 02.03, 02.07, 02.08, 02.09, 02.10, 02.11, 03.01, 03.02, 03.03 (CIW – Internet Business Associate online materials, e-book, and Industry Certification) CIW-IBA, Lesson 1 _____ 1. Web Development Team _____ 2. Web Maintenance Team _____ 3. Company Network and Computer Team a. PC repair technicians, Server administrators, Network engineers b. Website designer, Web application developer, Web architect, Mobile application developer, Website project manager c. Web site analyst, SEO analyst Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number: 8207010 Name: ___________________ Period: _____ 4. What are some of the ways to look for a job in the Information Technology field? 5. When hunting for a career in the Information Technology field, what are some of the different resume’ formats that should be used? _____6. W3C _____7. Ontology _____8. ROI _____9. Technology Adoption Life Cycle _____10. CEO _____11. OWL _____12. ISO 9000 Standards CIW-IBA, Lesson 2 _____ 1. Crowd-sourcing _____2. Wikis _____3. Web 2.0 _____4. Mashups _____5. SMS _____6. Netiquette _____7. VoIP a. The amount of time it takes a person or a company to accept and use emerging technology b. Group of people that create and encourage Web page standards and guidelines c. Study of how a part of an organization is organized d. Language used to define the organizational structure relationships e. Benefit (or reward) of buying new equipment or software f. Highest-ranking corporate officer in charge of the total management of a company g. Group that develops technical specifications for intellectual, scientific, and technological activities worldwide a. Website that integrates content and scripts from multiple Websites b. Changing trends in the use of WWW technology and Web design, focused on collaboration c. Protocol used for text messaging d. A technology that converts voice into data packets for transmission online e. A task that outsourced to a large group of people in order to analyze a huge amount of data f. Proper ways to write online communication g. Website that can be viewed and modified by anyone Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number: 8207010 CIW-IBA, Lesson 3 _____ 1. WAN _____2. Client _____3. Server _____4. DSL Modems _____5. T/E Lines _____6. Fiber Optic Cables _____7. LAN _____8. HTTP _____9. POP3 _____10. SMTP _____11. .org _____12. .edu _____13. IP Address Name: ___________________ Period: _____ a. Transmission lines that use light rays for communication and have extremely fast bandwidths b. A group of networked computers and printers located in on office or building c. A group of networked computers and technology that are located in various places far away from each other d. Dedicated digital telephone lines that have very fast transmission speeds, available in both the United States and Europe e. A piece of technology that uses services or programs from a server f. Technology generally connected to a home computer that provides dedicated transmission lines using telephone lines g. A large capacity computer that provides storage and services to other computers a. b. c. d. e. f. g. h. Internet protocol used for outgoing emails Internet protocol used for transferring Web pages Domain used for universities and colleges The ability to store and access personal files on the Internet Internet protocol used for uploading and downloading files Domain used for not-for-profit Websites Domain name that is made up of numbers Internet protocol used for incoming email messages _____14. Cloud Computing _____15. FTP CIW-IBA, Lesson 4 _____1. Browsers _____2. Plug-ins _____3. Cookies _____4. Interpreter _____5. Cache _____6. Web server _____7. URL a. Storage on your computer of the Websites you have visited b. A large computer that stores all the files used for a Website c. Applications that are installed to view multimedia on Websites d. Software that translates programming languages on a Website e. Text files that save personal information for identification on a Website f. Software used to view Web pages, such as Internet Explorer, Chrome, Firefox, Opera, and Safari g. The address of a Web page Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number: 8207010 Name: ___________________ Period: _____ CIW-IBA, Lesson 5 _____1. HTML5 _____2. PDF _____3. .jpg _____4. .gif _____5. audio _____6. C++, Java _____7. video a. Image file format for simple, animated images b. Object-oriented programming languages c. A version of Web page coding that does not require plugins, and offers geolocation (GPS) d. File types include .avi, .mov, .mp4, and .ogg e. Image file format for photographs f. Sound files, such as mp3, .au, and .wav g. A document file that can be viewed and accessed on the Internet after the visitor downloads the Adobe Reader viewer CIW-IBA, Lesson 6 _____1. Tables _____2. Relational Databases _____3. Query _____4. Keywords _____5. Boolean Operators _____6. Written Permission _____7. Validate Sources a. Specific word or words that are entered into a search engine in order to locate information b. Where databases are normally stored because they are divided into rows and columns (records and fields) c. Special characters (+ - !) entered into a search engine that include or remove results from the search. d. The legal way to get authorization to use copyrighted material e. A question put into a search engine or database to locate information f. This includes: consider the author, compare information on 2-3 other Websites, look for grammatical errors, look for bias towards a topic g. Multiple amounts of information in databases that are related through common fields CIW-IBA, Lesson 7 _____1. Email address _____2. Reply _____3. Forward _____4. PIM _____5. Email benefits _____6. SPAM _____7. CAPTCHA _____8. Company owned email a. b. c. d. e. Sending an email you received to other people Organization of time and tasks through the use of software Unsolicited email Made up of a username and a domain name Technology that is used to determine that an order or email is coming from an actual person f. Not private, specific rules about use, communication can be saved, cannot use for personal reasons g. Speed, ability to send file attachments, record of communication that was sent or received h. Answering an email Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number: 8207010 Name: ___________________ Period: _____ CIW-IBA, Lesson 8 _____1. Worm _____2. Trojan _____3. Spyware _____4. Patches _____5. Protect Yourself Shopping Online _____6. Encryption _____7. SSL _____8. U.S. Copyright laws _____9. International Copyright _____10. Software Licensing _____11. Trademarks a. Process of converting information into unreadable or scrambled data b. Although entities agree to follow, it does not exist c. Program disguised as a harmless application that actually is very harmful to a computer system d. Protection of personal works as soon as they are written or published e. A file that is inserted into an existing software application designed to repair or fix a known problem f. The agreement on the amount of times it can be used, downloaded, or installed g. A program secretly installed on a user’s computer used to gather information and relay it back to an outside party h. Includes anti-virus, firewalls, look for closed padlock icon on browser, look for SSL, encryption, and digital certificates i. Self-replicating program that consumes system resources j. Protocol used for online shopping that provides encryption and digital certificates k. Company logos, phrases, and mottos that are used to identify the company CIW-IBA, Lesson 9 _____1. Listserve _____2. Peer-to-Peer _____3. IPCONFIG _____4. End User Licensing Agreement _____5. Open-source Licensing _____6. MIME _____7. Derived works a. A collection of information that is collected and distributed to an authorized group of people b. Software that is based upon one or more existing pieces of software c. Technology that is used to identify a file type, associate it with a program, and open it on your computer if you have the program it needs d. Removes restrictions on how many computers can have software installed e. A network in which each computer has both server and client capabilities f. Acceptance of the policies about how many computers can have specific software installed g. Utility used to display your system’s Internet Protocol configuration and address Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number: 8207010 Name: ___________________ Period: _____ CIW-IBA, Lesson 10 _____1. Task _____2. Scope _____3. Scope Creep _____4. Needs Analysis _____5. Statement of Work _____6. SWOT Analysis _____7. GANTT Chart _____8. Project Triangle a. A method of visually showing the project on a timeline, and identified assignments with deadlines b. The goals and assignments of a project c. A strategic planning method that looks at the project team and their strengths, weaknesses, opportunities, and threats d. Gradual increase of time and money needed for a project as a result of additional requirements e. The major factors that influence the success of a project – time, money, and scope f. Acquiring information from a customer about the goals and objectives of a project g. A contract that outlines the project goals and specifies how those goals will be met h. A unit of work that must be accomplished Unit 4: Your Tools Standards: 04.01, 04.03 (Microsoft Word, Microsoft Power Point) _____1. Microsoft Word _____2. Microsoft Power Point _____3. Microsoft Excel _____4. Parts of a Letter a. b. c. d. e. _____5. Parts of a Memo _____6. Parts of a Table _____7. Slide Transition _____8. Slide Animation f. g. h. TO, FROM, DATE, SUBJECT Use to create letters, memos, research papers, and tables Visual change in the slide as it changes to another slide Address, date, complimentary close, greeting, body, addressee Use to create organizational charts, sales records, and payroll sheets Movement of text or graphics as they appear (and/or exit) the slide Use to create visually appealing presentations Columns, cells, rows Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number: 8207010 Name: ___________________ Period: _____ 9. Identify (label) the following parts of a Word document, and indicate how you would include them (what do you click): 4 1 2 5 3 Unit 10: Your Future Standards: 01.05, 01.06, 02.12, 04.02 (www.flvc.org, www.bls.gov/ooh - Online Career Planning) 1. Visit the following online Websites. List information about career planning that you locate at these Websites: a. http://www.flvc.org/flvc/portal b. http://www.bls.gov/ooh
© Copyright 2024 ExpyDoc