DOC PREVIEW
TAMU ISYS 210 - Exam 2 Study Guide

This preview shows page 1-2-3 out of 10 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Questions From LectureHistory of the Internet:1972- Ray Tomlinson invents email. Making @ key the standard for all emails1974- the word “Internet” is used.1983- Domain Name System created1996- Email surpasses postal mail.1998- Blogs started appearing.1999- Craigslist is created.2001- Wikipedia is created.Tim-Berners Lee created HTMLBe able to label these pictures:ISYS 210 Exam # 2 Study Guide Chapters: 7-9Questions From Exam Bank: 1. a "_______" lets employees exchange ideas and content within their own organizations: knowledge system2. 80 plus standard: the process of power conversion is actually very inefficient so energy star standards required that a PC's power supply convert 65% of its AC power into DC current, and revised that standard in 2007 to 80%3. adware: software which routinely displays ads to a computer system after the software is installed, usually without the users consent4. Another common network protocol: user datagram protocol (UDP)5. ARPANET( Advanced research project agency network): in 1969 at UCLA ARPANET was born, one of the precursors to today's internet6. Bookmarks are also called: favorites7. broadband internet access: high data-transmission rate internet connection8. Browser: is application software that provides an interface which lets a user display and interact with text, images, and other information located on the world wide web9. browser hijacking: when the browsers settings are modified by malware10. Burning fossil fuels creates carbon dioxide which builds up and slows the escape of heat into space, therefore creating a: GREENHOUSE EFFECT11. Bus topology: linier bus is a network topology where all of the nodes of the network are connected to a common linear backbone with two endpoints12. Business-to-business (B2B): is businesses distributing, buying, selling, advertising, and marketing of goods or services over the web to others businesses. B2B transactions are inclined to take place within specific categories.13. Business-to-consumer(B2C): is where commercial organizations sell to consumers14. Businesses star developing green computing business plans with what considerations?: 1. organizational policies and procedures 2. best practice considerations 3. long-term, sustainability considerations 4. reduction of power usage and paper consumption 5. recyclingpolicies and procedures 6. used computer software and hardware disposal 7. governmental guidelines (EPEAT and Energy Star) 8. green computer equipment purchasing recommendations15. caching: when the browser stores copies on a users computer of previously viewed web pages that a user has already accessed so it does not have to find it again on the world wide web or request it again from the originating server16. communication: is the most common use of the internet17. a computer on a network that stores webpages is called the: server18. the computer on the network that requests those webpages is called a: client19. connectivity: when one computer can connect to another or many computers and share information and resources20. Consumer-to-Consumer(C2C): involves e-commerce between consumers, usually facilitated by some third party21. Cookies: text files sent to a browser and then sent back unchanged by the browser to the originating server22. does UDP guarantee files reliability?: no23. electronic commerce: is the distributing, buying, selling, advertising, and marketing of goods or services over the web24. the energy star program asks computer makers to focus on three PC modes: 1. active use 2. sleep mode and "off" 3. standby mode25. EPEAT evaluates what?: electronic products, many of which are business computers relativeto 51 environmental criteria26. EPEAT( ELECTRONIC PRODUCT ENVIRONMENTAL ASSESSMENT TOOL): is an easy-to-use online tool that helps large institutions purchase, select, and compare computer desktops, laptops, and monitors based on their environmental attributes27. firewall: specialized hardware and software that insures that only authorized personnel within an organization can use an organization's intranet28. a firewall: specialized hardware and software working together that insures that only authorized personnel within an organization can use the intranet29. firewalls keep public networks like the internet from accessing private networks like an: intranet30. Fromasocialperspective,environmentalresponsibility and global governance can simply beseen as the "____________" things to do so it's easy to conclude that greener computing should follow suit: RIGHT31. Global warming has gained "________________" and acceptance as an acknowledged problem and will drivemany businesses strategic and tactical decisions and sustainable solutions for many decades, creating tens of thousands of new businesses in the process: DIFFUSION32. Green Business Computing: the practice of applying computing resources resourcefully while reducing the use of hazardous materials, increasing energy efficiency, promoting recycling, and reducing waste created during a computer's manufacturing33. GREEN COMPUTING: the practice of using computer resources efficiently while reducing theuse of hazardous materials, maximizing energy efficiency, promoting the recyclability of defunct products, and reducing factory waste during the computer's manufacturing process34. Green Computing business plans: based on the idea that businesses can become environmentally friendly, more profitable, and socially responsible through well thought out implementations of sustainable policies and procedures and through future information technology purchasing35. Green PC's: include energy efficient power supplies and processors that attempt to use a minimum amount of electricity and attempt to at least minimize the use of harmful components36. how do web browsers display images?: joint photographic expert group and graphics interchange format (GIF) file formats37. HTTp refers to the: standard protocol or the rules of exchanging files rom a server to a clienton the internet38. Hyperlink: a clickable navigation element in a webpage to another webpage of the same website, or even a completely new website39. the internet and the world wide web are public, which means that your browser and computer can be compromised by: outside hackers40. internet hosting services: runs internet servers, which are then available to serve content such as webpages to the internet, or clients41. the internet is a network called a: client/server model42.


View Full Document

TAMU ISYS 210 - Exam 2 Study Guide

Documents in this Course
Load more
Download Exam 2 Study Guide
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Exam 2 Study Guide and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Exam 2 Study Guide 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?