Questions From LectureHistory of the Internet:1972- Ray Tomlinson invents email. Making @ key the standard for all emails1974- the word “Internet” is used.1983- Domain Name System created1996- Email surpasses postal mail.1998- Blogs started appearing.1999- Craigslist is created.2001- Wikipedia is created.Tim-Berners Lee created HTMLBe able to label these pictures:ISYS 210 Exam # 2 Study Guide Chapters: 7-9Questions From Exam Bank: 1. a "_______" lets employees exchange ideas and content within their own organizations: knowledge system2. 80 plus standard: the process of power conversion is actually very inefficient so energy star standards required that a PC's power supply convert 65% of its AC power into DC current, and revised that standard in 2007 to 80%3. adware: software which routinely displays ads to a computer system after the software is installed, usually without the users consent4. Another common network protocol: user datagram protocol (UDP)5. ARPANET( Advanced research project agency network): in 1969 at UCLA ARPANET was born, one of the precursors to today's internet6. Bookmarks are also called: favorites7. broadband internet access: high data-transmission rate internet connection8. Browser: is application software that provides an interface which lets a user display and interact with text, images, and other information located on the world wide web9. browser hijacking: when the browsers settings are modified by malware10. Burning fossil fuels creates carbon dioxide which builds up and slows the escape of heat into space, therefore creating a: GREENHOUSE EFFECT11. Bus topology: linier bus is a network topology where all of the nodes of the network are connected to a common linear backbone with two endpoints12. Business-to-business (B2B): is businesses distributing, buying, selling, advertising, and marketing of goods or services over the web to others businesses. B2B transactions are inclined to take place within specific categories.13. Business-to-consumer(B2C): is where commercial organizations sell to consumers14. Businesses star developing green computing business plans with what considerations?: 1. organizational policies and procedures 2. best practice considerations 3. long-term, sustainability considerations 4. reduction of power usage and paper consumption 5. recyclingpolicies and procedures 6. used computer software and hardware disposal 7. governmental guidelines (EPEAT and Energy Star) 8. green computer equipment purchasing recommendations15. caching: when the browser stores copies on a users computer of previously viewed web pages that a user has already accessed so it does not have to find it again on the world wide web or request it again from the originating server16. communication: is the most common use of the internet17. a computer on a network that stores webpages is called the: server18. the computer on the network that requests those webpages is called a: client19. connectivity: when one computer can connect to another or many computers and share information and resources20. Consumer-to-Consumer(C2C): involves e-commerce between consumers, usually facilitated by some third party21. Cookies: text files sent to a browser and then sent back unchanged by the browser to the originating server22. does UDP guarantee files reliability?: no23. electronic commerce: is the distributing, buying, selling, advertising, and marketing of goods or services over the web24. the energy star program asks computer makers to focus on three PC modes: 1. active use 2. sleep mode and "off" 3. standby mode25. EPEAT evaluates what?: electronic products, many of which are business computers relativeto 51 environmental criteria26. EPEAT( ELECTRONIC PRODUCT ENVIRONMENTAL ASSESSMENT TOOL): is an easy-to-use online tool that helps large institutions purchase, select, and compare computer desktops, laptops, and monitors based on their environmental attributes27. firewall: specialized hardware and software that insures that only authorized personnel within an organization can use an organization's intranet28. a firewall: specialized hardware and software working together that insures that only authorized personnel within an organization can use the intranet29. firewalls keep public networks like the internet from accessing private networks like an: intranet30. Fromasocialperspective,environmentalresponsibility and global governance can simply beseen as the "____________" things to do so it's easy to conclude that greener computing should follow suit: RIGHT31. Global warming has gained "________________" and acceptance as an acknowledged problem and will drivemany businesses strategic and tactical decisions and sustainable solutions for many decades, creating tens of thousands of new businesses in the process: DIFFUSION32. Green Business Computing: the practice of applying computing resources resourcefully while reducing the use of hazardous materials, increasing energy efficiency, promoting recycling, and reducing waste created during a computer's manufacturing33. GREEN COMPUTING: the practice of using computer resources efficiently while reducing theuse of hazardous materials, maximizing energy efficiency, promoting the recyclability of defunct products, and reducing factory waste during the computer's manufacturing process34. Green Computing business plans: based on the idea that businesses can become environmentally friendly, more profitable, and socially responsible through well thought out implementations of sustainable policies and procedures and through future information technology purchasing35. Green PC's: include energy efficient power supplies and processors that attempt to use a minimum amount of electricity and attempt to at least minimize the use of harmful components36. how do web browsers display images?: joint photographic expert group and graphics interchange format (GIF) file formats37. HTTp refers to the: standard protocol or the rules of exchanging files rom a server to a clienton the internet38. Hyperlink: a clickable navigation element in a webpage to another webpage of the same website, or even a completely new website39. the internet and the world wide web are public, which means that your browser and computer can be compromised by: outside hackers40. internet hosting services: runs internet servers, which are then available to serve content such as webpages to the internet, or clients41. the internet is a network called a: client/server model42.
View Full Document