CIW Review Lesson 1

Download Report

Transcript CIW Review Lesson 1

Information Technology Careers
 Job Searches
 Required Job Skills

IT Jobs

Web Application Developer
 They design, build and test web pages

Web Architect
 They are responsible for the overview plan
of a web site’s development
 They will often manage the web application
developers
IT Jobs Continued

Web Site Analyst
 Will analyze a web sites effectiveness from
both viewpoints: organization and end user
 May conduct user surveys to get feedback
about web site features

Server Administrator
 responsible for designing, implementing,
managing and maintaining network servers
IT Jobs Continued

Network Engineer
 are responsible for configuring and testing
network devices, and setting up and
maintaining the network infrastructure

SEO Analyst
 responsible for performing keyword research
to determine the visibility of Web sites
across multiple clients and search engines
Conducting a Job Search

Successful Job Searches Include:
 Networking
 Search the internet for job openings
 Create a Resume

Communication is the most important
skill for those in IT careers
Ontology
The study of how a part of a company is
organized
 The purpose – it is the first step that
programmers and designers of complex
IT systems do

 Ontology allows them to accurately map
technology solutions to business needs
Lesson 2
Internet Communication
Web 2.0

Refers to the changing trend of how the
internet is used.
 There is social networking, collaboration,
web browsers for sophisticated applications

Examples of Web 2.0 Technologies





Wikipedia
YouTube
Google+
Facebook
Blogs
Types of Messaging

Instant Messaging
 Benefit: Over the internet, delivered and
received right away
 Challenge: Not a secure method of
communication

Text Messaging (SMS)
 Benefit: Short, informal communication
 Lack of etiquette
Communicating over the Internet
Netiquette – is to encourage common
sense and politeness and establishes
general rules for Internet etiquette
 Examples:

 Check your spelling and grammar
 DON’T USE ALL CAPS
 Respond immediately (within 24 hours)
 Be careful with emoticons
Convergence
Convergence technology is the integration
of voice and data networks to create a
unified means of exchanging and storing
electronic information
Examples:
 Call centers
 Mobile Computing
 Voice to Text
Introduction to Internet Technology
How the Internet Works

1.
2.
3.
4.
5.
Most client computers are connected to the Internet
through gateways, which connect their LANs to the Internet
backbone. Thus, computers access information from the
Internet in the following sequence:
You request data through your LAN from a server
connected to the Internet.
The request is divided into packets of data.
The packets are routed through your LAN, and potentially
through other networks, to the Internet backbone.
The packets are routed from the Internet backbone
through one or more networks until they reach the
destination server containing the requested information.
The destination server sends information in response to
your request using the same process, although possibly
following a different route.
Connecting to the Internet
Six elements are required to connect to the Internet:
 Computer l PC, smartphone, smart TV, tablet, etc.
 Operating system l Windows, Linux/UNIX, Apple OS X,
etc.
 TCP/IP l protocol software used to communicate with the
Internet
 Client software l Web browser, mobile app, e-mail, etc.
 Internet connection l direct connection to an Internet
Service Provider (ISP)
 Internet address l Web address (e.g.,
www.CIWcertified.com), e-mail address (e.g.,
[email protected]), server address (e.g.,
ss1.ciwcertified.com), etc.
Internet Protocols

IPv4
 Example: 72.44.27.243

IPv6
 Example:
 2E22:4F00:000E:00D0:A267:97FF:FE6B:FE34
Domain Name System (DNS)
Example:
DNS changes IP addresses to
recognizable text-based names
72.44.192.233 = www.CIWcertified.com
Domain Name Server

Domain Name Server changes
text-based addresses to IP addresses
www.CIWcertified.com = 72.44.192.233
Web Browsing
Basic Functions of Web Browsers





Providing a way for users to access and
navigate Web pages.
Displaying Web pages properly.
Providing technology to enable multimedia
features.
Providing access to Internet services other
than Web pages (such as FTP and e-mail).
Performing authentication and encryption
for the secure exchange of information.
URL and URI

Uniform Resource Locator (URL)
 Example:
 A text string that specifies an Internet address
and the method by which the address can be
accessed

Uniform Resource Identifier (URI)
 A URI is a text string that can refer to
documents, resources or people.
How Browsers Work








You enter the URL www.CIWcertified.com
Your browser divides the URL into three parts: the protocol
(http), the server and domain name
(www.CIWcertified.com), and the name of the file you want
to view.
Your browser communicates with a domain name server to
translate the server name into an IP address (in this case,
72.44.192.233).
Your browser uses the IP address to form a connection with
the CIW Web server.
Your browser uses HTTP to request the default page from
the server.
Some level of authentication takes place.
The server sends the requested Web page (coded in HTML)
to your browser.
Your browser reads and interprets the HTML, and displays
the Web page.
Browser Elements
Rendering Engine
 Interpreter
 Sandbox
 Thread
 Window
 Tab
 Cache
 Plug-in

Troubleshooting
Poor rendering
 Slow connection
 No connection
 Slow browser
 Disk space usage

Multimedia on the Web
Plug-ins

A program installed in the browser to
extend the basic functions.
 Allows different file formats to be viewed as
part of a standard HTML document

Examples
 Adobe Flash Player
 Microsoft Silverlight
 Apple QuickTime
 Windows Media Player
Installing a Plug-in

Online – when the browser is open

Offline – how must plug-in installations
work
 Requires the user to download the plug-in
file, quit the browser, start the installation file
File Formats

Video
 .avi, .mov, .mp4

Audio
 .mp3, .wav

Graphic
 .png, .gif, .jpg or .jpeg

Document
 .txt, .pdf, .doc or .docx
Saving Web Site Content
You can save entire web pages or
elements of a web page
 Different save options depending on the
elements you want to save

 For example, you would use different
commands to save the entire web page than
you would to save a graphic from a web
page
Databases and Web Search Engines
Boolean Operators

Commands that let you narrow your
internet search results by requiring or
excluding keywords from the search criteria
Search Engine

A program that searches the internet for
use-specified information

Examples:
 Google
 Bing
 Web Crawler
Information Portal

Example: Yahoo

Sites must be manually submitted.
There are not as many results as a
search engine, but they will be more
relevant to what you are searching for
How to Evaluate Resources
Understand if it is fact or opinion
 Identify bias
 Consider your sources
 Identify the contributor
 Compare information you obtain
 Consult with trusted individuals

Different Types of Resources

Reviewed and non-reviewed
 Authoritative peer-reviewed
 Open peer-reviewed
 Individual

Primary and secondary
 Primary
 Secondary
 Indexes
Business E-Mail
How E-Mail Works

For messages to be sent from one
computer to another, the computers
must be linked, or networked. You may
have a physical connection (such as a
cable) between the two computer
stations, or the computers may each
connect to a local server that relays the
messages, or the computers may use
the Internet to relay messages.
E-Mail Protocols

Outgoing:
 Simple Mail Transfer Protocol (SMTP)

Incoming:
 Post Office Protocol Version 3 (POP3)
 Internet Message Access Protocol (IMAP)
E-Mails and E-Mail Message
Components
username@domain
 E-mail message components:

Response Commands
Profession Communication

Responsiveness
 When possible, respond right away

Tone
 There is no body language or voice to go off of, so
be as clear as possible – no sarcasm

Clarity
 Ideas should be communicated clearly and
concisely to keep messages fairly short

Readability
 Bulleted list, avoid fancy font, skip lines between
paragraphs, ect.
Protecting Yourself Online
Malware
Malicious Software – programs or files designed
to harm computer systems
 Viruses - a program that assumes control of
system operations, and damages or destroys
data
 Worm - self-replicating program or algorithm
that consumes system and network resources
 The difference between a worm and a virus is
that a worm automatically spreads from one
computer to another, whereas a virus requires
some form of action from an end user

Malware Continued

Trojan - a program that appears to be
harmless but actually produces harmful
results

Illicit Server - an application that installs
hidden services on systems
Virus Detection

Anti-virus software - scans e-mail
attachments and files for known viruses, and
eliminate any it finds

Do not open any unknown or unexpected
email attachments

Most viruses can be removed without
permanent damage to your system, and most
viruses can be halted even after they
commence an attack.
Spyware
(or adware) is a software application that is
secretly placed on a user's system to gather
information and relay it to outside parties,
usually for advertising purposes
 You can detect the presence of spyware by
obtaining a spyware detection application.
Such applications work much like anti-virus
applications in that they scan a computer's
hard drive, memory and network connections,
and look for suspicious activity

Firewalls
A security barrier that prevents unauthorized
access to or from private networks.
Businesses use this combination of hardware,
software and corporate policies to prevent
Internet users outside the business from
accessing proprietary data on the business's
networks that are connected to the Internet, as
well as private intranets.
 Firewalls are also used to control employee
access to Internet resources.

Security Related Issues

Copyright Issues
 copyright laws protect original works of authorship
that are fixed in a tangible medium of expression

Licensing Issues
 If you want to license someone else's copyright-
protected material, you must contact the copyright
owner and ask for permission

Trademark Issues
 A trademark is any word, slogan, symbol, name,
package design or device (or any combination
thereof) that marks and distinguishes a product
Lesson 9

Internet Services and Tools
File Transfer Protocol (FTP)
File Transfer Protocol (FTP) is a TCP/IP
suite protocol that allows the transfer of
files between two computers, or one
server and one computer.
 FTP is a convenient way to transfer files
and can be a good alternative to
sending an e-mail attachment

Peer-To-Peer Networks

Each computer has both client and
server capabilities

It allows a group of users to connect
with each other and directly share files
among their hard drives
End User License Agreement

(EULA) - a legal contract between the
software's author and the end user who
uses the software

A typical EULA usually copyrights the
code so that it belongs to the author. A
EULA specifies exactly how you may
use the software.
Virtual Network Computing
(VNC) - a program that allows you to
control a computer at a remote location
as if you were sitting in front of it
 Help desk personnel might use VNC to
troubleshoot computer problems for
remote employees, or to install software
on remote systems.

Open Source Software

A peer-based development process
describing organizations and products
that provide free source code to the
development community at large with
the goal of developing better products;
includes Mozilla Firefox