Evan Winn 1. In regard to Internet Protocols, explain what is meant

advertisement
Evan Winn
1. In regard to Internet Protocols, explain what is meant by the “handshake”.
a. Query String: internet protocols handshake
b. Rank/Position: 1
i. Handshaking is the automated process of negotiation that sets the
parameters (such as information transfer rate, coding alphabet, parity,
interrupt procedure, and other protocols or hardware features) of
communication between two entities. It follows the physical establishment
of the channel and precedes normal information transfer. One of the
simplest types of handshaking is the ‘Three Way Handshake’ or SYN ­
SYN­ACK ­ ACK.
2. Who is Tim Berners­Lee and what was his role in development of the Internet?
a. Query String: tim berners­lee internet development
b. Rank/Position: 1
i. Tim Berners­Lee is an Oxford University graduate who invented the World
Wide Web while working at CERN. In 1989 to 1991 he had created HTTP,
HTML, URLs, a web browser, and the first web server. He is the director
and founder of the W3C.
3. In what year was the first World­Wide Web software created by Tim Berners­Lee?
a. Query String: tim berners­lee internet development
b. Rank/Position: 1
i. The World Wide Web and web server software was created by Tim
Berners­Lee in late 1990.
4. What is a user­agent?
a. Query String: what is a user agent
b. Rank/Position: 1
i. A user agent is software that is acting on behalf of the user, acting as a
client, such as a web browser.
5. What is a digital design?
a. Query String: what is digital design
b. Rank/Position: 1
i. Digital Design is a term used to describe a wide variety of computer
related skills including fields such as web design, digital imaging, and 3D
modeling. The term can be further expanded to include any digitally
created visual media.
6. Give three examples of web programming languages.
a. Query String: examples of web programming languages
b. Rank/Position: 1
i. C++, PHP, JavaScript
7. What does W3C stand for? What year was the group formed? Who formed it?
a. Query String: what does w3c stand for
b. Rank/Position: 1
i. World Wide Web Consortium
ii. 1994
iii. Tim Berners­Lee
8. What year was the Web Standards Project formed? Who formed the group?
a. Query String: web standards project
b. Rank/Position: 1
i. 1998
ii. Glenn Davis, George Olsen, and Jeffrey Zeldman
9. Project Gutenberg puts public domain literature and information on the Internet.
What was the first document posted?
a. Query String: project gutenberg first document posted
b. Rank/Position: 1
i. The Declaration of Independence
10. Douglas Engelbart was a computer visionary of the 1960’s. What did he invent
that you find handy?
a. Query String: douglas engelbart invented *
b. Rank/Position: 1
i. He invented the computer mouse.
11. Define SaaS.
a. Query String: define saas
b. Rank/Position: 1
i. SaaS (Software as a Service), sometimes referred to as “on­demand
software” is a software delivery model in which software and associated
data are centrally hosted on the cloud.
12. What is a computer virus?
a. Query String: define computer virus
b. Rank/Position: 1
i. A computer virus is a program or piece of code that is loaded onto your
computer without your knowledge and runs against your wishes, and can
also replicate themselves.
13. What was ENIAC?
a. Query String: what was eniac
b. Rank/Position: 1
i. Acronym for Electronic Numerical Integrator And Computer, the first
operational electronic digital computer in the U.S., developed by Army
Ordnance to compute World War II ballistic firing tables, completed in
1945.
14. List three causes and three symptoms of Internet Addiction Disorder.
a. Query String: internet addiction disorder symptoms causes
b. Rank/Position: 1
i. Symptoms
1. Excessive use of the internet, often with a loss of sense of time
or neglect of basic drives
2. Withdrawal symptoms like feeling of anger, tension and/or
depression when the internet is inaccessible
3. Tolerance, that is, a constant need to increase the hours spent
and the need for better computer equipment and more software to
experience the same degree of satisfaction
4. Negative effects of prolonged use like arguments, lying, poor
achievement, social isolation and fatigue.
ii. Causes
1. No one knows for sure what causes a person to become addicted
to the Internet, or whether it is a distinctive type of addiction or
simply an instance of a new technology being used to support
other addictions, but there are several factors that have been
proposed as contributing to Internet addiction, such as:
2. Having a mental disorder such as ADHD, Depression, Anxiety, etc.
3. Having another addiction such as to drugs, gambling, sex. etc.
15. Aside from the W3C and WaSP, list two entities that help govern the web.
a. Query String: entities that help govern the web
b. Rank/Position: 1
i. Internet Corporation for Name & Numbers (ICANN) & Institute for Electrical
and Electronics Engineers (IEEE)
16. What is the relationship between client and server computer (differences in
purpose, hardware, and location and maintenance).
a. Query String: difference between client and server computer
b. Rank/Position: 1
i. In Computer Science, client­server is a software architecture model
consisting of two parts, client systems and server systems, both
communicate over a computer network or on the same computer. A
client­server application is a distributed system consisting of both client
and server software. The client process always initiates a connection to
the server, while the server process always waits for requests from any
client. When both the client process and server process are running on
the same computer, this is called a single seat setup. The client­server
relationship describes the relation between the client and how it makes a
service request from the server, and how the server can accept these
requests, process them, and return the requested information to the client.
In most cases, a client­server architecture enables the roles and
responsibilities of a computing system to be distributed among several
independent computers that are known to each other only through a
network, so one advantage of this model is greater ease of maintenance.
For example, it is possible to replace, repair, upgrade, or even relocate a
server while its clients remain both unaware and unaffected by that
change. Networks traffic blocking is one of the problems related to the
client­server model. As the number of simultaneous client requests to a
given server increases, the server can become overloaded. Specific types
of clients include: web browsers, E­mail clients, and onlie chat clients.
Specific types of servers include: web servers, FTP servers, database
servers, E­mail servers, file servers, and print servers. Most web services
are also types of servers.
17. What is the OSI Model (describe the various layers)?
a. Query String: osi model layers
b. Rank/Position: 1
i. Physical (Layer 1)
1. This layer conveys the bit stream ­ electrical impulse, light or radio
signal ­­ through the network at the electrical and mechanical level.
It provides the hardware means of sending and receiving data on a
carrier, including defining cables, cards and physical aspects.
ii. Data Link (Layer 2)
1. At this layer, data packets are encoded and decoded into bits. It
furnishes transmission protocol knowledge and management and
handles errors in the physical layer, flow control and frame
synchronization. The data link layer is divided into two sub layers:
The Media Access Control (MAC) layer and the Logical Link
Control (LLC) layer. The MAC sub layer controls how a computer
on the network gains access to the data and permission to
transmit it. The LLC layer controls frame synchronization, flow
control and error checking.
iii. Network (Layer 3)
iv.
v.
vi.
vii.
1. This layer provides switching and routing technologies, creating
logical paths, known as virtual circuits, for transmitting data from
node to node. Routing and forwarding are functions of this layer, as
well as addressing, internetworking, error handling, congestion
control and packet sequencing.
Transport (Layer 4)
1. This layer provides transparent transfer of data between end
systems, or hosts, and is responsible for end­to­end error
recovery and flow control. It ensures complete data transfer.
Session (Layer 5)
1. This layer establishes, manages, and terminates connections
between applications. The session layer sets up, coordinates, and
terminates conversations, exchanges, and dialogues between the
applications at each end. It deals with session and connection
coordination.
Presentation (Layer 6)
1. This layer provides independence from differences in data
representation (e.g. encryption) by translating from application to
network format, and vice versa. The presentation layer works to
transform data into the form that the application layer can accept.
This layer formats and encrypts data to be sent across a network,
providing freedom from compatibility problems. It is sometimes
called the syntax layer.
Application (Layer 7)
1. This layer supports application and end­user processes.
Communication partners are identified, quality of service is
identified, user authentication and privacy are considered, and any
constraints on data syntax are identified. Everything at this layer is
application­specific. This layer provides application services for file
transfers, e­mail, and other network software services. Telnet and
FTP are applications that exist entirely in the application level.
Tiered application architectures are part of this layer.
18. What is the Creative Commons licensure? How do you create one?
a. Query String: creative commons license
b. Rank/Position: 1
i. A Creative Commons (CC) license is one of several public copyright
licenses that allow the distribution of a person’s work. It is used when an
author wants to give people the right to share, use, and even build upon a
work that they have created. CC provides author flexibility and protects the
people who use or redistribute the author’s work, so they don’t have to
worry about copyright infringement as long as they abide by the conditions
the author has specified.
ii. You can obtain a Creative Commons license freely by answering a few
questions at creativecommons.org.
19. Define Types of websites: brochureware, applications, static vs. dynamic.
a. Query String: types of websites
b. Rank/Position: 1
i. Brochureware
1. Brochureware refers to Web sites or pages that are produced by
taking an organization's printed brochure and translating it directly
to the Web without regard for the possibilities of the new medium.
In extreme cases, all the copy in the brochure will be used as­is
and visual images will be copied as well. The result will almost
always be static and uninteresting.
ii. Applications
1. A web­based application is any application that uses a web
browser as a client. Common web applications include webmail,
online retail sales, online auctions, wikis and many other functions.
iii. Static
1. A static web page (sometimes called a flat page/stationary page)
is a web page that is delivered to the user exactly as stored, in
contrast to dynamic web pages which are generated by a web
application. Any personalization or interactivity has to run
client­side, which is restricting.
iv. Dynamic
1. A dynamic web page is a website whose content is not fixed. What
is shown on a page is based on user­selected activities and/or
programmatically driven.
20. Describe Email & Mailing List etiquette.
a. Query String: email mailing list etiquette
b. Rank/Position: 1
i. Mailing List Etiquette
1. Subscribers should volunteer to join a list before being sent mail,
and the first message sent should always explain how to be
removed from the mailing list.
2. Members of a list should use it sparingly and only when they have
something concrete to say.
3. The mailing list should not be used for any commercial,
semi­commercial or other ‘private’ activity.
4. List owners and contributing subscribers should not post any
material that defames any person, product or service.
ii. Email Etiquette
1. Understand the difference between ‘To’, ‘CC’, and ‘BCC’. “To” is
used for people that you want to respond or want action from; “CC”
is for people you want to keep in the loop and have a copy of the
email; “BCC” is for a large list of recipients that don’t know each
other, for privacy.
2. Keep messages brief and to the point. Make your most important
point first, then provide detail if necessary. Make it clear at the
beginning of the message why you are writing.
3. Don’t discuss multiple subjects in a single message. If you need to
discuss more than one subject, send multiple emails.
4. Reply in a timely manner. Don’t use e­mail to criticize others. Don’t
reply in anger. Don’t foward chain letters. Use a signature with your
contact information. Use your spell­checker. Provide “if­then”
options. Don’t send or foward emails containing libelous,
defamatory, offensive, racist, or obscene remarks. Re­read your
e­mail before you send it.
5. Be mindful of your tone. Unlike face­to­face meetings or even
phone calls, those who read your e­mail messages don’t have the
benefit of your pitch, tone, inflection, or other non­verbal cues. If
something gets “lost in translation”, you risk offending the other
person. The more matter­of­fact you can be, the better.
Download