CIW Review Lesson 1
Download
Report
Transcript CIW Review Lesson 1
Information Technology Careers
Job Searches
Required Job Skills
IT Jobs
Web Application Developer
They design, build and test web pages
Web Architect
They are responsible for the overview plan
of a web site’s development
They will often manage the web application
developers
IT Jobs Continued
Web Site Analyst
Will analyze a web sites effectiveness from
both viewpoints: organization and end user
May conduct user surveys to get feedback
about web site features
Server Administrator
responsible for designing, implementing,
managing and maintaining network servers
IT Jobs Continued
Network Engineer
are responsible for configuring and testing
network devices, and setting up and
maintaining the network infrastructure
SEO Analyst
responsible for performing keyword research
to determine the visibility of Web sites
across multiple clients and search engines
Conducting a Job Search
Successful Job Searches Include:
Networking
Search the internet for job openings
Create a Resume
Communication is the most important
skill for those in IT careers
Ontology
The study of how a part of a company is
organized
The purpose – it is the first step that
programmers and designers of complex
IT systems do
Ontology allows them to accurately map
technology solutions to business needs
Lesson 2
Internet Communication
Web 2.0
Refers to the changing trend of how the
internet is used.
There is social networking, collaboration,
web browsers for sophisticated applications
Examples of Web 2.0 Technologies
Wikipedia
YouTube
Google+
Facebook
Blogs
Types of Messaging
Instant Messaging
Benefit: Over the internet, delivered and
received right away
Challenge: Not a secure method of
communication
Text Messaging (SMS)
Benefit: Short, informal communication
Lack of etiquette
Communicating over the Internet
Netiquette – is to encourage common
sense and politeness and establishes
general rules for Internet etiquette
Examples:
Check your spelling and grammar
DON’T USE ALL CAPS
Respond immediately (within 24 hours)
Be careful with emoticons
Convergence
Convergence technology is the integration
of voice and data networks to create a
unified means of exchanging and storing
electronic information
Examples:
Call centers
Mobile Computing
Voice to Text
Introduction to Internet Technology
How the Internet Works
1.
2.
3.
4.
5.
Most client computers are connected to the Internet
through gateways, which connect their LANs to the Internet
backbone. Thus, computers access information from the
Internet in the following sequence:
You request data through your LAN from a server
connected to the Internet.
The request is divided into packets of data.
The packets are routed through your LAN, and potentially
through other networks, to the Internet backbone.
The packets are routed from the Internet backbone
through one or more networks until they reach the
destination server containing the requested information.
The destination server sends information in response to
your request using the same process, although possibly
following a different route.
Connecting to the Internet
Six elements are required to connect to the Internet:
Computer l PC, smartphone, smart TV, tablet, etc.
Operating system l Windows, Linux/UNIX, Apple OS X,
etc.
TCP/IP l protocol software used to communicate with the
Internet
Client software l Web browser, mobile app, e-mail, etc.
Internet connection l direct connection to an Internet
Service Provider (ISP)
Internet address l Web address (e.g.,
www.CIWcertified.com), e-mail address (e.g.,
[email protected]), server address (e.g.,
ss1.ciwcertified.com), etc.
Internet Protocols
IPv4
Example: 72.44.27.243
IPv6
Example:
2E22:4F00:000E:00D0:A267:97FF:FE6B:FE34
Domain Name System (DNS)
Example:
DNS changes IP addresses to
recognizable text-based names
72.44.192.233 = www.CIWcertified.com
Domain Name Server
Domain Name Server changes
text-based addresses to IP addresses
www.CIWcertified.com = 72.44.192.233
Web Browsing
Basic Functions of Web Browsers
Providing a way for users to access and
navigate Web pages.
Displaying Web pages properly.
Providing technology to enable multimedia
features.
Providing access to Internet services other
than Web pages (such as FTP and e-mail).
Performing authentication and encryption
for the secure exchange of information.
URL and URI
Uniform Resource Locator (URL)
Example:
A text string that specifies an Internet address
and the method by which the address can be
accessed
Uniform Resource Identifier (URI)
A URI is a text string that can refer to
documents, resources or people.
How Browsers Work
You enter the URL www.CIWcertified.com
Your browser divides the URL into three parts: the protocol
(http), the server and domain name
(www.CIWcertified.com), and the name of the file you want
to view.
Your browser communicates with a domain name server to
translate the server name into an IP address (in this case,
72.44.192.233).
Your browser uses the IP address to form a connection with
the CIW Web server.
Your browser uses HTTP to request the default page from
the server.
Some level of authentication takes place.
The server sends the requested Web page (coded in HTML)
to your browser.
Your browser reads and interprets the HTML, and displays
the Web page.
Browser Elements
Rendering Engine
Interpreter
Sandbox
Thread
Window
Tab
Cache
Plug-in
Troubleshooting
Poor rendering
Slow connection
No connection
Slow browser
Disk space usage
Multimedia on the Web
Plug-ins
A program installed in the browser to
extend the basic functions.
Allows different file formats to be viewed as
part of a standard HTML document
Examples
Adobe Flash Player
Microsoft Silverlight
Apple QuickTime
Windows Media Player
Installing a Plug-in
Online – when the browser is open
Offline – how must plug-in installations
work
Requires the user to download the plug-in
file, quit the browser, start the installation file
File Formats
Video
.avi, .mov, .mp4
Audio
.mp3, .wav
Graphic
.png, .gif, .jpg or .jpeg
Document
.txt, .pdf, .doc or .docx
Saving Web Site Content
You can save entire web pages or
elements of a web page
Different save options depending on the
elements you want to save
For example, you would use different
commands to save the entire web page than
you would to save a graphic from a web
page
Databases and Web Search Engines
Boolean Operators
Commands that let you narrow your
internet search results by requiring or
excluding keywords from the search criteria
Search Engine
A program that searches the internet for
use-specified information
Examples:
Google
Bing
Web Crawler
Information Portal
Example: Yahoo
Sites must be manually submitted.
There are not as many results as a
search engine, but they will be more
relevant to what you are searching for
How to Evaluate Resources
Understand if it is fact or opinion
Identify bias
Consider your sources
Identify the contributor
Compare information you obtain
Consult with trusted individuals
Different Types of Resources
Reviewed and non-reviewed
Authoritative peer-reviewed
Open peer-reviewed
Individual
Primary and secondary
Primary
Secondary
Indexes
Business E-Mail
How E-Mail Works
For messages to be sent from one
computer to another, the computers
must be linked, or networked. You may
have a physical connection (such as a
cable) between the two computer
stations, or the computers may each
connect to a local server that relays the
messages, or the computers may use
the Internet to relay messages.
E-Mail Protocols
Outgoing:
Simple Mail Transfer Protocol (SMTP)
Incoming:
Post Office Protocol Version 3 (POP3)
Internet Message Access Protocol (IMAP)
E-Mails and E-Mail Message
Components
username@domain
E-mail message components:
Response Commands
Profession Communication
Responsiveness
When possible, respond right away
Tone
There is no body language or voice to go off of, so
be as clear as possible – no sarcasm
Clarity
Ideas should be communicated clearly and
concisely to keep messages fairly short
Readability
Bulleted list, avoid fancy font, skip lines between
paragraphs, ect.
Protecting Yourself Online
Malware
Malicious Software – programs or files designed
to harm computer systems
Viruses - a program that assumes control of
system operations, and damages or destroys
data
Worm - self-replicating program or algorithm
that consumes system and network resources
The difference between a worm and a virus is
that a worm automatically spreads from one
computer to another, whereas a virus requires
some form of action from an end user
Malware Continued
Trojan - a program that appears to be
harmless but actually produces harmful
results
Illicit Server - an application that installs
hidden services on systems
Virus Detection
Anti-virus software - scans e-mail
attachments and files for known viruses, and
eliminate any it finds
Do not open any unknown or unexpected
email attachments
Most viruses can be removed without
permanent damage to your system, and most
viruses can be halted even after they
commence an attack.
Spyware
(or adware) is a software application that is
secretly placed on a user's system to gather
information and relay it to outside parties,
usually for advertising purposes
You can detect the presence of spyware by
obtaining a spyware detection application.
Such applications work much like anti-virus
applications in that they scan a computer's
hard drive, memory and network connections,
and look for suspicious activity
Firewalls
A security barrier that prevents unauthorized
access to or from private networks.
Businesses use this combination of hardware,
software and corporate policies to prevent
Internet users outside the business from
accessing proprietary data on the business's
networks that are connected to the Internet, as
well as private intranets.
Firewalls are also used to control employee
access to Internet resources.
Security Related Issues
Copyright Issues
copyright laws protect original works of authorship
that are fixed in a tangible medium of expression
Licensing Issues
If you want to license someone else's copyright-
protected material, you must contact the copyright
owner and ask for permission
Trademark Issues
A trademark is any word, slogan, symbol, name,
package design or device (or any combination
thereof) that marks and distinguishes a product
Lesson 9
Internet Services and Tools
File Transfer Protocol (FTP)
File Transfer Protocol (FTP) is a TCP/IP
suite protocol that allows the transfer of
files between two computers, or one
server and one computer.
FTP is a convenient way to transfer files
and can be a good alternative to
sending an e-mail attachment
Peer-To-Peer Networks
Each computer has both client and
server capabilities
It allows a group of users to connect
with each other and directly share files
among their hard drives
End User License Agreement
(EULA) - a legal contract between the
software's author and the end user who
uses the software
A typical EULA usually copyrights the
code so that it belongs to the author. A
EULA specifies exactly how you may
use the software.
Virtual Network Computing
(VNC) - a program that allows you to
control a computer at a remote location
as if you were sitting in front of it
Help desk personnel might use VNC to
troubleshoot computer problems for
remote employees, or to install software
on remote systems.
Open Source Software
A peer-based development process
describing organizations and products
that provide free source code to the
development community at large with
the goal of developing better products;
includes Mozilla Firefox