1,355
13
Essay, 3 pages (550 words)

Lesson 2 a

What is the term for voice information delivered in digital form as packets of data using Internet Protocol (IP) instead of the traditional circuit-switched lines of the public switched telephone network (PSTN)? Voice over IP (VoIP)

Sending jokes via e-mail or sending instant messages to someone who does not want to be contacted can be considered: a form of harassment

Web feeds can be read using software calledan aggregator

What is one reason blogging has become so popular and prevalent? Blogs have become a form of intellectual stimulation as well as entertainment.

What is the term for the integration of telephony and data technologies? Convergence

Which of the following accurately describes at least one difference between Web 1. 0 and Web 2. 0? Web 2. 0 largely relies on the use of crowdsourcing, whereas Web 1. 0 does not

Which of the following would be considered a Web 2. 0 technology? Wiki

What is a podcast? The use of audio or video digital-media files that are distributed through Web feeds to subscribers

What is spim? Spam that is delivered through instant messaging

Asking other users to divulge personal information during any Internet-based communication can be considered: a breach of Internet ethics

An electronic journal or personal diary posted to a public Web site can be considereda blog.

What is folksonomy? The practice of categorizing online content through tags

What is the term for an application programming interface (API) that is used to transfer XML and other text data between a Web server and browser? XMLHttpRequest

Which of the following is usually true of popular social networking sites? They generally provide privacy protection for users

The protocol required for text messaging is: SMS.

Companies use call centers to: interact with their customers.

Which of the following should you use to accept real-time assistance from a remote help desk technician? Windows Remote Assistance

What is the term for a computer-based method of communication in which users can type and view messages sent to one or more recipients, and view the responses immediately? Instant messaging (IM)

Typing an e-mail message or instant message using all capital letters can be considered: a breach of netiquette

What is social networking? The grouping of individuals with common interests or goals into specific groups or communities

Why should you avoid transmitting sensitive information in an instant messaging session? Because instant messaging is not a secure method of communication

What is the name for the method by which a blogger receives notification when other bloggers link to his or her blog entry? Trackback

What is the term for the concept referring to the changing trends in the use of WWW technology and Web design that have led to the development of information-sharing and collaboration capabilities? Web 2. 0

Semantic Web implementations are Web applications that: have the ability to contextualize data as they process it

What term describes the ability of a group to exhibit a greater degree of intelligence by solving problems collaboratively instead of relying on the intelligence of an individual member? Collective intelligence

What is the term that refers to a person’s ability to use technology while ” on the go”? Mobile computing

A Web page that integrates content and scripts from multiple Web sites to create new applications is known as a: mashup

What is the term for the business trend that seeks to simplify and integrate all forms of communication? Unified communications (UC)

What is the name of the programming methodology for the Web that enables Web applications to interact with users in much the same way they do with desktop applications? Ajax

ONLESSON 2 A SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder Now

Thank's for Your Vote!
Lesson 2 a. Page 1
Lesson 2 a. Page 2
Lesson 2 a. Page 3
Lesson 2 a. Page 4

This work, titled "Lesson 2 a" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2021) 'Lesson 2 a'. 20 December.

Reference

AssignBuster. (2021, December 20). Lesson 2 a. Retrieved from https://assignbuster.com/lesson-2-a/

References

AssignBuster. 2021. "Lesson 2 a." December 20, 2021. https://assignbuster.com/lesson-2-a/.

1. AssignBuster. "Lesson 2 a." December 20, 2021. https://assignbuster.com/lesson-2-a/.


Bibliography


AssignBuster. "Lesson 2 a." December 20, 2021. https://assignbuster.com/lesson-2-a/.

Work Cited

"Lesson 2 a." AssignBuster, 20 Dec. 2021, assignbuster.com/lesson-2-a/.

Get in Touch

Please, let us know if you have any ideas on improving Lesson 2 a, or our service. We will be happy to hear what you think: [email protected]