Chapters 8 thru 11 - the CLC Faculty and Staff Web Pages

advertisement
Chapters 8 through 11 Review
Chapter 8 – The Internet and the World Wide Web












JRNorth
ARPANET, NSFNET, Internet 2
o ICANN – domain name assignments
Access providers, ISPs, backbone providers, content providers
ASP providers, SAAS, IAAS, PAAS
Modem (POTS) vs broadband
o Voice-grade lines
o Cable, DSL, WiMax, Satellite, 3G/4G data plans
 Cable most widely used
o Fiber to the Premise (FTTP), Broadband over Fiber (BoF)
Hotspots
Portals
Searching
o Key-word searches
 Web-crawlers / search engines
o Directories
o Phrases, Booleans, Advanced searching
Types of Services
o Synchronous
 IM
 Skype
 Teleconferencing, videoconferencing, webconferencing
 VOIP
o Asynchronous
 Email
 Text messaging
o Telecommuting
Distance learning
o Web-based training
o Online classes, online testing
o Podcast
o Webinars
o Wikis, blogs, e-portfolios
Push technologies
o RSS
Censorship
Privacy
o Presence technology
o Tracking
o Cookies
1
CIT120
Chapters 8 through 11 Review
Chapter 9 – Network and Internet Security













JRNorth
Hacking, white-hat vs black-hat
Cybercrime
o Scams, dot cons
o Identity theft
o Data loss
o Cyberbullying
o Cyberstalking
o Anonimity
o Computer sabotage
Malware
o Virus, Trojan horse, computer worm
o Computer sabotage
o Bots and botnets
Internet security packages
o Anti-virus, anti-spam, anti-spyware, firewall, intrusion detection
Spoofing, phishing, spear phishing, pharming
Cyberbullying / cyberstalking
Denial of service attacks
WiFi for business or home
o Default security
o WEP, WPA, WPA2
o MAC addresses
o SSID
o
War-driving vs WiFi Piggybacking
Cookie
o First-party vs third-party
Private-key vs Public-key encryption
o VPN
Authorization vs authentication
o Possessed knowledge
o Possessed object
 Biometric access
o Two-factor authentication
USA Patriot Act of 2001
2
CIT120
Chapters 8 through 11 Review
Chapter 10 – Multimedia and the Web








JRNorth
Different learning styles – visual, auditory, kinesthetic
Large web docs should be available as .doc or .pdf
Fonts – serif (headlines) vs san serif (large amounts of text)
Image formats
o BMP
 GIF – 256 colors, line art, smallest size, animation
 JPEG/JPG – most common, lossy, quality vs compression specified, true-color
 PNG – lossless compression, true-color
 TIFF – favored by pro photographers, lossless
 Paint programs
 Thumbnails
o Vector-based
 CAD
 Clipart
 Resizable
 Drawing programs
 Scalable vector graphics
o Photomanipulation
 Photoshop
 Multi-layered
Animation
o Java applets
o Animated GIFs
o Javascript
o Flash / Silverlight
Video
o Formats – MS: avi, wmv; Apple – mov (QuickTime); Movie Pictures Group: mp2, mp4
Internet based languages
o HTML, XHTML, DHTML, WML
 Specifies formatting webpage to browser
o AJAX
o Web authoring software
 Adobe Dreamweaver
 MS Expression Web
o Plug-ins
 Flash
 Adobe reader
 Shockwave
 Link to plugin source
Website development
3
CIT120
Chapters 8 through 11 Review

JRNorth
o Storyboards, flowcharts, page layouts
o Navigational elements
o Site maps
Streaming data – buffered before actually playing
4
CIT120
Chapters 8 through 11 Review
Chapter 11 – E-commerce






JRNorth
What is E-commerce
Online stores (dot-coms), brick & mortar, and click and mortar
Advantages vs disadvantages
o Comparison shopping web sites – shopping bots
E-commerce models
o B2C
o B2B
 Expected to surpass B2C market
o C2C (P2P)
o B2G
o Brokerage sites
 Intermediary hub model
 Horizontal vs Vertical hubs
 Bring buyers and sellers together
 Dynamic pricing sites – Priceline.com
Software for web site development
o eCRM – order status, tracking links, downloads, technical support
o Storefront software
o Shopping cart software
 Shopping cart abandonment
o Payment collection
 Online payment services: PayPal (owned by E-bay), Google Checkout
 Digital wallets
 Gift cards, coupons
 One time password
o Marketing
 Sponsored links
 Banner ads
 Rich media ads
 Behavioral targeting
o Search site optimization (SSO)
Security
o Secure transactions
o Secure documents / files
o Authentication
5
CIT120
Chapters 8 through 11 Review
Access



JRNorth
DB vs DBMS
Structure – field, record, table, database
Critical Objects
o Table
 Fields and data types
 Text vs memo
 Number – byte, integer, long integer, single, double, currency
 Boolean (yes/no)
 OLE objects
 Attachments, hyperlinks
 Indexes
 Primary key – key symbol
o Composite or concatenated
 Secondary keys
 Foreign keys
 Properties
 Validation rules and messages
 Default values
 Required fields
 Format / masks
o Relationships 1-1, 1-M, M-M
 Intersection table
 Referential integrity
 Cascade update/delete
o Forms – one record at a time
 Single record at a time
 Master / Child forms
 Hybrid forms
o Queries – answering a question about the data
 Joins
 Aggregate (Totals)
 Wildcards - * and ?
 Criteria
 Parameterized queries
o Reports
 Formalized tables and queries
 Detail / Summary
 Calculated fields
 Group breaks
6
CIT120
Download