basically, we need to fill these questions in, but we have to refernce a website with every answer and the teachers don't know and can't help us (hooray for training)
so i'm hoping someone here knows any websites that might have answers or anything...
thanks;
(i've already done some, i just need help with the ones i haven't)
As part of your completion of this competency, you need to be able to answer the following questions. Later, there will be a quiz to test your knowledge. Specify your sources for the answers to the questions.
Type your answers under the questions.
1. How do you initiate and conclude an Internet connection?
“…Before you can connect to the Internet and access the World Wide Web, you need to have certain equipment. In brief, you must have a computer (preferably running an up-to-date operating system); a modem and access to a telephone line or a local area network (LAN) that is in turn connected to the Internet; and connection software that will allow you to establish an account with a service provider and access the Internet…”
Source: http://www.centerspan.org/tutorial/connect.htm
2. If a connection attempt fails, what could be the cause and what do you do?
3. How do you know if you are still on line, and how do you log off?
4. Explain some appropriate uses of different Internet protocols and data types (WWW, e-mail, intranet, newsgroup or chat room, networking sites such as MySpace or U-Tube.)
5. Name two WWW search engines
• www.google.com
• www.yahoo.com
6. What is a URL?
“…Uniform Resource Locator: a protocol for specifying addresses on the Internet…”
Source: http://dictionary.reference.com/browse/URL
7. Why might you sometimes use e-mail to respond to a newsgroup post?
8. What is shareware? (Give at least two examples)
“…The term shareware refers to commercial software that is copyrighted, but which may be copied for others for the purpose of their trying it out with the understanding that they will pay for it if they continue to use it…”
Source: http://en.wikipedia.org/wiki/Shareware
Examples of Shareware software;
• WinRAR
Source: http://en.wikipedia.org/wiki/WinRAR
• DOOM
Sourece: http://en.wikipedia.org/wiki/DOOM
9. In which of these is maintaining (upper/lower) case important: URLs, file names, passwords?
Passwords
Source: http://morun.net/
10. What are "zip" files and why are they used?
“…Zip files can contain one or more files that have been compressed using the zip format. The zip format is popular on PCs and is widely used for interplatform compression of files. Decompression software is widely available...”
Source: http://iconfactory.com/home/show/1321
11. What is the difference between Java and JavaScript?
“JavaScript is text-based. You write it to an HTML document and it is run through a browser. You can alter it after it runs and run it again and again. Once the Java is compiled, it is set. Sure, you can go back to the original text and alter it, but then you need to compile again.
Java applets run independent of the HTML document that is calling for them. Sure, they appear on the page, but the HTML document did little more than call for the application and place it. If the programmer allows it, oftentimes parameters can be set by the HTML document. This includes the background color of the applet of the type of text it displays, etc. The delivery of the applet is done through a download. The HTML document calls for the application, it downloads to the user's cache, and waits to run. JavaScript is wholly reliant on the browser to understand it and make it come to life.“
Source: http://www.htmlgoodies.com/beyond/javascri...cle.php/3470971
12. In what ways can you use the Internet to obtain product information and technical support?
Company websites
13. Approximately how long would it take to download one megabyte of data using a fast modem? (Specify at least two connection types and speeds)
• 56kb/s Dial-up: 2 Minutes 29 Seconds
• 512kb/s DSL: 15 Seconds
Source: http://www.csgnetwork.com/csdlspeedcalc.html
14. What are some key privacy and security measures related to on line tasks?
15. What information would you refuse to provide when filling out a form on a web page? Why?
16. What are cookies?
“…A "cookie" is a small piece of information sent by a web server to store on a web browser so it can later be read back from that browser. This is useful for having the browser remember some specific information…”
17. Why should you not leave the terminal unattended while on line?
18. Which types of files can carry viruses?
File types such as;
.ade
.adp
.app
.asp
.bas
.bat
.chm
.cmd
.com
.cpl
.crt
.csh .exe
.fxp
.hlp
.hta
.htr
.inf
.ins
.isp
.jar
.js
.jse
.ksh .lnk
.mda
.mdb
.mde
.mdt
.mdw
.mdz
.msc
.msi
.msp
.mst
.ops .pcd
.pif
.prf
.prg
.reg
.scf
.scr
.sct
.shb
.shs
.url
.vb .vbe
.vbs
.wsc
.wsf
.wsh
.xsl
Source: http://kb.iu.edu/data/ajch.html
19. Why must you scan for viruses before and after extracting the files from a compressed archive?
20. Who owns the copyright on the types of data you retrieve?
so i'm hoping someone here knows any websites that might have answers or anything...
thanks;
(i've already done some, i just need help with the ones i haven't)
As part of your completion of this competency, you need to be able to answer the following questions. Later, there will be a quiz to test your knowledge. Specify your sources for the answers to the questions.
Type your answers under the questions.
1. How do you initiate and conclude an Internet connection?
“…Before you can connect to the Internet and access the World Wide Web, you need to have certain equipment. In brief, you must have a computer (preferably running an up-to-date operating system); a modem and access to a telephone line or a local area network (LAN) that is in turn connected to the Internet; and connection software that will allow you to establish an account with a service provider and access the Internet…”
Source: http://www.centerspan.org/tutorial/connect.htm
2. If a connection attempt fails, what could be the cause and what do you do?
3. How do you know if you are still on line, and how do you log off?
4. Explain some appropriate uses of different Internet protocols and data types (WWW, e-mail, intranet, newsgroup or chat room, networking sites such as MySpace or U-Tube.)
5. Name two WWW search engines
• www.google.com
• www.yahoo.com
6. What is a URL?
“…Uniform Resource Locator: a protocol for specifying addresses on the Internet…”
Source: http://dictionary.reference.com/browse/URL
7. Why might you sometimes use e-mail to respond to a newsgroup post?
8. What is shareware? (Give at least two examples)
“…The term shareware refers to commercial software that is copyrighted, but which may be copied for others for the purpose of their trying it out with the understanding that they will pay for it if they continue to use it…”
Source: http://en.wikipedia.org/wiki/Shareware
Examples of Shareware software;
• WinRAR
Source: http://en.wikipedia.org/wiki/WinRAR
• DOOM
Sourece: http://en.wikipedia.org/wiki/DOOM
9. In which of these is maintaining (upper/lower) case important: URLs, file names, passwords?
Passwords
Source: http://morun.net/
10. What are "zip" files and why are they used?
“…Zip files can contain one or more files that have been compressed using the zip format. The zip format is popular on PCs and is widely used for interplatform compression of files. Decompression software is widely available...”
Source: http://iconfactory.com/home/show/1321
11. What is the difference between Java and JavaScript?
“JavaScript is text-based. You write it to an HTML document and it is run through a browser. You can alter it after it runs and run it again and again. Once the Java is compiled, it is set. Sure, you can go back to the original text and alter it, but then you need to compile again.
Java applets run independent of the HTML document that is calling for them. Sure, they appear on the page, but the HTML document did little more than call for the application and place it. If the programmer allows it, oftentimes parameters can be set by the HTML document. This includes the background color of the applet of the type of text it displays, etc. The delivery of the applet is done through a download. The HTML document calls for the application, it downloads to the user's cache, and waits to run. JavaScript is wholly reliant on the browser to understand it and make it come to life.“
Source: http://www.htmlgoodies.com/beyond/javascri...cle.php/3470971
12. In what ways can you use the Internet to obtain product information and technical support?
Company websites
13. Approximately how long would it take to download one megabyte of data using a fast modem? (Specify at least two connection types and speeds)
• 56kb/s Dial-up: 2 Minutes 29 Seconds
• 512kb/s DSL: 15 Seconds
Source: http://www.csgnetwork.com/csdlspeedcalc.html
14. What are some key privacy and security measures related to on line tasks?
15. What information would you refuse to provide when filling out a form on a web page? Why?
16. What are cookies?
“…A "cookie" is a small piece of information sent by a web server to store on a web browser so it can later be read back from that browser. This is useful for having the browser remember some specific information…”
17. Why should you not leave the terminal unattended while on line?
18. Which types of files can carry viruses?
File types such as;
.ade
.adp
.app
.asp
.bas
.bat
.chm
.cmd
.com
.cpl
.crt
.csh .exe
.fxp
.hlp
.hta
.htr
.inf
.ins
.isp
.jar
.js
.jse
.ksh .lnk
.mda
.mdb
.mde
.mdt
.mdw
.mdz
.msc
.msi
.msp
.mst
.ops .pcd
.pif
.prf
.prg
.reg
.scf
.scr
.sct
.shb
.shs
.url
.vb .vbe
.vbs
.wsc
.wsf
.wsh
.xsl
Source: http://kb.iu.edu/data/ajch.html
19. Why must you scan for viruses before and after extracting the files from a compressed archive?
20. Who owns the copyright on the types of data you retrieve?