logo image

RRHS IT Lesson 02

Web feeds can be read using software called:
An aggregator
Asking other users to divulge personal information during any Internet-based communication can be considered:
A breach of Internet ethics
What is the term for the business trend that seeks to simplify and integrate all forms of communication?
Unified communications (UC)
What would be considered a Web 2.0 technology?
Wiki
What is the term for the concept referring to the changing trends in the use of WWW technology and Web design that have led to the development of information-sharing and collaboration capabilities?
Web 2.0
What accurately describes at least one difference between Web 1.0 and Web 2.0?
Web 2.0 largely relies on the use of crowdsourcing, whereas Web 1.0 does not.
What term describes the ability of a group to exhibit a greater degree of intelligence by solving problems collaboratively instead of relying on the intelligence of an individual member?
Collective intelligence
What is the name of the programming methodology for the Web that enables Web applications to interact with users in much the same way they do with desktop applications?
Ajax
What is the term for an application programming interface (API) that is used to transfer XML and other text data between a Web server and browser?
XML Http Request
What is a wiki?
A page or collection of Web pages that can be viewed and modified by anybody with a Web browser and Internet access
What is folksonomy?
The practice of categorizing online content through tags
What is a podcast?
The use of audio or video digital-media files that are distributed through Web feeds to subscribers
Semantic Web implementations are Web applications that:
Have the ability to contextualize data as they process it.
A Web page that integrates content and scripts from multiple Web sites to create new applications is known as:
Mashup
What is social networking?
The grouping of individuals with common interests or goals into specific groups or communities
What is usually true of popular social networking sites?
They generally provide privacy protection for users.
What popular social networking sites is most often used as a business tool?
LinkedIn
What is the term for a computer-based method of communication in which users can type and view messages sent to one or more recipients, and view the responses immediately?
Instant messaging (IM)
Why should you avoid transmitting sensitive information in an instant messaging session?
Because instant messaging is not a secure method of communication
What is spim?
Spam that is delivered through instant messaging
The protocol required for text messaging is:
SMS
What should you use to accept real-time assistance from a remote help desk technician?
Windows Remote Assistance
An electronic journal or personal diary posted to a public Web site can be considered:
A blog
What is one reason blogging has become so popular and prevalent?
Blogs have become a form of intellectual stimulation as well as entertainment.
What is the name for the method by which a blogger receives notification when other bloggers link to his or her blog entry?
Trackback
Typing an e-mail message or instant message using all capital letters can be considered:
A breach of netiquette
Sending jokes via e-mail or sending instant messages to someone who does not want to be contacted can be considered:
A form of harassment
What is the term for the integration of telephony and data technologies?
Convergence
What is the term for voice information delivered in digital form as packets of data using Internet Protocol (IP) instead of the traditional circuit-switched lines of the public switched telephone network (PSTN)?
Voice over IP (VoIP)
Companies use call centers to:
Interact with their customers.
Presence information:
Indicates a person’s willingness and ability to participate in communication
What is the term that refers to a person’s ability to use technology while “on the go”?
Mobile computing

Need essay sample on "RRHS IT Lesson 02"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy