RRHS IT Lesson 02
Flashcard maker : Lily Taylor
Web feeds can be read using software called:
Asking other users to divulge personal information during any Internet-based communication can be considered:
A breach of Internet ethics
What is the term for the business trend that seeks to simplify and integrate all forms of communication?
Unified communications (UC)
What would be considered a Web 2.0 technology?
What is the term for the concept referring to the changing trends in the use of WWW technology and Web design that have led to the development of information-sharing and collaboration capabilities?
What accurately describes at least one difference between Web 1.0 and Web 2.0?
Web 2.0 largely relies on the use of crowdsourcing, whereas Web 1.0 does not.
What term describes the ability of a group to exhibit a greater degree of intelligence by solving problems collaboratively instead of relying on the intelligence of an individual member?
What is the name of the programming methodology for the Web that enables Web applications to interact with users in much the same way they do with desktop applications?
What is the term for an application programming interface (API) that is used to transfer XML and other text data between a Web server and browser?
XML Http Request
What is a wiki?
A page or collection of Web pages that can be viewed and modified by anybody with a Web browser and Internet access
What is folksonomy?
The practice of categorizing online content through tags
What is a podcast?
The use of audio or video digital-media files that are distributed through Web feeds to subscribers
Semantic Web implementations are Web applications that:
Have the ability to contextualize data as they process it.
A Web page that integrates content and scripts from multiple Web sites to create new applications is known as:
What is social networking?
The grouping of individuals with common interests or goals into specific groups or communities
What is usually true of popular social networking sites?
They generally provide privacy protection for users.
What popular social networking sites is most often used as a business tool?
What is the term for a computer-based method of communication in which users can type and view messages sent to one or more recipients, and view the responses immediately?
Instant messaging (IM)
Why should you avoid transmitting sensitive information in an instant messaging session?
Because instant messaging is not a secure method of communication
What is spim?
Spam that is delivered through instant messaging
The protocol required for text messaging is:
What should you use to accept real-time assistance from a remote help desk technician?
Windows Remote Assistance
An electronic journal or personal diary posted to a public Web site can be considered:
What is one reason blogging has become so popular and prevalent?
Blogs have become a form of intellectual stimulation as well as entertainment.
What is the name for the method by which a blogger receives notification when other bloggers link to his or her blog entry?
Typing an e-mail message or instant message using all capital letters can be considered:
A breach of netiquette
Sending jokes via e-mail or sending instant messages to someone who does not want to be contacted can be considered:
A form of harassment
What is the term for the integration of telephony and data technologies?
What is the term for voice information delivered in digital form as packets of data using Internet Protocol (IP) instead of the traditional circuit-switched lines of the public switched telephone network (PSTN)?
Voice over IP (VoIP)
Companies use call centers to:
Interact with their customers.
Indicates a person’s willingness and ability to participate in communication
What is the term that refers to a person’s ability to use technology while “on the go”?