CourseBook - Lesson 01
CourseBook - Lesson 01
President/Chief Certification Architect James Stanger, Ph.D. Vice President, Operations Todd Hopkins Senior Content Developer Kenneth A. Kozakis Managing Editor Susan M. Lane Editor Sarah Skodak Project Manager/Publisher Tina Strong
Customer Service Certification Partners, LLC 1230 W. Washington St., Ste. 111 Tempe, AZ 85281 (602) 275-7700
Contributors
James Stanger, Ph.D., Patrick T. Lane, Irina Heer and Stephen Schneiter
Editor
Susan M. Lane
Project Manager/Publisher
Tina Strong
Trademarks
Certification Partners is a trademark of Certification Partners, LLC. All product names and services identified throughout this book are trademarks or registered trademarks of their respective companies. They are used throughout this book in editorial fashion only. No such use, or the use of any trade name, is intended to convey endorsement or other affiliation with the book. Copyrights of any screen captures in this book are the property of the software's manufacturer.
Disclaimer
Certification Partners, LLC, makes a genuine attempt to ensure the accuracy and quality of the content described herein; however, Certification Partners makes no warranty, express or implied, with respect to the quality, reliability, accuracy, or freedom from error of this document or the products it describes. Certification Partners makes no representation or warranty with respect to the contents hereof and specifically disclaims any implied warranties of fitness for any particular purpose. Certification Partners disclaims all liability for any direct, indirect, incidental or consequential, special or exemplary damages resulting from the use of the information in this document or from the use of any products described in this document. Mention of any product or organization does not constitute an endorsement by Certification Partners of that product or corporation. Data used in examples and labs is intended to be fictional even if actual data is used or accessed. Any resemblance to, or use of real persons or organizations should be treated as entirely coincidental. Certification Partners makes every effort to ensure the accuracy of URLs referenced in all its material, but cannot guarantee that all URLs will be available throughout the life of a course. When this course was published, all URLs were checked for accuracy and completeness. However, due to the ever-changing nature of the Internet, some URLs may no longer be available or may have been redirected.
Copyright Information
This training manual is copyrighted and all rights are reserved by Certification Partners, LLC. No part of this publication may be reproduced, transmitted, stored in a retrieval system, modified, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise without written permission of Certification Partners, 1230 W. Washington Street, Suite 111, Tempe, AZ 85281.
Copyright 2011 by Certification Partners, LLC All Rights Reserved ISBN: 0-7423-2805-8
iv
Version 1.0
Table of Contents
Course Description...................................................................................................................... xiv Self-Study Courseware.................................................................................................................. xv Course Objectives....................................................................................................................... xvii Course Setup Guide and System Requirements ......................................................................... xviii Conventions and Graphics......................................................................................................... xxiii Lesson 1: Introduction to IT Business and Careers ...................................................................... 1-1 Pre-Assessment Questions ................................................................................................................ 1-3 Information Technology (IT) ............................................................................................................... 1-4 IT Job Roles ...................................................................................................................................... 1-4 IT Industry Career Opportunities..................................................................................................... 1-16 Technical Concepts and Training..................................................................................................... 1-22 Technology Adoption Models ........................................................................................................... 1-23 Business Modeling .......................................................................................................................... 1-25 Data Modeling ................................................................................................................................. 1-28 The Importance of Standards .......................................................................................................... 1-29 Case Study...................................................................................................................................... 1-31 Lesson 1 Review .............................................................................................................................. 1-34 Lesson 1 Supplemental Material...................................................................................................... 1-36 Lesson 2: Introduction to Internet Technology............................................................................ 2-1 Pre-Assessment Questions ................................................................................................................ 2-3 Internet Technology........................................................................................................................... 2-4 Overview of Networks ........................................................................................................................ 2-4 Overview of the Internet .................................................................................................................... 2-6 Connecting to the Internet............................................................................................................... 2-10 Internet Protocols ............................................................................................................................ 2-15 Domain Name System (DNS) ........................................................................................................... 2-19 Cloud Computing ............................................................................................................................ 2-24 Case Study...................................................................................................................................... 2-31 Lesson 2 Review .............................................................................................................................. 2-34 Lesson 2 Supplemental Material...................................................................................................... 2-35 Lesson 3: Web Browsing .............................................................................................................. 3-1 Pre-Assessment Questions ................................................................................................................ 3-3 Introduction to Web Browsing ........................................................................................................... 3-4 Basic Functions of Web Browsers ...................................................................................................... 3-4 Installing a Web Browser................................................................................................................... 3-4 Web Addresses .................................................................................................................................. 3-7 How Browsers Work ........................................................................................................................ 3-11 Browser Choices.............................................................................................................................. 3-16 Resources for Technical Data .......................................................................................................... 3-19 Browsing Techniques ...................................................................................................................... 3-24 Browser Elements ........................................................................................................................... 3-28 Configuring Web Browser Preferences.............................................................................................. 3-29 Cookies ........................................................................................................................................... 3-40 Configuring Browser Security .......................................................................................................... 3-45 Proxy Servers .................................................................................................................................. 3-49 Google Chrome................................................................................................................................ 3-51 Troubleshooting Internet Client Problems ........................................................................................ 3-55 Browsers in the Business World ...................................................................................................... 3-56 Case Study...................................................................................................................................... 3-65 Lesson 3 Review .............................................................................................................................. 3-68 Lesson 3 Supplemental Material...................................................................................................... 3-69 Lesson 4: Multimedia on the Web ................................................................................................ 4-1 Pre-Assessment Questions ................................................................................................................ 4-2 Introduction to Multimedia on the Web ............................................................................................. 4-3 Objects, Active Content and Languages ............................................................................................. 4-3 Objects and Security Issues .............................................................................................................. 4-6
Version 1.0
vi
Introduction to Plug-in Technology .................................................................................................... 4-6 Data Compression and Decompression.............................................................................................. 4-8 Plug-in Installation............................................................................................................................ 4-9 Types of Plug-ins ............................................................................................................................... 4-9 Firefox Add-Ons .............................................................................................................................. 4-18 Types of Viewers.............................................................................................................................. 4-21 Miscellaneous File Formats ............................................................................................................. 4-23 Downloading Files with a Browser ................................................................................................... 4-28 Case Study...................................................................................................................................... 4-30 Lesson 4 Review .............................................................................................................................. 4-32 Lesson 4 Supplemental Material...................................................................................................... 4-33 Lesson 5: Databases and Web Search Engines .............................................................................. 5-1 Pre-Assessment Questions ................................................................................................................ 5-3 Introduction to Data Searching Tools ................................................................................................ 5-4 Overview of Databases....................................................................................................................... 5-4 Introduction to Web Search Engines.................................................................................................. 5-9 Registering a Web Site with a Search Engine ................................................................................... 5-10 Types of Web Searches .................................................................................................................... 5-11 Basic Web Searching Techniques .................................................................................................... 5-14 Boolean Operators........................................................................................................................... 5-18 Advanced Web Searching Techniques .............................................................................................. 5-21 Using Web Searches to Perform Job Tasks ...................................................................................... 5-23 Unexpected Web Search Results...................................................................................................... 5-24 Web Search Strategies..................................................................................................................... 5-26 Evaluating Resources ...................................................................................................................... 5-28 Organizing Internet Research .......................................................................................................... 5-34 Citing Copyrighted Online Resources............................................................................................... 5-37 Case Study...................................................................................................................................... 5-39 Lesson 5 Review .............................................................................................................................. 5-41 Lesson 5 Supplemental Material...................................................................................................... 5-42 Lesson 6: E-Mail and Personal Information Management ............................................................. 6-1 Pre-Assessment Questions ................................................................................................................ 6-3 Introduction to Electronic Mail (E-Mail) ............................................................................................. 6-4 How E-Mail Works............................................................................................................................. 6-4 E-Mail Configuration Requirements................................................................................................... 6-9 E-Mail Message Components ........................................................................................................... 6-16 Creating and Sending E-Mail Messages ........................................................................................... 6-17 Receiving and Viewing E-Mail Messages .......................................................................................... 6-23 E-Mail in the Workplace .................................................................................................................. 6-26 E-Mail Problems and Solutions........................................................................................................ 6-33 Personal Information Management (PIM).......................................................................................... 6-38 Case Study...................................................................................................................................... 6-41 Lesson 6 Review .............................................................................................................................. 6-43 Lesson 6 Supplemental Material...................................................................................................... 6-44 Lesson 7: Internet Services and Tools ......................................................................................... 7-1 Pre-Assessment Questions ................................................................................................................ 7-3 Internet Resource Tools ..................................................................................................................... 7-4 Newsgroups....................................................................................................................................... 7-4 List Servers and Listserve Groups ..................................................................................................... 7-5 Telnet................................................................................................................................................ 7-8 File Transfer Protocol (FTP).............................................................................................................. 7-11 Managing Downloaded Files ............................................................................................................ 7-21 Virtual Network Computing (VNC) and Microsoft Terminal Services ................................................. 7-25 Peer-to-Peer Networks ..................................................................................................................... 7-29 Lightweight Directory Access Protocol (LDAP) .................................................................................. 7-31 Concurrent Versions System (CVS).................................................................................................. 7-31 Troubleshooting Using TCP/IP Tools ............................................................................................... 7-32 Universal Development Models ........................................................................................................ 7-33 Open-Source Development .............................................................................................................. 7-36
Version 1.0
vii
Proprietary Software and EULAs...................................................................................................... 7-38 Software Patents ............................................................................................................................. 7-39 Case Study...................................................................................................................................... 7-41 Lesson 7 Review .............................................................................................................................. 7-44 Lesson 7 Supplemental Material...................................................................................................... 7-45 Lesson 8: Internet Communication ............................................................................................. 8-1 Pre-Assessment Questions ................................................................................................................ 8-2 Communicating via the Internet ........................................................................................................ 8-3 Modern Web Technologies ................................................................................................................. 8-3 Social Networking.............................................................................................................................. 8-9 Messaging ....................................................................................................................................... 8-12 Blogging .......................................................................................................................................... 8-23 Communicating Effectively over the Internet.................................................................................... 8-28 Convergence and Unified Communications Technologies ................................................................. 8-31 Case Study...................................................................................................................................... 8-35 Lesson 8 Review .............................................................................................................................. 8-38 Lesson 8 Supplemental Material...................................................................................................... 8-39 Lesson 9: Internet Security ......................................................................................................... 9-1 Pre-Assessment Questions ................................................................................................................ 9-2 Introduction to Internet Security ....................................................................................................... 9-3 Encryption ........................................................................................................................................ 9-3 Authentication .................................................................................................................................. 9-6 Firewalls ........................................................................................................................................... 9-6 Malware (Malicious Software) .......................................................................................................... 9-10 Virus Detection and Prevention ....................................................................................................... 9-13 Spyware .......................................................................................................................................... 9-16 Updates and Patches....................................................................................................................... 9-19 Screen Savers.................................................................................................................................. 9-20 Security-Related Ethical and Legal Issues........................................................................................ 9-22 Typosquatting ................................................................................................................................. 9-27 Case Study...................................................................................................................................... 9-28 Lesson 9 Review .............................................................................................................................. 9-30 Lesson 9 Supplemental Material...................................................................................................... 9-31 Lesson 10: IT Project and Program Management........................................................................ 10-1 Pre-Assessment Questions .............................................................................................................. 10-3 Overview of IT Project and Program Management............................................................................. 10-4 Project Management Fundamentals................................................................................................. 10-4 Project Management Skills .............................................................................................................. 10-5 Project Management Phases ............................................................................................................ 10-7 The Project Triangle....................................................................................................................... 10-12 Project Management Software........................................................................................................ 10-13 Creating Project Schedules ............................................................................................................ 10-14 Documenting Projects ................................................................................................................... 10-18 Planning and Scheduling Meetings ................................................................................................ 10-19 Reviewing Projects......................................................................................................................... 10-20 Quality Assurance ......................................................................................................................... 10-20 Business Implications of IT Projects .............................................................................................. 10-22 Project Management Institute (PMI) ............................................................................................... 10-25 Program Management Concepts .................................................................................................... 10-26 Case Study.................................................................................................................................... 10-28 Lesson 10 Review .......................................................................................................................... 10-31 Lesson 10 Supplemental Material.................................................................................................. 10-32 Appendixes ................................................................................................................. Appendixes-1 Web Foundations Glossary................................................................................................ Glossary-1 Index ................................................................................................................................... Index-1 Supplemental Files Contents.............................................................Supplemental Files Contents-1
Version 1.0
viii
List of Labs
Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab 1-1: Exploring basic Web site design concepts ................................................................................ 1-6 1-2: Using Internet technology to conduct job searches ................................................................ 1-18 1-3: Creating a plain-text rsum ................................................................................................. 1-20 1-4: Creating an RTF rsum ....................................................................................................... 1-21 2-1: Sampling current and historic Web site designs ...................................................................... 2-9 2-2: Using Internet protocols in Mozilla Firefox............................................................................. 2-22 2-3: Exploring Google's cloud-computing capabilities ................................................................... 2-27 3-1: Installing the Firefox 3.0 browser ............................................................................................ 3-5 3-2: Browsing Web pages using various browsers ........................................................................... 3-9 3-3: Viewing the default Firefox 3.0 protocols ............................................................................... 3-15 3-4: Accessing statistics, and accessing secure and non-secure Web pages .................................. 3-19 3-5: Reviewing Web trends ........................................................................................................... 3-23 3-6: Using browser features to enhance your browsing experience................................................ 3-26 3-7: Configuring font size in Mozilla Firefox .................................................................................. 3-31 3-8: Setting a browser home page in Mozilla Firefox ..................................................................... 3-32 3-9: Managing the History folder in Mozilla Firefox ....................................................................... 3-33 3-10: Configuring the browser cache in Mozilla Firefox ................................................................. 3-38 3-11: Controlling image loading in Mozilla Firefox......................................................................... 3-39 3-12: Controlling cookies in Mozilla Firefox .................................................................................. 3-44 3-13: Changing security settings in Mozilla Firefox ....................................................................... 3-48 3-14: Using Google Chrome.......................................................................................................... 3-53 3-15: Conducting a Web conference ............................................................................................. 3-59 3-16: Delivering Web feeds to your computer................................................................................ 3-63 4-1: Using Adobe Flash Player with Mozilla Firefox ....................................................................... 4-10 4-2: Using the RealPlayer plug-in with Mozilla Firefox .................................................................. 4-13 4-3: Using the Apple QuickTime plug-in with Mozilla Firefox ........................................................ 4-15 4-4: Using the Windows Media Player plug-in with Mozilla Firefox ................................................ 4-16 4-5: Using Firefox add-ons ........................................................................................................... 4-18 4-6: Installing and using Adobe Reader with Mozilla Firefox ......................................................... 4-21 4-7: Viewing Ogg Vorbis files in Windows Media Player................................................................. 4-25 4-8: Downloading and storing Web site content using Mozilla Firefox ........................................... 4-29 5-1: Performing a directory search using Yahoo! ........................................................................... 5-15 5-2: Performing a keyword search using AltaVista ........................................................................ 5-17 5-3: Using the plus sign (+) and minus sign (-) operators in AltaVista ........................................... 5-20 5-4: Performing an advanced search in AltaVista .......................................................................... 5-22 5-5: Using the Internet to perform job tasks ................................................................................. 5-23 5-6: Reviewing Web search tips and tricks.................................................................................... 5-25 5-7: Using unusual search tricks and browsing techniques .......................................................... 5-27 5-8: Evaluating Internet resources ............................................................................................... 5-32 5-9: Organizing Internet research using Zotero............................................................................. 5-35 6-1: Configuring Thunderbird as your e-mail client ...................................................................... 6-12 6-2: Configuring a Web-based e-mail account using Gmail ........................................................... 6-14 6-3: Creating and sending e-mail messages using Thunderbird .................................................... 6-18 6-4: Creating and sending e-mail messages using Gmail .............................................................. 6-19 6-5: Creating e-mail signatures in Thunderbird and Gmail ........................................................... 6-20 6-6: Attaching files to e-mail messages ......................................................................................... 6-22 6-7: Receiving and viewing e-mail messages ................................................................................. 6-25 6-8: Setting up a spam filter in Thunderbird ................................................................................ 6-35 7-1: Exploring LISTSERV ............................................................................................................... 7-6 7-2: Exploring Topica ..................................................................................................................... 7-7 7-3: Accessing a library database using Telnet ............................................................................... 7-8 7-4: Installing the FireFTP Firefox add-on as your FTP client ........................................................ 7-13 7-5: Downloading files using command-line FTP........................................................................... 7-14 7-6: Downloading files using the Firefox FTP client....................................................................... 7-16 7-7: Downloading files using FireFTP............................................................................................ 7-17 7-8: Uploading files to an FTP site using FireFTP .......................................................................... 7-19 7-9: Defining MIME types............................................................................................................. 7-22 7-10: Compressing and decompressing files using bzip2 and bunzip2 .......................................... 7-24 7-11: Using the TightVNC remote administration application........................................................ 7-26
Version 1.0
ix
Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab Lab
7-12: Using Remote Desktop Connection...................................................................................... 7-28 7-13: Using TCP/IP diagnostic tools ............................................................................................. 7-33 8-1: Using the Windows Live Messenger instant messaging client ................................................. 8-14 8-2: Sending text messages using Twitter ..................................................................................... 8-19 8-3: Using Windows Remote Assistance........................................................................................ 8-21 8-4: Creating a blog...................................................................................................................... 8-25 9-1: Viewing your desktop firewall settings ..................................................................................... 9-9 9-2: Installing and using spyware-detection software.................................................................... 9-17 9-3: Activating a screen saver....................................................................................................... 9-21 10-1: Installing the GanttProject project management tool.......................................................... 10-14 10-2: Creating a project schedule ............................................................................................... 10-15
List of Activities
Activity Activity Activity Activity Activity Activity Activity Activity Activity Activity Activity Activity Activity Activity Activity 1-1: Identifying Information Technology (IT) job roles .............................................................. 1-37 1-2: Diagramming a business ontology model ......................................................................... 1-38 2-1: Identifying direct Internet connection types ..................................................................... 2-36 2-2: Identifying Web sites based on domain name structure ................................................... 2-37 3-1: Defining browser terminology .......................................................................................... 3-70 4-1: Identifying computer languages ....................................................................................... 4-34 5-1: Identifying database components..................................................................................... 5-43 5-2: Identifying Boolean operator actions ................................................................................ 5-43 6-1: Defining e-mail terms and concepts................................................................................. 6-45 7-1: Choosing the right tool for the job.................................................................................... 7-46 8-1: Identifying Web 2.0 technologies...................................................................................... 8-40 9-1: Identifying security terms ................................................................................................ 9-32 9-2: Identifying types of viruses .............................................................................................. 9-33 10-1: Identifying project management phases ....................................................................... 10-33 10-2: Identifying PMBOK topics ............................................................................................ 10-34
Version 1.0
7-3: Exploring the Majordomo list server ........................................................................ 7-50 7-4: Exploring Yahoo! Groups ........................................................................................ 7-51 7-5: Downloading files using the Internet Explorer FTP client ......................................... 7-52 8-1: Using SMS to send and receive text messages ......................................................... 8-40 9-1: Uncovering typosquatters........................................................................................ 9-33 10-1: Using software to create a project schedule ......................................................... 10-35
List of Quizzes
Lesson Lesson Lesson Lesson Lesson Lesson Lesson Lesson Lesson Lesson 1 Quiz ..................................................................................................................................... 1-40 2 Quiz ..................................................................................................................................... 2-41 3 Quiz ..................................................................................................................................... 3-80 4 Quiz ..................................................................................................................................... 4-39 5 Quiz ..................................................................................................................................... 5-47 6 Quiz ..................................................................................................................................... 6-54 7 Quiz ..................................................................................................................................... 7-53 8 Quiz ..................................................................................................................................... 8-42 9 Quiz ..................................................................................................................................... 9-35 10 Quiz ................................................................................................................................. 10-37
List of Figures
Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure 1-1: Web site design plain Web page ...................................................................................... 1-5 1-2: Web site design more interesting Web page ..................................................................... 1-6 1-3: Viewing Web page for design qualities ................................................................................. 1-7 1-4: Inserting HTML code ........................................................................................................... 1-8 1-5: Improved Web page............................................................................................................. 1-8 1-6: Web site usage report........................................................................................................ 1-10 1-7: Monster home page........................................................................................................... 1-18 1-8: Typical business ontology model ....................................................................................... 1-26 2-1: Client/server model ............................................................................................................ 2-5 2-2: Multiple connections among servers.................................................................................... 2-6 2-3: Internet Archive's Wayback Machine page ........................................................................... 2-9 2-4: Typical domain name ........................................................................................................ 2-20 2-5: CIW Web site home page in Mozilla Firefox........................................................................ 2-22 2-6: Google Docs page .............................................................................................................. 2-27 2-7: Google Maps page ............................................................................................................. 2-28 2-8: iGoogle page ..................................................................................................................... 2-29 2-9: Personalized iGoogle page ................................................................................................. 2-29 OL2-1: Pandora home page ...................................................................................................... 2-39 OL2-2: Personalizing Pandora radio station .............................................................................. 2-40 3-1: Mozilla Firefox Setup Wizard ............................................................................................... 3-5 3-2: Firefox Setup Type screen ................................................................................................... 3-6 3-3: Firefox Import Settings and Data screen.............................................................................. 3-6 3-4: Typical Uniform Resource Locator (URL) ............................................................................. 3-7 3-5: CIW Certified home page ................................................................................................... 3-10 3-6: Options dialog box Firefox............................................................................................. 3-15 3-7: Default protocols Firefox ............................................................................................... 3-15 3-8: Safari Web browser interface............................................................................................. 3-17 3-9: Opera Web browser interface ............................................................................................ 3-18 3-10: Page Info dialog box non-secure page in Firefox........................................................... 3-20 3-11: Page Info dialog box secure page in Firefox.................................................................. 3-21 3-12: Certificate Viewer dialog box Firefox............................................................................ 3-21 3-13: Certificate dialog box secure page in Internet Explorer ................................................ 3-22 3-14: Google Zeitgeist home page ............................................................................................. 3-23 3-15: Mozilla Firefox Bookmarks .............................................................................................. 3-24 3-16: Microsoft Internet Explorer Favorites .............................................................................. 3-25 3-17: Add A Favorite dialog box................................................................................................ 3-26 3-18: Adding to Favorites ......................................................................................................... 3-26 3-19: Internet Options dialog box Microsoft Internet Explorer............................................... 3-30 3-20: Options dialog box Mozilla Firefox ............................................................................... 3-30
Version 1.0
xi
Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure
3-21: Fonts dialog box Mozilla Firefox .................................................................................. 3-31 3-22: Specifying home page in Firefox ...................................................................................... 3-32 3-23: History settings in Firefox ............................................................................................... 3-33 3-24: Clear Private Data dialog box .......................................................................................... 3-34 3-25: Options dialog box Content panel................................................................................ 3-35 3-26: Setting cache options Microsoft Internet Explorer........................................................ 3-36 3-27: Specifying cache settings in Firefox ................................................................................. 3-38 3-28: Controlling image loading in Firefox ................................................................................ 3-40 3-29: Controlling cookies Microsoft Internet Explorer ........................................................... 3-42 3-30: Controlling cookies Mozilla Firefox .............................................................................. 3-43 3-31: Cookies dialog box Mozilla Firefox ............................................................................... 3-44 3-32: Confirm Setting Cookie dialog box Mozilla Firefox ....................................................... 3-45 3-33: Internet Options dialog box Security tab ..................................................................... 3-46 3-34: Disabling JavaScript and Java Firefox......................................................................... 3-47 3-35: JavaScript active content ................................................................................................ 3-48 3-36: Connection Settings dialog box Firefox ........................................................................ 3-50 3-37: Internet Options dialog box, Connections tab Internet Explorer................................... 3-50 3-38: Local Area Network (LAN) Settings dialog box Internet Explorer................................... 3-51 3-39: Google Chrome window................................................................................................... 3-53 3-40: Google Chrome comic book ............................................................................................. 3-54 3-41: Cookies dialog box Google Chrome .............................................................................. 3-55 3-42: CIW Community login page extranet .......................................................................... 3-57 3-43: Webinar session.............................................................................................................. 3-58 3-44: Dimdim Web Meeting interface........................................................................................ 3-60 3-45: Join Meeting form ........................................................................................................... 3-61 3-46: Feed subscription button ................................................................................................ 3-63 3-47: Preview of current feeds .................................................................................................. 3-64 3-48: Add Live Bookmark dialog box ........................................................................................ 3-64 OL3-1: Organize Favorites dialog box Internet Explorer ........................................................ 3-71 OL3-2: Library window showing bookmarks Firefox.............................................................. 3-72 OL3-3: Delete Browsing History dialog box Internet Explorer................................................ 3-74 OL3-4: Controlling image loading in Internet Explorer .............................................................. 3-76 OL3-5: Advanced Privacy Settings dialog box Internet Explorer ............................................ 3-77 OL3-6: Privacy Alert dialog box Internet Explorer ................................................................. 3-78 OL3-7: High safety level Internet Explorer ............................................................................ 3-79 4-1: Embedded RealPlayer video................................................................................................. 4-8 4-2: Adobe Downloads page Firefox...................................................................................... 4-11 4-3: Installing Adobe Flash Player in Firefox............................................................................. 4-11 4-4: Downloads window ........................................................................................................... 4-11 4-5: QTVR sequence................................................................................................................. 4-14 4-6: iTunes window.................................................................................................................. 4-15 4-7: Specifying where to open movie clip .................................................................................. 4-16 4-8: Windows Media Player window.......................................................................................... 4-17 4-9: Add-ons page Firefox .................................................................................................... 4-18 4-10: Web page with blocked Flash content.............................................................................. 4-19 4-11: Add-ons Firefox .......................................................................................................... 4-20 4-12: PDF file in Adobe Reader Firefox ................................................................................. 4-22 4-13: Vorbis.com's music page ................................................................................................. 4-25 4-14: Playing Ogg Vorbis track ................................................................................................. 4-26 4-15: Save As dialog box .......................................................................................................... 4-29 4-16: Save Image dialog box ..................................................................................................... 4-29 OL4-1: PDF file in Adobe Reader Internet Explorer ............................................................... 4-36 OL4-2: Save Webpage dialog box Internet Explorer............................................................... 4-37 OL4-3: Save Picture dialog box Internet Explorer.................................................................. 4-37 OL4-4: Save A Copy dialog box Internet Explorer.................................................................. 4-37 5-1: Sample database table ........................................................................................................ 5-4 5-2: Sample relational database ................................................................................................. 5-5 5-3: Related tables ..................................................................................................................... 5-5 5-4: One-to-many database table relationship ............................................................................ 5-7 5-5: Many-to-many database table relationship.......................................................................... 5-7 5-6: Yahoo! keyword search field .............................................................................................. 5-12
Version 1.0
xii
Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure
5-7: Yahoo! static directory ...................................................................................................... 5-13 5-8: AltaVista home page ......................................................................................................... 5-16 5-9: AltaVista Advanced Web Search page ................................................................................ 5-21 5-10: Google home page ........................................................................................................... 5-24 5-11: Google Image Search page............................................................................................... 5-28 5-12: YouTube home page........................................................................................................ 5-33 5-13 BBC News home page ...................................................................................................... 5-33 5-14: Zotero window ................................................................................................................ 5-35 5-15: Zotero window with collection ......................................................................................... 5-36 OL5-1: Excite home page ......................................................................................................... 5-44 OL5-2: Lycos home page .......................................................................................................... 5-45 6-1: Windows Mail Properties dialog box General tab ........................................................... 6-10 6-2: Windows Mail Properties dialog box Servers tab ............................................................ 6-10 6-3: Thunderbird Account Wizard Identity screen................................................................. 6-11 6-4: Thunderbird Account Wizard Server Information screen................................................ 6-11 6-5: Setting up Mozilla Thunderbird as your e-mail client......................................................... 6-12 6-6: Thunderbird Inbox............................................................................................................ 6-13 6-7: Gmail Inbox window ......................................................................................................... 6-16 6-8: Creating message in Thunderbird ..................................................................................... 6-18 6-9: Creating message in Gmail................................................................................................ 6-19 6-10: Thunderbird window sections ......................................................................................... 6-24 6-11: Unprofessional e-mail in business setting ....................................................................... 6-30 6-12: Professional e-mail in business setting ............................................................................ 6-30 6-13: Filter Rules dialog box..................................................................................................... 6-35 6-14: Setting up spam filter...................................................................................................... 6-36 6-15: PIM calendar entries in Aethera ...................................................................................... 6-38 6-16: PIM contact information in Aethera ................................................................................. 6-39 OL6-1: Microsoft Windows Mail main window........................................................................... 6-46 OL6-2: Configured e-mail account in Windows Mail ................................................................. 6-47 OL6-3: Windows Live Hotmail window ...................................................................................... 6-48 OL6-4: Adding contact ............................................................................................................. 6-50 OL6-5: Aethera 1.2.1 interface ................................................................................................. 6-53 7-1: L-Soft home page ................................................................................................................ 7-6 7-2: Topica home page ............................................................................................................... 7-7 7-3: Accessing library database using Telnet .............................................................................. 7-9 7-4: Sample SSH session ......................................................................................................... 7-10 7-5: Using command-line FTP .................................................................................................. 7-15 7-6: Using Mozilla Firefox FTP client ........................................................................................ 7-16 7-7: FireFTP window ................................................................................................................ 7-17 7-8: Using FireFTP to access FTP server ................................................................................... 7-18 7-9: WinSCP client ................................................................................................................... 7-20 7-10: File with undefined MIME type........................................................................................ 7-21 7-11: TightVNC Server Current User Properties dialog box ....................................................... 7-26 7-12: New TightVNC Connection dialog box .............................................................................. 7-27 7-13: VNC display on client computer ...................................................................................... 7-27 7-14: Remote Desktop Connection dialog box ........................................................................... 7-28 7-15: Using TCP/IP diagnostic tools ......................................................................................... 7-33 OL7-1: Subscribe dialog box Thunderbird ............................................................................ 7-47 OL7-2: Newsgroup Subscriptions dialog box Windows Mail .................................................. 7-49 OL7-3: Majordomo home page.................................................................................................. 7-50 OL7-4: Yahoo! Groups home page ............................................................................................ 7-51 OL7-5: Internet Explorer FTP client in Windows Explorer ......................................................... 7-52 8-1: Meebo home page ............................................................................................................... 8-5 8-2: Wikipedia home page .......................................................................................................... 8-6 8-3: Signing in to Windows Live Messenger .............................................................................. 8-14 8-4: Adding Windows Live Messenger contact........................................................................... 8-15 8-5: Windows Live Messenger window with contact .................................................................. 8-15 8-6: Windows Live Messenger conversation window.................................................................. 8-16 8-7: Finding lab partner on Twitter .......................................................................................... 8-19 8-8: Windows Remote Assistance ............................................................................................. 8-21 8-9: Waiting for incoming connection Windows Remote Assistance....................................... 8-21
Version 1.0
xiii
Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure
8-10: Compose window Blogger.com .................................................................................... 8-26 8-11: Posted blog entry in template .......................................................................................... 8-27 8-12: Posted comment entry..................................................................................................... 8-27 9-1: Web page personal information form ................................................................................... 9-3 9-2: Windows Firewall window ................................................................................................... 9-9 9-3: Windows Firewall Settings dialog box Exceptions list .................................................... 9-10 9-4: Ad-Aware spyware-detection application ........................................................................... 9-18 9-5: Detected spyware objects .................................................................................................. 9-18 9-6: Screen Saver Settings dialog box ....................................................................................... 9-21 10-1: Organizational structure project team members ........................................................ 10-11 10-2: Sample Gantt chart....................................................................................................... 10-14 10-3: GanttProject window ..................................................................................................... 10-15 10-4: GanttProject Properties dialog box for task .................................................................... 10-16 10-5: Task list and Gantt chart .............................................................................................. 10-17 OL10-1: Task list and Gantt chart final .............................................................................. 10-36
List of Tables
Table Table Table Table Table Table Table Table Table Table Table Table Table Table Table Table Table 1-1: 1-2: 2-1: 2-2: 3-1: 3-2: 3-3: 5-1: 5-2: 6-1: 6-2: 7-1: 7-2: 7-3: 7-4: 8-1: 9-1: Ontology terms................................................................................................................... 1-26 Business ontology model objects......................................................................................... 1-27 Common speeds for direct Internet connections.................................................................. 2-14 Installed vs. cloud-computing-based services...................................................................... 2-24 Elements of Web browser ................................................................................................... 3-28 Internet Explorer Privacy level effects on cookies ................................................................ 3-42 Cookie handling options Firefox...................................................................................... 3-43 Types of Web searches........................................................................................................ 5-12 Boolean operators .............................................................................................................. 5-19 E-mail message components............................................................................................... 6-16 E-mail response options ..................................................................................................... 6-26 SSH-based utilities............................................................................................................. 7-10 Popular file types found on FTP servers .............................................................................. 7-13 Compression applications and common file name extensions.............................................. 7-23 Open-source software development terms........................................................................... 7-36 SMS addresses for major U.S. cellular providers ................................................................. 8-17 Computer virus types ......................................................................................................... 9-11
Version 1.0
xiv
Course Description
Internet Business Associate prepares you to work effectively in today's business environment. In this course, you will learn about the tasks involved in various Information Technology (IT) job roles, and explore career opportunities in the IT industry. You will also learn about Internet connection methods, Internet protocols, the Domain Name System (DNS) and cloud computing. You will study the basic functions of Web browsers, the components of Web addresses, the use and control of cookies, and browser use in the business world. You will learn how browser plug-ins and add-ons can improve your Web-browsing experience, and you will use browsers to download and manage files. You will learn about databases as they relate to Web search engines, and you will use search engines to conduct basic and advanced Web searches. This course also teaches you to configure e-mail clients and use e-mail, and it provides guidelines for communicating effectively over the Internet using modern Web technologies and social networking tools. You will also learn about Internet research and collaboration tools, software development tools, and the patent and licensing practices that accompany software applications. You will learn about the risks associated with being connected to the Internet, and about the security measures that can keep your computer system and your personal information secure. Finally, you will study the fundamental elements of project and program management, and the importance of acquiring these skills for all IT job roles. All CIW Web Foundations courses offer Case Studies about real-world skills applications, and job-related topics such as project management, and the relationship between technology and business operations. The CIW Web Foundations courses prepare you to take the CIW Web Foundations Associate certification exam. Guided, step-by-step labs provide opportunities to practice new skills. You can challenge yourself and review your skills after each lesson in the Lesson Summary and Lesson Review sections. Additional skill reinforcement is provided in Activities, Optional Labs and Lesson Quizzes that are included in the coursebook and on CIW Online. The supplemental files on CIW Online contain the lab files used in the course. To practice the skills presented in the coursebook, refer to the Course Setup Guide And System Requirements section for information about system requirements and using the lab files.
Series
Internet Business Associate is the first course in the CIW Web Foundations series: Internet Business Associate Site Development Associate Network Technology Associate
Prerequisites
No prior experience using the Internet, developing Web pages or configuring networks is necessary. However, you should be familiar with an operating system such as Microsoft Windows Vista before taking this course. The CIW Web Foundations courseware does not provide entry-level computer literacy. Rather, it builds upon computer literacy training and certifications such as Microsoft Office Specialist (www.microsoft.com) and IC3 (www.certiport.com).
Version 1.0
xv
Certification
The CIW Web Foundations series of courses prepares you to take the high-stakes CIW Web Foundations Associate certification exam (1D0-510). If you pass the CIW Web Foundations Associate exam, you will earn the highly respected CIW Web Foundations Associate certification, which is recognized throughout the industry as validating essential Internet skills for the workplace. The CIW Web Foundations Associate certification proves that an individual has evolved from being an Internet consumer to an Internet producer, capable of producing real-world Internet applications. A CIW Web Foundations Associate certificant can use common Internet-ready applications, can create properly formed HTML/XHTML documents, knows database essentials, understands project management concepts and can troubleshoot networks. You also have the option to take any or all of the three modular CIW Associate exams, each of which earns you a modular subject certification if passed: Internet Business Associate (exam 1D0-51A) Site Development Associate (exam 1D0-51B) Network Technology Associate (exam 1D0-51C)
If you pass all three modular certification exams, you will also earn the comprehensive CIW Web Foundations Associate certification. For information about taking any CIW Associate exams, visit www.CIWcertified.com.
Target audience
All students preparing to enter or continue in the workforce can benefit from the CIW Internet Business Associate course and/or certification: High school students College students Technical/trade school students
Professionals in all industries can benefit from the CIW Internet Business Associate course and/or certification: IT professionals Healthcare professionals Legal professionals Marketing professionals Graphic artists Business professionals
Self-Study Courseware
This coursebook was developed for self-directed training. Along with comprehensive instructional text and objectives checklists, this coursebook provides easy-to-follow hands-on labs and a glossary of coursespecific terms. It also provides Internet addresses needed to complete some labs, although due to the constantly changing nature of the Internet, some addresses may no longer be valid. The coursebook also includes margin notes that provide additional tips and commentary to supplement course narrative, and that direct you to material relating directly to specified CIW Web Foundations Associate exam objectives. Each course lesson includes practice, study and assessment materials such as preview and review questions, Case Studies, Application Projects, pen-and-paper-based Activities, Optional Labs and Quizzes.
Version 1.0
xvi
The coursebook includes supplemental files needed to complete labs. These files are located on CIW Online. The supplemental files also include an appendix listing the CIW Web Foundations Associate certification exam objectives and locations of corresponding material in the coursebook. The supplemental files include all answers to Activities, Optional Labs and Lesson Quizzes. Lesson Quizzes are provided as study and self-assessment resources only; success on these materials in no way guarantees a passing score on the CIW Web Foundations Associate certification exam. After you have finished the course, you will find this coursebook to be a valuable resource for reviewing labs at home or in the workplace and applying the skills you have learned.
Online resources
You can visit CIW Online at http://education.certification-partners.com/ciw/ to access supplemental course materials and to get help in preparing for the CIW Web Foundations Associate certification exam. CIW Online provides a variety of online tools you can use to supplement the Official CIW Courseware,.
Version 1.0
xvii
CIW Movies
The CIW Internet Business Associate course offers movie files from LearnKey that discuss selected technology topics. To view the movies, log on to CIW Online at http://education.certificationpartners.com/ciw/. Use the access code provided to register for the movies and view them online. If you have any questions, please contact Product Support at (866) 370-3511 or [email protected]. Consider the following points about the CIW Movies: The movies provide supplementary instruction in a multimedia format, and enhance the coursebook narrative and labs. However, movie content does not comprehensively address CIW Internet Business Associate certification exam objectives and is not intended to replace coursebook content. The CIW Internet Business Associate coursebook includes a Movie Time appendix that indicates appropriate points at which to view the supplemental movies. Instructors in a classroom environment are strongly encouraged to present movies to the entire class using a computer screen projector. Group presentations enable instructors to present and discuss movie content when appropriate. Controlling the presentation of movies also minimizes distractions from course material and essential lecture or lab time. Students are strongly encouraged to watch the movie clips on their own if they are unable to view them in class. Each student is provided access to CIW Online to view the movies. The access code provided allows instructors and students to view the movies. Do not distribute the code to unauthorized users.
Course Objectives
After completing this course, you will be able to: Define Information Technology (IT) job roles, explore career opportunities in the IT industry, and effectively communicate technical information to non-technical audiences. Define technology adoption, business and data models, and identify the importance of standards. Define networks, the Internet, Internet connection methods, Internet protocols, the Domain Name System (DNS) and cloud computing. Identify the basic functions of Web browsers and the components of Web addresses, configure browser preferences and security, use and control cookies, extend browser functionality with plug-ins and add-ons, use browsers to download and manage files, and identify ways in which browsers are used in the business world to maintain intranets/extranets and to conduct training and conferences. Define and use multimedia. Define databases and database components, define Web search engines, and conduct Web searches using Boolean operators and advanced search techniques. Evaluate and organize information you retrieve from resources on the Internet. Install and configure e-mail clients, use e-mail effectively in the work environment, identify and resolve e-mail problems, and identify the functions of personal information management (PIM) software. Use news clients, listserve groups, Telnet, FTP, VNC and Microsoft Terminal Services, and troubleshoot Internet client issues using TCP/IP tools. Identify software development tools, compare proprietary software to open-source development, and explain the patent and licensing practices that accompany software programs and tools. Identify and use modern Web 2.0 technologies, such as Ajax, wikis, folksonomy, Web feeds, podcasts, semantic Web, mashups, social networking, instant messaging, text messaging and blogging.
Version 1.0
xviii
Apply guidelines for effective communication over the Internet, and identify unified communications technologies that seek to simplify and integrate all forms of communication. Identify topics related to Web security such as encryption, authentication, firewalls, malware, spyware, patches, updates and typosquatting. Identify ethical and legal issues related to Internet use, such as privacy concerns, copyright issues, licensing issues, trademark issues and encryption policies. Identify project and program management skills and phases, and discuss the business implications of IT decisions.
Hardware requirements
The following table summarizes the hardware requirements for all courses in the CIW program. Note: The CIW hardware requirements are similar to the minimum system requirements for Microsoft Windows Vista Business implementation.
Hardware Specifications
Processor L2 cache Hard disk RAM CD-RW Network interface card (NIC) Sound card/speakers Video adapter
Minimum Requirements
1 GHz 32-bit (x86) or 64-bit (x64) processor 256 KB 40 GB with at least 15 GB of available space At least 1 GB 32X 10BaseT or 100BaseTX (10 or 100 Mbps) Required for movie clips and labs that use sound Support for DirectX9 graphics with: WDDM Driver At least 128 MB of graphics memory Pixel Shader 2.0 in hardware 32 bits per pixel
Monitor
Software requirements
If you are taking all three CIW Web Foundations self-study courses sequentially, there is no need to reformat your computer for each course. The recommended software configurations for computers used to complete the labs in this book series are as follows.
Version 1.0
xix
To be installed during course labs: Firefox 3.0.5 (binary provided in the C:\CIW\Internet\Lab Files\Lesson03 folder) Google Chrome 1.0 (binary provided in the C:\CIW\Internet\Lab Files\Lesson03 folder) Ogg Codecs (binary provided in the C:\CIW\Internet\Lab Files\Lesson04 folder) Aethera (binary provided in the C:\CIW\Internet\Lab Files\Lesson06 folder) Thunderbird 2.0 (binary provided in the C:\CIW\Internet\Lab Files\Lesson06 folder) TightVNC, Bzip2 and Bunzip2 (binaries provided in the C:\CIW\Internet\Lab Files\Lesson07 folder) Audacity and Windows Live Messenger (binaries provided in the C:\CIW\Internet\Lab Files\Lesson08 folder) Ad-AwareAE (binary provided in the C:\CIW\Internet\Lab Files\Lesson09 folder) GanttProject (binary provided in the C:\CIW\Internet\Lab Files\Lesson10 folder)
To be installed during course labs: Lynx (binary provided in the C:\CIW\Site_Dev\Lab Files\Lesson01\Lab_1-2\Lynx folder) FormMail (binary provided in the C:\CIW\Site_Dev\Lab Files\Lesson07\FormMail folder) KompoZer (binary provided in the C:\CIW\Site_Dev\Lab Files\Lesson10 folder) Audacity (binary provided in the C:\CIW\Site_Dev\Lab Files\Lesson11 folder) XAMPP (binary provided in the C:\CIW\Site_Dev\Lab Files\Lesson11\Lab_11-1\XAMPP folder)
To be installed during course labs: uTorrent (binary provided in the C:\CIW\Network\Lab Files\Lesson01 folder) FileZilla_v3.0.2.1 (torrent file provided in the C:\CIW\Network\Lab Files\Lesson01 folder) 7-Zip (binary provided in the C:\CIW\Network\Lab Files\Lesson01 folder) FineCrypt 10.1 (binary provided in the C:\CIW\Network\Lab Files\Lesson05 folder)
Version 1.0
xx
that your system must be able to access the Internet in order for you to perform the hands-on labs in all CIW Web Foundations self-study courses. Note: If you have already installed Windows Vista Business and have Internet access, you can skip this section. The instructions for installing Windows Vista Business are as follows: 1. 2. 3. 4. 5. 6. Obtain a valid license for all copies of Windows Vista Business. Begin setup by setting the boot sequence for your computer so that it will boot from the CD drive, then insert the Windows Vista Business CD-ROM and reboot. When prompted, specify your installation language, time and currency format, and keyboard type. When prompted, enter your 25-digit product key. Accept the license terms. Specify to conduct a Custom (advanced) installation. Use the following parameters to perform a custom installation of Windows Vista Business. When This Information Is Required Use
Phase 1 Partition Location Partition Size Default (C:) Entire hard disk drive Phase 2 (after Windows formats and installs files to your hard disk drive) User Name Type Administrator Password Confirm Password Windows Protection Method Date, Time and Time Zone Settings Your name password (all lowercase letters) password (all lowercase letters) Specify: Use Recommended Settings Customize for your location
Configure Windows Vista Business for use in these courses by specifying the following settings:
Version 1.0
xxi
5.
Select Use The Following IP Address, then manually enter the IP address information specific to your system. You can use DHCP if you prefer; however, prepare the system for networking. Note: Do not enter DNS configurations; you will configure DNS during the labs.
6.
Click OK, then close all open dialog boxes and windows.
When you are finished configuring Windows Vista Business, verify that your system is working and that it can communicate with other systems on the Internet.
Enabling the Fast User Switching feature and creating user accounts
In the Internet Business Associate course, there are a number of labs in Lesson 6 that require multiple users in order to demonstrate e-mail features. Fast User Switching is a feature of Windows Vista that allows multiple users to share the same computer workstation by making it possible for you to switch among users without logging off the computer. For example, suppose you send an e-mail message to another user. You can use Fast User Switching to log off as the user who sent the e-mail message, and then log on as the user who received the message, without closing the programs you were running as the user who sent the e-mail message. Note: You must enable the Fast User Switching feature and add two new user accounts in order to complete the labs in Lesson 6 that require multiple users. By so doing, you can play the part of both users (the sender and the recipient) as you advance through the lab steps. Fast User Switching is enabled by default in Windows Vista. Complete the following steps to add two new user accounts. 1. 2. 3. Click Start, then right-click Computer and select Manage. The Computer Management window will appear. Expand Local Users And Groups, then right-click Users and select New User. The New User dialog box will appear. Type a name of your choice for the new account (such as User1) and specify a password that meets the following criteria: The password must be at least six characters long.
Version 1.0
xxii
4. 5. 6. 7. 8. 9.
The password must contain a combination of at least three of the following characters: uppercase letters, lowercase letters, numbers, or symbols (e.g., punctuation marks). The password cannot contain the user's user name or screen name.
Deselect User Must Change Password At Next Logon, then click Create. Repeat Steps 3 and 4 to create a new account for User2. Close the New User dialog box and the Computer Management window. Now, you will assign administrator privileges to the new user accounts. Select Start | Control Panel | User Accounts. Click the Manage Another Account link. Click User1, then click the Change The Account Type link. Click Administrator, then click Change Account Type. Click the Manage Another Account link, click User2, then repeat Step 8 to assign administrator privileges to User2. When you are finished, close the Control Panel window.
10. From the Windows Vista Desktop, click the Start button, then click the right arrow to the right of the lock icon in the lower-right corner of the Start menu window. Notice the Switch User option that appears at the top of the submenu. You use the Switch User option to specify the user account you want to use to log on to your computer. 11. Click the Switch User option. Notice that a screen appears displaying icons and names for all user accounts that have been assigned to your computer. 12. Click the icon that represents your user account (not one of the two new user accounts you just created) to log on to the system. You will use the two new user accounts in Lesson 6.
Connectivity requirements
Internet connectivity is required for this course. You will experience optimal performance with a dedicated Internet connection (e.g., a cable/DSL modem or a T1 line). However, you can complete the course using a slower connection (e.g., 56-Kbps modem).
Version 1.0
xxiii
Lab Text
Notations
The following graphics are used in this coursebook. Tech Notes point out exceptions or special circumstances that you may find when working with a particular procedure. Tech Notes that occur within a lab are displayed without the graphic.
The Movie Time graphic signals appropriate points in the course at which to view movie clips. All movie clips are 2011 LearnKey, Inc.
Each lesson summary includes an Application Project. This project is designed to provoke interest and apply the skills taught in the lesson to your daily activities. Each lesson concludes with a summary of the skills and objectives taught in that lesson. You can use the Skills Review checklist to evaluate what you have learned.
This graphic indicates a line of code that is completed on the following line.
Version 1.0
xxiv
Version 1.0
1-2
1.15.15: Identify the importance of quality management and assurance, including ISO 9000 standards. 1.20.1: Identify and explore career opportunities in the IT industry that relate to personal career goals. 1.20.2: Conduct job searches. 1.20.3: Use Internet technology to obtain employment, including employment sites and networking sites such as LinkedIn. 1.20.4: Create a rsum and place it in an appropriate file format (e.g., ASCII, HTML, RTF, PDF). 1.20.5: Determine the relevance and necessity of education as job roles, responsibilities and technologies change. 1.21.1: Communicate technical issues and concerns to an end user. 1.21.2: Demonstrate the value of IT-related expenses to management and stakeholders.
Version 1.0
1-3
Pre-Assessment Questions
1. In which job role does an individual determine the visibility of Web sites across multiple clients and search engines? a. b. c. d. 2. Web site analyst Network engineer SEO analyst Server administrator
In computer science and Web technology, what is ontology? a. b. c. d. The return-on-investment (ROI) impact of IT decisions on an organization's bottom line The tendancy for organizational and market changes to occur in a revolutionary manner The process of determining the requirements that a database must fulfill in order to function properly for an organization The study of how a particular part of a company, called a domain, is organized
3.
Why is it important for people who want jobs in the IT industry to have good communication skills?
Version 1.0
1-4
Information Technology (IT) refers to all aspects of managing and processing information using computers and computer networks. Because computers are vital to information management in all organizations and companies, most organizations have dedicated computer personnel referred to as IT departments. IT departments generally deal with computer, telecommunications, network and other related technologies and services to provide employees with the resources necessary to reach their organizations' goals. Information Technology is one of the fastest-growing career fields in the world today. IT skills are essential in all industries and are necessary in many different job roles.
IT Job Roles
The following sections will identify the various job roles in the IT industry, including the responsibilities, tasks and skills they encompass. As you will see, many of the responsibilities and skills overlap, so distinctions between job roles are not always precise.
Many of the job roles listed in this section are integral components of most organizations. However, many are outsourced to contractors in the United States or, increasingly, sent offshore to be performed by qualified personnel in developing countries. By incorporating business and project management skills into your skill set, you will make yourself more marketable for employment in the U.S. IT industry.
NOTE: Project management concepts and techniques will be presented extensively in a later lesson.
End users
Google The de facto standard for search engine sites (www.google.com). Facebook The premier social networking site on the Web (www.facebook. com). It enables individuals to communicate individually and connect as groups using various communications tools.
Even if you do not plan to become an IT professional, you still need to know how to use the various technologies found in the workplace. A deep knowledge of these technologies will help you excel as an employee. Knowing how IT works will help you use tools and applications more securely, as well. As you learn about various technologies and job roles, ask yourself how you can learn more about the technologies used in your company. Develop a sense of curiosity about them. As you confront a technology that is new to you, ask yourself a few questions: Where can I learn more about this technology? Who can help me learn more about this technology? How can I use this technology in a new, creative way?
Version 1.0
1-5
Twitter A social networking and blogging site that allows individuals to communicate via short messages (www.twitter.com).
Companies and Web sites such as Google, Facebook and Twitter all began with employees who took existing technologies and found ways to use them creatively. As a result, these individuals were able to create solutions and billion-dollar companies that benefit people every day. For example, the creators of Google took the already-existing practice of using search engines and applied methods to rank and qualify search results based on sophisticated criteria. Facebook's creators applied social-networking concepts and group-based communications and added games, chat and other features to create a compelling Web site. Twitter's creators simply combined social networking and short, text-based communications to create what has fast become a universal way to inform people about your latest activities. You will learn more about social networking in a later lesson.
Web site designers create the "look and feel" that visitors will see when they access a site on the World Wide Web. Web site designers determine the most effective site layouts, color schemes, navigational links and fonts to maintain visitor interest in the site. Site designers primarily establish the organization, mood and tone of the site relative to its content, with input from various parties. These parties include members of the marketing, sales and IT departments. In short, Web site designers are responsible for developing the user interface and aesthetics of a Web site, given input from those who know the companys audience and the company's technological abilities. Web site designers must understand Web development technology and be proficient in Web languages such as Hypertext Markup Language (HTML), CSS, JavaScript; graphics applications such as Flash, Silverlight, HTML5, Photoshop, Fireworks and the GIMP; and Web site development applications such as Adobe Dreamweaver and Microsoft Expression Web. They must also possess good communication, organizational and visual design skills. Web site designers work closely with other departments within organizations and with potential site viewers to determine the information and format that the site will present online. One example of a specific Web site designer job role is user interface designer. User interface designers ensure that a Web page meets the expectations of the end user, as well as the expectations of the business. A User interface designers also help ensure that a Web page meets cultural expectations; is accessible by people with disabilities; and works in various browsers, including those found on mobile devices (e.g., the iPhone and the Android). Figures 1-1 and 1-2 show two different designs for the same Web site. Figure 1-1 shows a Web page with rudimentary formatting applied. A Web site designer may look at this page, determine that the page will not effectively grab the attention of potential viewers, and change the formatting and color scheme to make the page more interesting, thereby increasing viewer awareness of and participation in the Web site.
Version 1.0
1-6
Figure 1-2 shows the same Web page with additional formatting applied. Notice that this Web page is more interesting and easier to read than the preceding Web page.
In the following lab, you will review basic Web site design concepts. Suppose you are the Web site designer for your company. Your project manager has asked you to prepare several prototypes of the Summer Youth Blitz Web page for Habitat For Humanity. What formatting attributes or images would you use to increase the page's visual appeal?
In this lab, you will modify an HTML page to make it more aesthetically pleasing and informative. 1. First, you will view the existing HTML page and consider ways to improve it. Open Windows Explorer and navigate to the C:\CIW\Internet\Lab Files\Lesson01 folder. Double-click the Lab_1-1 folder, then double-click Blitz.html. This step opens your default browser and displays the Web page shown in Figure 1-3. Note: If you want to display file name extensions in Windows Explorer, select Organize | Folder And Search Options, then click the View tab. Deselect Hide Extensions For Known File Types, click the Apply button, then click OK.
NOTE: This course assumes that the default browser is Mozilla Firefox. All screen captures that use the default browser will appear in Firefox.
2.
Version 1.0
1-7
Consider the following points about this Web page: The page provides a clear explanation of the Habitat For Humanity Summer Youth Blitz and offers a link to an application form. The page contains some graphical content, such as the side bar. The World Wide Web lends itself to graphical content. If you add the right image, you will better convey the page's message. An image can also increase the attractiveness of the page. What technologies are necessary to deliver this page? Consider the different parties that need to coordinate with each other in order for this to occur, including network engineers, server administrators, database administrators and designers.
Suppose that as a Web site designer, you have decided to add an image. Working with a graphic artist, you have created an image and want to insert this image into the page. 3. 4. 5. 6. 7. 8. Next, you will change the HTML file so that it is more aesthetically pleasing. Close your browser window. In Windows Explorer, double-click SYB.jpg to display the image that you will add to enhance the existing Web page. Close the image file. In Windows Explorer, right-click Blitz.html, then click Properties. The Properties dialog box will display. Verify that the Read-Only check box is deselected, then click OK. This step ensures that you will be able to edit the HTML file. In Windows Explorer, right-click Blitz.html, then click Open With | Notepad. This step opens the Notepad application. You will see the HTML code display in the Notepad window.
Version 1.0
1-8
9.
Scroll down approximately 90 percent of the file until you see the gap immediately before the following line: <P>Summer Youth Blitz is a unique service experience for a
NOTE: In Step 10, ensure that you type the HTML code on one line exactly as written.
10. In the white space two lines above the preceding text, type the following code: <img src="syb.jpg" width="300" height="222" border="0" alt="Do something real this summer - build a home for a family" /> Note: Ensure that the above code displays as a single line. The HTML code (including your newly inserted code) should match Figure 1-4.
11. Press
CTRL+S
12. Open Blitz.html in your Web browser. The modified Web page should appear as shown in Figure 1-5.
Version 1.0
1-9
NOTE: If you are using Microsoft Internet Explorer as your default browser, the pop-up box will appear. If you are using Mozilla Firefox, you will need to load the POPUP ALT add-on (Tools | Add-Ons) and restart Firefox in order for the pop-up box to appear. OBJECTIVE 1.1.3: Web architect vs. Web application developer Web application developer An individual who develops primarily server-side Web applications. Web architect An individual who creates the overview plan of a Web site's development.
13. Position the mouse pointer over the inserted graphic. Notice that a pop-up box with the text "Do something real this summer - build a home for a family" displays for several seconds. 14. Consider ways that adding this new image helps convey the message contained in this page's text. You have just helped enhance the design of this page. 15. Close the browser window. In this lab, you considered Web site design issues and modified a page. You now have a better understanding of the Web site designer job role.
OBJECTIVE 1.1.4: Web site analyst job role Web site analyst An individual who analyzes Web site statistics to determine the site's effectiveness.
Version 1.0
1-10
A Web site analyst will probably be called to examine the data further to see whether decreased traffic has translated into decreased profitability for the company. Data analysis also has technical uses. For example, you can review usage statistics to help the IT department plan for increases in Web activity that accompany concentrated marketing efforts. It may become necessary to obtain a larger server or plan for more bandwidth if Web traffic is anticipated to increase dramatically.
dead link A hyperlink that, when clicked, sends a Web site visitor to a page or resource that does not exist on the server.
Finally, an analyst may be asked to make technical changes to the site. Such changes may include modifying HTML, updating server-side scripts to eliminate errors, and finetuning database connectivity. One common activity of a Web site analyst is to look for evidence of locations at which visitors become confused, or get sent to missing pages, called dead links. One possible indicator of a dead link is the "404 Page Not Found" error, which you may see in a Web server log file. Regardless of the specific activities you undertake, if you are an effective Web site analyst, your Web site will operate more efficiently, from both a sales-and-marketing perspective and a technical perspective.
OBJECTIVE 1.1.5: Web site manager job role Web site manager An individual who manages a Web development team.
Version 1.0
1-11
OBJECTIVE 1.1.6: Database administrator job role database administrator An individual who is responsible for the maintenance and security of an organization's database resources and data.
Specializations
Database administrator is just one database-oriented job role. Other database specializations include: Database designers Individuals who plan the logical and physical database structure. This type of specialist is important because a poorly designed database will cause serious performance and data-retrieval problems. These problems have become very common in the IT industry. Database designers also analyze a company's business requirements to make sure that the database fulfills these requirements. Database engineers Specialists who build the physical architecture to create scalable database solutions. Database engineers make sure that different database servers can communicate with each other properly. They also know how to "distribute" databases, which means that multiple databases can act as one. These individuals also make sure that data is copied from one database to another properly, a process called replication. Database analysts Individuals who study the data carefully. They also provide analysis data to enhance database performance and ensure that the company databases are fulfilling business goals. Database security engineers Individuals tasked with ensuring that databases are being accessed only by properly authenticated users. Also includes those who understand how to recover data in case of a man-made or natural disaster. Business intelligence analysts Individuals who are experts at mining databases for information, then creating functional specification documents based on this data to help a business create solutions for its customers. These individuals manage data miners.
scalable The ability for a system to function well when its workload is increased or hardware is added to meet user need. replication The practice of copying data from one source, such as a database, to another.
Version 1.0
1-12
OBJECTIVE 1.1.7: Server administrator job roles server administrator An individual who manages and maintains network servers.
Server administrators
Server administrators are responsible for designing, implementing, managing and maintaining network servers, and associated applications and peripheral devices. Server administrators may also implement policies and procedures for ensuring the security and integrity of the servers and network, and protect the network from viruses and other intrusion threats, such as hacking. Other responsibilities include providing technical assistance and training to IT staff and system users, troubleshooting server and network problems, implementing cost-effective solutions, suggesting and implementing system improvements, and providing data backup services. Server administrators should be proficient in a variety of network operating systems and applications, such as Windows, UNIX/Linux, Microsoft Internet Information Services (IIS), Microsoft SQL Server and Microsoft Exchange. They should also be familiar with Web technologies such as HTML, Extensible Markup Language (XML) and File Transfer Protocol (FTP), and applications such as Adobe Dreamweaver. In addition to possessing strong technical skills, server administrators must display strong communication skills so they can distill complex server and network issues into understandable concepts upon which senior management can make decisions and users can take action. Communication skills also include project management skills, as you will learn later in this lesson. Server administrators can be classified into subcategories, such as Web server administrators or e-mail/groupware administrators. Web server administrators are responsible for servers that act as gateways between the organization and the Internet. Email/groupware administrators are responsible for network servers upon which e-mail clients and groupware (software that enables groups of people in a local area network [LAN] to organize their activities) are located. E-mail/groupware administrators install and maintain e-mail clients, develop and maintain security procedures to protect the integrity of electronic data transfers, and analyze and recommend improvements for e-mail utilization, capacity and performance.
OBJECTIVE 1.1.8: Network engineer job role network engineer An individual who manages and maintains a network infrastructure.
Network engineers
Network engineers focus on the design, implementation, delivery and support of network components, policies and procedures used by an organization. Network engineers are responsible for configuring and testing network devices, and setting up and maintaining the network infrastructure. Network engineers also analyze, design and implement networking technologies to better meet the needs of the organization and the network users. Network engineers support and maintain network devices such as Web servers, e-mail servers, routers, connecting cables and so forth. Network engineers may also be responsible for system security, data backup, disaster recovery planning and virus protection. Network engineers must be able to implement LANs and wide area networks (WANs), and be proficient in a variety of networking skills, such as routing and switching, network traffic analysis, and device configuration and testing. Network engineers must also be knowledgeable in a variety of network technologies and protocols, such as network communication media, Virtual Private Networks (VPNs), firewalls, Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6). Network engineers must also possess excellent communication skills to be able to present technical information in an understandable way to management, non-technical associates and customers.
NOTE: LANs, WANs, IPv4 and IPv6 will be presented later in this lesson.
Version 1.0
1-13
Security managers are responsible for managing the security measures used to protect electronic data. They maintain the software and procedures necessary to protect the confidentiality and integrity of information, and legitimate access to it. Security managers perform security risk assessments, prepare for disaster recovery, monitor security control systems to ensure that appropriate security clearances and information access levels are maintained, and work with other departments to maintain secure data and information flow. Security managers may also implement and document the organization's security policies and procedures, provide security training to management and employees, and monitor and recommend advancements in information security technologies. Security analysts/consultants are responsible for examining an organization's security requirements and determining the hardware, communications and software capabilities needed to satisfy the requirements. Security analysts/consultants may lead project teams that perform risk assessment, information security program development and implementation, network security architecture review and design, product reviews, and security solution deployments. In addition to the technical skills related to information security, security analysts/consultants should have strong project management, consulting and communication skills. They will often manage security-related projects, write technical reports understandable to non-technical readers and communicate recommendations to senior management. Security managers and analysts/consultants should possess knowledge of server operating systems (Windows, UNIX/Linux, etc.), firewall technology, virus-scanning software, security management software, security assessment software, intrusiondetection systems, VPNs, and so forth.
search engine optimization (SEO) The process of improving the volume and quality of traffic to a Web site by structuring content to improve search engine ranking. A specific activity of Internet marketing. SEO analyst An individual who determines the visibility of Web sites across multiple clients and search engines.
SEO analysts
Search engine optimization (SEO) is the process of improving the volume and quality of traffic to a Web site based on the relevance of the site to search terms entered into a search engine. Generally, the higher a site ranks (i.e., the earlier it appears in search engine results pages), the more searchers will visit that site. SEO analysts are responsible for performing keyword research to determine the visibility of Web sites across multiple clients and search engines. SEO analysts will often work with the marketing team to develop interactive marketing strategies to increase Web site visiblity.
Version 1.0
1-14
SEO analysts should have a basic knowledge of HTML, CSS, JavaScript and other programming languages; experience in keyword research; and familiarity with search engine ranking, traffic and analysis software. SEO analysts should also possess strong analysis and writing skills, as well as communication and teamwork skills. Analysts must be able to analyze and summarize data, and present anaytical reports.
OBJECTIVE 1.1.12: Web marketing manager job role Web marketing manager An individual who develops and implements plans to exploit the Internet for marketing and sales opportunities.
Blog managers
Blogging has become increasingly important to marketing a company, product or service. A well-run blog will discuss relevant topics. A blog manager has the following responsibilities: Publishing of articles in a timely manner. Ensuring that content is relevant. Enforcing quality control, including proper tone, grammar and spelling. Maintaining the blogging site or account. Coordinating writers to ensure that entries are made consistently. Archiving and organizing blog, audio and video entries so that content can be searched and retrieved for later use. Managing talent, because many bloggers feel a sense of celebrity and think they need not keep to a schedule. A blog manager should understand how to work with these types of personalities.
OBJECTIVE 1.1.10: PC repair technician job role PC repair technician An individual who installs, modifies and repairs personal computer (PC) hardware components. NOTE: Consider the A+ certification with respect to PC repair and help desk technicians.
PC repair technicians
Personal computer (PC) repair technicians install, modify and repair personal computer hardware components, such as PCs, disk drives, CD/DVD drives, tape devices, monitors, keyboards, data input devices and other peripheral equipment. PC repair technicians also install software, such as PC operating systems and application programs. PC technicians should be familiar with operating system and application program functionality in order to test and modify system functions to ensure proper performance. PC technicians need to possess communication skills in order to provide technical assistance and training to end users, answer user inquiries regarding PC operations, diagnose hardware problems, and provide solutions. In addition, PC technicians must be able to use standard shop tools, such as soldering equipment, power tools and hand tools. PC technicians also need to be aware of standard safety procedures associated with the repair and maintenance of electronic equipment.
Version 1.0
1-15
OBJECTIVE 1.1.11: Help desk technician job role help desk technician An individual who diagnoses and resolves users' technical hardware and software problems.
All IT workers must have some project management skills to excel at their positions and lead projects.
Version 1.0
1-16
Developing good listening skills to better understand processes, issues and so forth that may be communicated to you in various ways Developing good communication skills to better disseminate information to those with whom you work
IT refers to all aspects of managing and processing information using computers and computer networks. IT departments generally deal with computer, telecommunication, network and other related technologies and services to provide employees with the resources necessary to reach their organizations' goals. IT is one of the fastest-growing career fields in the world today. IT skills are essential in all industries and are necessary in many different job roles. The following sections will explore methods you can employ to conduct effective job searches, create rsums, and take advantage of educational degree programs and certifications to provide you with the skills, training and competitive advantage you need when searching for the IT job of your choice.
You can employ many methods to explore career opportunities in the IT (or any) industry, such as: Participating in on-campus interviews (if you are a college/university student). Searching the newspaper classified ads for jobs. Visiting employment agencies and employment placement services. Attending job or career fairs. Volunteering for positions related to your career interests. Seeking part-time work through temporary employment agencies or internships. Networking (socially) and gathering employment information from friends, acquaintances, business associates and association members. Working with an executive search firm. Mailing cover letters and rsums to targeted organizations. Applying in person directly to targeted employers. Entering rsums electronically in database placement services or posting them on appropriate Web sites. Using Internet technology to conduct job searches.
The traditional methods of seeking employment (for example, classified ads, job and career fairs, and so forth) are perhaps the most common but least effective means of gaining employment, especially when these methods are not combined with other methods. A combination of some or all of these methods would be the most effective way to conduct a job search. However, using Internet technology may be the most effective means of gathering information about different job roles and responsibilities, and conducting a job search.
Version 1.0
1-17
You can browse Usenet newsgroups using Google Groups (http://groups.google.com), and use a variety of search engines to search the Internet for information about career opportunities in the IT industry. By entering keywords to narrow your search to specific job types, you can retrieve available job listings that relate to your personal career goals. The following sites (and many others) provide information about careers and contain thousands of job listings: Guru.com (www.guru.com) Excite Careers (http://jobs.excite.com) Yahoo! HotJobs (http://hotjobs.yahoo.com) GoFreelance (www.gofreelance.com) Freelance Switch Job Listings (http://jobs.freelanceswitch.com) All Freelance Directory (www.allfreelance.com) Sologig (www.sologig.com) Monster (www.monster.com) CollegeRecruiter.com (www.collegerecruiter.com) The Wall Street Journal's CareerJournal (http://cj.careers.adicio.com/careers/jobsearch/results) Payscale (www.payscale.com) CareerBuilder.com (www.careerbuilder.com)
Version 1.0
1-18
3.
Click in the Search Jobs text box, type network engineer, then press ENTER. This step accesses the Job Search Results page and retrieves all job listings containing the specified keywords in the job descriptions. Click several hyperlinks and view the job descriptions and requirements. Click the Back button in the toolbar to return to the search results page after viewing each hyperlink. In the More Options section on the right side of the page, click the Related Job Titles link, then click Network Administrator. This step retrieves all job listings containing these new keywords in the job descriptions. Click several hyperlinks and view the job descriptions and requirements. Do you notice any major differences between the job roles and responsibilities of a network engineer versus those of a network administrator? Enter keywords that describe a career in which you are interested, then click several hyperlinked results to obtain information about each position. Close the browser.
4.
5.
6.
7. 8.
Version 1.0
1-19
As you can see, Internet search engines provide a wealth of information about every career path imaginable. Make sure you use appropriate keyword search techniques to help narrow your job search to specific locations and companies, if desired. You should always conduct your job searches using multiple search engines. Different search engines may yield different results for the same search string.
Creating a rsum
OBJECTIVE 1.20.4: Rsum file formats
You can use various file formats when you create your job skills and work history rsum. Your choice will depend on the way in which you want to deliver your rsum. You can create rsums for delivery in hard copy (print) or electronic format.
Formatting a rsum
Formatted rsums are typically created using a word-processing program such as Microsoft Word and OpenOffice Writer. You can create and print visually impressive rsums using a word-processing program; the full range of the software's formatting features are available to you. You would normally create formatted rsums if you intend to send printed copies to prospective employers by way of postal mail, fax, hand delivery or e-mail attachment. However, potential problems can occur when sending formatted rsums as e-mail attachments, as follows: Unless the recipient has the same program you used to create the rsum, he or she may not be able to view it electronically. The rsum's formatting may render inconsistently on different computers. Rsums sent as e-mail attachments are vulnerable to viruses, which may infect the recipient's computer.
Text format
Text rsums (also known as plain-text or ASCII rsums) are intended to be entered into keyword-searchable rsum databases and applicant tracking systems used by most large employers. Text rsums contain little formatting and are not necessarily designed to be visually impressive. However, they are not vulnerable to viruses and can be read by many different programs on many different platforms. Text rsums can be used to post directly to job boards, or to paste into the body of an e-mail message. To create a text rsum, you can use Windows Notepad or any word-processing program as long as you save the document as a plain-text file with the .txt file name extension.
Rich Text Format (RTF) rsums combine the best qualities of formatted and text rsums. RTF rsums allow you to incorporate most formatting techniques to make your rsum visually appealing, but can also be read by numerous programs on many different platforms. RTF rsums are also far less vulnerable to viruses than formatted documents you create with a word-processing program. An RTF rsum is the best choice if you intend to send your rsum as an e-mail attachment and you do not know the file type that your recipient prefers. However, you should also paste a plain-text version of your rsum in the body of the e-mail message as a precautionary measure in case the recipient cannot read the RTF version.
Version 1.0
1-20
You can use Windows WordPad to create an RTF rsum, or you can use any wordprocessing program to create it as long as you save the document as an RTF file with the .rtf file name extension.
A PDF rsum (or a rsum converted into PDF) looks identical to and retains all the formatting of the original document. PDF documents retain their visual appeal and will render consistently on different computers. However, the recipient must have Adobe Acrobat Reader software to open and read a PDF document.
HTML
HTML rsums are generally created to post as Web pages or, in some cases, to send as HTML-based e-mails. (However, consider that many people do not appreciate HTMLbased e-mails and prefer text-only format with appropriate attachments.) HTML, or "Webready," rsums are useful if you have your own Web site or have access to Web space. Some Web sites offer free Web-space hosting and your ISP may include a Web-space hosting service. HTML documents use the .htm or .html file name extension. HTML rsums retain all the formatting characteristics of a word-processing document, although the attributes may render inconsistently in different browsers. However, HTML rsums posted on the Web have several unique advantages over other rsum formats, as follows: Employers can access your rsum at any time. Employers may discover your rsum when they perform keyword searches. You can add links to your rsum that point employers to other documents, graphics and photographs that further illustrate your background and skills.
In the following lab, you will learn how to create a rsum and save it in plain-text format. Assume you have conducted an online job search and have found a job listing that interests you. To apply for this job, you must submit a rsum and a cover letter by e-mail. The employer enters all rsums into an applicant tracking system. In this case, what are the advantages of submitting a plain-text rsum?
Version 1.0
1-21
4. 5. 6. 7. 8. 9.
Use the options in the Font dialog box to apply different text-formatting attributes to the lines of text. When you are finished, click OK to close the Font dialog box. Select File | Save As to display the Save As dialog box. Ensure that Desktop displays in the Search field. Display the Save As Type drop-down list. Notice that the only option is to save the document as a text file with the .txt file name extension. Specify a name for your file in the File Name text box, such as My Resume, and click the Save button to save the document to your Desktop. Close the Notepad window.
10. Delete the file from your Desktop. In the following lab, you will learn how to create a rsum and save it as an RTF file. Assume you have conducted a new online job search and have found several job listings that interest you. To apply for these jobs, you must submit a rsum and a cover letter by e-mail. Several companies have requested a formatted rsum, but you do not know the type of word-processing software these companies use. In this situation, what are the advantages of submitted rsums as RTF files?
7.
8. 9.
10. Click Yes to save the file as a text document, then close the WordPad window.
Version 1.0
1-22
11. On your Desktop, open the text document you just created. Notice that most of the formatting attributes you applied have been removed. 12. Delete the two files you just created from your Desktop.
As technology becomes more sophisticated and complex, employers will demand a high level of technical expertise. If you have a bachelor's or advanced degree in computer science, computer engineering, management information systems or an equivalent field, your prospects for employment in the IT industry should be favorable. However, employers are seeking professionals who can also demonstrate competence in interpersonal, business and project management skills because these skills are becoming more important in the workplace. Because IT technologies change so rapidly, continual study is necessary to keep your skills current. Colleges, universities, employers, hardware and software vendors, and private training institutions offer continuing education so that you can remain up-to-date with current technological advances. You can demonstrate a level of competence or expertise in specific IT fields by obtaining a technical or professional certification (for example, CIW, A+, Network+ or Security+). Certified individuals, particularly in the IT field, are widely sought, and professional certifications provide you with a competitive advantage when pursuing numerous jobs.
NOTE: Think of people you know who have very few or no skills with computers. How would you guide these people through a technical process?
If you are a help desk technician, or are performing a similar job role, you must be able to understand the problems and concerns of end users as they work with computer systems they may not understand. Typically, when end users experience a technical problem, they may not know enough about what they are experiencing to be able to explain the problem accurately. You should be able to understand the information that end users provide and to understand the technical aspects of the problem. Your understanding of these aspects will allow you to provide an appropriate solution. You must also be able to communicate a technical response or concept in terms that end users can understand so that they can implement your solution. For example, a remote end user may call you to report that he cannot access the Internet on his computer. If the domain, IP address or subnet mask has changed, for example, you may need to instruct the user how to make the appropriate changes on his system.
Version 1.0
1-23
As an IT professional, you must always keep in mind the Return-on-Investment (ROI) impact of IT decisions on an organization's bottom line. One of the critical questions to address before implementing a plan is to determine the benefit of purchasing hardware or software, or creating a particular product or service. Upper management will probably require you to justify the decision's benefits relative to its costs. You must be able to determine the risk and business value of each decision in order to justify purchases or plans. Frequently, you must balance these purchases or plans against other purchases and plans that you may need to abandon. In most cases, the upper-level managers you may need to convince will not have the same level of technical expertise in computers and computer networks as you do. When presenting technically complex information to a non-technical audience, you must be able to put the information in terms that your managers can understand so that they can make informed decisions. For example, suppose the IT department determines that system hardware upgrades are required to implement a company intranet. You will need to provide data that shows that the expected hardware costs, system down time and employee learning curve will yield measurable increases in productivity and sales, based on the increased ability to communicate and to secure information from outside attacks. Your understanding of networking technologies will help you communicate these concerns, and may help your company profit in the future.
Organizations and products evolve over time to address the needs of the marketplace by incorporating new techniques and processes that are sometimes considered revolutionary. The following sections introduce three schools of thought that describe this tendency for organizational and market changes to occur in a revolutionary manner: Paradigm shifts Moore's Law Technology adoption life cycle
All three of these concepts bring about "shifts in thinking" about a particular subject or discipline. During such a shift, the accepted beliefs are questioned or discarded, and new ideas or world views take their place.
Paradigm shift
NOTE: Kuhn's concept of "paradigm shift" is presented in his 1962 book "The Structure of Scientific Revolutions."
In 1962, Thomas Kuhn defined and popularized the concept of a "paradigm shift" in reference to the philosopy of science. A paradigm is a common belief in a theory and its principles. A paradigm shift is a change from one way of thinking to another; it is a revolutionary transformation that is driven by agents of change. According to Kuhn, scientific advancement is not evolutionary, but rather is a "series of peaceful interludes punctuated by intellectually violent revolutions," and in those revolutions "one conceptual world view is replaced by another." When a paradigm shift occurs, an intellectual "battle" frequently takes place between those who adopt the new paradigm and those who cling to the old paradigm.
Version 1.0
1-24
Because the term "paradigm shift" represents the idea of a major change in the former way of thinking or organizing, the term is now used in non-scientific contexts, such as in personal beliefs, complex systems, software/hardware development or business organizations.
Moore's Law
In 1965, Intel co-founder Gordon E. Moore postulated that the number of transistors per square inch on integrated circuits will double every two years. This prediction is known as Moore's Law. Moore's Law continues to hold true for almost every measure of the capabilities of digital electronic devices, including computer processing speed, memory capacity and so forth. As such, Moore's Law is often used as an analogy for advances in other technologies, such as software applications, the Internet and so forth.
Diffusion of innovation
Closely related to the technology adoption life cycle is the "diffusion of innovation" theory, which describes how, why and at what rate new ideas and technologies spread through cultures. In 1991, Geoffrey A. Moore explored the diffusion of innovation theory and its applicability to the marketing of high-tech products. Moore argued that a "chasm" exists between the early adopters of the product (technology enthusiasts and visionaries) and the early majority (pragmatists). According to Moore, visionaries and pragmatists have very different expectations of the product, and different marketing techniques are required to successfully bridge the chasm between the two. These techniques address the two groups by tailoring to them the following: Choosing a target market the market segment to which a product is marketed. The target market can be defined by age, gender, geography or any other combination of demographic factors. Product positioning the process by which marketers try to create an image or identity of the product in the minds of their potential buyers so the buyers can determine its value relative to competing products. Understanding the whole product concept the generic product needs to be augmented by training and support, manuals, accessories, and so forth that give customers a compelling reason to buy the product.
Version 1.0
1-25
Marketing strategy the process by which marketers concentrate their finite resources to maximize sales opportunities for their products. Choosing appropriate distribution channels the process of determining which intermediary organizations marketers can use to most effectively make the product available to consumers. Pricing the process of determining the amount to charge for a product that helps acheive profitability for the organization, fits the realities of the marketplace, and supports the product's positioning.
According to Moore, the marketer should focus on one group of customers at a time, starting with the early adopters. Each group can then be used as a base for marketing to the next group. The most difficult step is making the transition between visionaries (early adopters) and pragmatists (early majority). If the marketer can build momentum for the product by successfully bridging this chasm, the product can become a success, if not a de facto standard.
Business Modeling
OBJECTIVE 1.1.13: Business organization modeling ontology The study of how a particular knowledge domain, or system, is organized. An ontology is the product of an ontological study.
When discussing computer science and Web technology, ontology is the study of how a particular part of a company, called a domain, is organized. The product of an ontological study, called an ontology, describes how individual elements of a domain relate to each other. This relation is usually represented in hierarchical terms. An ontology also describes how individual elements process information within the domain. The result of this description is usually a vocabulary for that domain. The resulting description and vocabulary can help programmers and designers of complex systems tailor their systems to the needs of a business. If systems are properly designed using a useful ontological model, these systems will be able to use and reuse data more easily.
Purpose of an ontology
NOTE: The term ontology has various meanings in other disciplines. For example, in philosophy, the term is used to denote an entire school of thought relative to the study of being.
An ontological study is a foundational step for programmers and designers of complex information technology systems. If properly conducted, an ontology allows software engineers and programmers to accurately map technology solutions to business needs. All parties will possess an objective understanding of how a domain processes information. An ontological study can also help ensure that data is formatted in a universal manner so that it can be reused from one complex system to another. Table 1-1 describes ontology terms as they relate to a particular organization or business.
Version 1.0
1-26
Description
Represents an entire company or a division within a company. The basic item within a domain. Also called an instance or an element. For example, a kayak manufacturing company would consider a kayak to be an object. A particular type of object. For example, a particular model of kayak would be an example of a particular class of individual object. Also called a concept in some ontologies. A unique characteristic pertaining to a class. A class can have multiple unique attributes. For example, a particular model of kayak will have various attributes, including: -Color. -Length. -Weight. -Displacement. -Type of construction materials.
Class/set
Attribute
Relation
Description of how one particular object or class is related to another, usually in a hierarchy. Helps create a taxonomy, which is a hierarchical relationship between objects or classes. Hierarchical description and vocabulary concerning a particular domain.
Schema
The hierarchy illustrates the reporting structure of a typical large business that is publicly traded. The Chief Executive Officer is the highest-ranking officer to whom the other executive officers typically report. Table 1-2 describes each of the top-level objects (i.e., corporate officers) in the business ontology model.
Version 1.0
1-27
Example Business Ontology Object Chief Executive Officer (CEO) Chief Information Officer (CIO) Chief Operations Officer (COO) Chief Technology Officer (CTO) Chief Security Officer (CSO) Chief Financial Officer (CFO)
Description
The highest-ranking corporate officer in charge of the total management of an organization, reporting to the board of directors. In charge of the Information Technology (IT) and computer systems within the domain that support enterprise goals. Differs from a CTO in that a CIO is typically in charge of making sure technology fulfills business goals. In charge of the operations management of the domain and is responsible for the design, development and operation of the systems that create and deliver the enterprise's products and services. In charge of making sure that IT resources are implemented and managed properly. The CTO role is usually different from the CIO role in that the CTO is responsible for how smoothly the technologies operate on a daily basis. In charge of ensuring information security within an enterprise, and is responsible for the design, development and implementation of the systems that protect the organization's information from unauthorized access and use. In charge of managing the financial risks, planning, record-keeping and reporting of an enterprise.
Of course, not all companies and organizations follow this model exactly. However, all companies and organizations should create a model that ensures accountability among departments and reduces conflicts of interest. Conflicts of interest occur when the duties and responsibilities of corporate officers are vague or incomplete. One way to eliminate conflicts of interest is to implement a policy of segregation (or separation) of duties. Such a policy ensures that no individual is given responsibility for more than one related function. Not included in the previous figure or table are the many levels below the chief executive level that an organization can have, depending on its size. Typically, the larger the organization, the deeper the hierarchy extends. In a large organization, the top-level managers generally consist of the chief executives, and the vice presidents of various functions that report to the executives. Below the toplevel managers are: Middle-level managers directors and employees with managerial titles such as general manager, plant manager, regional manager, sales manager and so forth. Middle-level managers are responsible for carrying out the goals set by top management by directing the activities of particular departments or other business units. First-level managers managers in the levels below middle managers who are generally known as first-line managers or supervisors. Typical titles include office manager, department manager, store manager, project manager and so forth. Firstline managers are responsible for managing the employees who produce the products and offer the services.
Version 1.0
1-28
Following are examples of when an ontology is helpful to specific Information Technology (IT) implementations:
NOTE: Web 2.0 technologies will be explored later in this course.
Creation of complex accounting systems Web 2.0 and semantic Web implementations Artificial intelligence
Semantic Web implementations are Web applications that have the ability to contextualize data as they process it. Applications that have the ability to apply context to data can make complex judgments about data, and as a result provide better solutions without human intervention.
Data Modeling
OBJECTIVE 1.15.6: Information flow and reporting models
Data modeling involves determining the requirements that a database must fulfill in order to function properly for an organization. When creating a data model, you first create a conceptual model, which documents the data and information within an organization and how it is used. The actual implementation of the conceptual model is called a logical model. When engaging in data modeling, you take the following steps: Planning and analysis identifying business requirements Conceptual design creating the model as a pure concept Logical design encoding the concept into SQL programming Physical design determining exactly where data will be stored Implementation applying the design to an actual database application, such as MySQL or Oracle
Version 1.0
1-29
Generally speaking, standards help govern the ease with which information can be exchanged and understood between people, businesses and systems. If people, businesses and systems do not adhere to the same standards, communication between them is more difficult. In the ever-changing world of technology, the adoption of standards is a critical component to the success of businesses, hardware and software development, and the World Wide Web. The following sections will introduce some of the main standards organizations that provide the necessary framework for business, network and Internet-related success. If you have ever used a telephone or connected to the Internet, you have done so using standards created by the organizations discussed in the following sections.
The World Wide Web Consortium (W3C) is a vendor-neutral forum whose mission is to create Web standards and guidelines. Tim Berners-Lee and others created W3C as an industry consortium whose primary mission is to build consensus around Web technologies. In order for the Web to reach its full potential, the W3C mandates that the most fundamental Web technologies be compatible with one another, and that any hardware and software used to access the Web be able to work together. The W3C refers to this goal as "Web interoperability." The W3C also serves as an open forum for discussions about the Web. You can learn more about the W3C at www.w3.org. Since it was founded in 1994, the W3C has published more than 110 Web standards, called W3C Recommendations. The W3C does not force manufacturers to follow the Recommendations, but encourages them to do so. Many of the standards define levels of conformance, which manufacturers must follow if they want to label their products W3Ccompliant. Because the W3C does not force manufacturer compliance, the Recommendations may be implemented only partially. The Recommendations are under a royalty-free patent license, allowing anyone to implement them.
Version 1.0
1-30
Requests for Comments (RFCs) are documents of interest to the Internet community published by the IETF. These documents describe methods, behaviors, research or innovations applicable to the workings of the Internet and Internet-connected systems. They include detailed information about standardized Internet protocols, such as IP and TCP, and those in various stages of development. They also include informational documents regarding protocol standards, assigned numbers (e.g., port numbers), host requirements (e.g., data link, network, transport and application OSI layers) and router requirements. RFCs are identified by number. The higher the number, the more recent the RFC. As of December 2008, there are 5,407 RFCs. You can learn more about RFCs at www.rfceditor.org/rfc.html.
IEEE publications include: Communications Magazine. Information Theory. Computer Graphics and Applications. Power and Energy Magazine Wireless Communications.
Version 1.0
1-31
TIA/EIA-598 fiber-optics standards that ensure quality high-speed networks across the world.
Case Study
Version 1.0
1-32
Lesson Summary
Application project
Consider the many IT job roles you learned about in this lesson. Which of these job roles particularly appeal to you? What skills do you already have that you can contribute to these job roles? Visit a job search site such as www.monster.com or http://hotjobs.yahoo.com or any other such site. Search for jobs in your area in the job role(s) of your choice. What skills are they looking for? Begin creating a rsum document for yourself using a text or word-processing application. List your education, including this course, and any credentials you hold, such as diplomas, degrees and certifications. Include any relevant clubs or membership organizations to which you belong. And list all the skills and experience you have that you could contribute to the workplace. Remember that skills such as communication, writing, teamwork and project management are just as important as any technical skills. Now review the requirements for jobs that interest you. Which skills do you already have? Which do you need to acquire? Will you learn some of the skills you need in school? In this course? In technical vocational training? On the job? Is there an internship you can apply for in your community? Consider approaching businesses and community colleges in your area. Remember that everyone has to start somewhere. Often, an entry-level job that seems less interesting will provide valuable training and experience that will eventually help you land the higher-level jobs you really want. Building a skill set and a career takes time, usually many years. Do not expect to start on top, but be willing to set goals for yourself and work hard to achieve what you want. Keep your rsum document handy so you can add to it each time you learn a skill, complete some training, earn a credential or accept a job.
Skills review
In this lesson, you learned about the responsibilities, tasks and skills required for various job roles in the Information Technology (IT) industry. You also learned about the most effective methods of conducting IT job searches, presenting rsums to hiring managers, and discussing technical issues with non-technical audiences. You studied technology adoption models, business models and data models. You also learned about the importance of standards to govern the ease with which information can be exchanged and understood. Now that you have completed this lesson, you should be able to: 1.1.1: Distinguish between individual job roles within the IT industry and the IT profession as a whole. 1.1.2: Identify responsibilities, tasks and skills of a Web site designer. 1.1.3: Distinguish between a Web architect and a Web application developer. 1.1.4: Identify responsibilities, tasks and skills of a Web site analyst. 1.1.5: Identify responsibilities, tasks and skills of a Web site manager. 1.1.6: Identify responsibilities, tasks and skills of a database administrator.
Version 1.0
1-33
1.1.7: Identify responsibilities, tasks and skills of a server administrator, including email/groupware administrator, Web server administrator. 1.1.8: Identify responsibilities, tasks and skills of a network engineer. 1.1.9: Distinguish between a security manager and a security analyst/consultant. 1.1.10: Identify responsibilities, tasks and skills of a PC repair technician. 1.1.11: Identify responsibilities, tasks and skills of a help desk technician. 1.1.12: Identify responsibilities, tasks and skills of a Web marketing professional. 1.1.13: Interpret a common business organization chart, including identifying duties of a Chief Executive Officer (CEO) versus a Chief Operations Officer (COO). 1.2.2: Explain Internet history, define current protocols (e.g., IPv4, IPv6, related protocols), and identify timelines and models for technology adoption curves such as (e.g., Moore's Law, Geoffrey Moore's technology adoption life cycle, and Kuhn's concept of paradigm shifts). 1.15.6: Explain common models for information flow and reporting between IT and upper management, as well as IT and other areas of the organization, including identifying project approval steps, SWOT analysis, data modeling vs. business ontology. 1.15.15: Identify the importance of quality management and assurance, including ISO 9000 standards. 1.20.1: Identify and explore career opportunities in the IT industry that relate to personal career goals. 1.20.2: Conduct job searches. 1.20.3: Use Internet technology to obtain employment, including employment sites and networking sites such as LinkedIn. 1.20.4: Create a rsum and place it in an appropriate file format (e.g., ASCII, HTML, RTF, PDF). 1.20.5: Determine the relevance and necessity of education as job roles, responsibilities and technologies change. 1.21.1: Communicate technical issues and concerns to an end user. 1.21.2: Demonstrate the value of IT-related expenses to management and stakeholders.
Version 1.0
1-34
Lesson 1 Review
1. What IT job role would most likely be responsible for managing and maintaining a network infrastructure?
2.
There are many ways to conduct a search for a job in the IT industry. Which method is considered the most effective?
3.
Why is continuing education important for people who want jobs in the IT industry?
4.
To what do the concepts of a paradigm shift, Moore's Law and the technology adoption life cycle refer?
5.
Version 1.0
1-35
6.
What is data modeling, and what are the two types of models within a data model?
7.
Version 1.0
1-36
Version 1.0
1-37
B. An individual who determines the visibility of Web sites across multiple clients and search engines C. An individual who is responsible for the overall plan of a Web site's development D. An individual who diagnoses and resolves users' technical hardware and software problems E. An individual who develops and implements plans to exploit the Internet for marketing and sales opportunities F. An individual who installs, modifies and repairs personal computer hardware components
6. 7. 8. 9.
Server administrator Web architect Web site analyst Web site designer
G. An individual who is responsible for the organization and appearance of a Web site H. An individual who manages and maintains network servers I. An individual who manages and maintains a network infrastructure
Version 1.0
1-38
When your business ontology model diagram is complete, consider that the entire unit you documented is a domain. Can you identify the objects? Can you identify any classes or attributes? What about relations? You can refer to Table 1-1 in this lesson to review these ontology terms. Finally, consider what this diagram tells you about communication and responsibilities in this organization. How might the ontology model you diagrammed be useful in developing or implementing software applications to help this organization function smoothly?
Version 1.0
1-39
3. 4.
5. 6. 7.
8.
9.
The Web sites you visited in this lab represent some of the important standards organizations that provide the necessary framework for business, network and Internetrelated success.
Version 1.0
1-40
Lesson 1 Quiz
1. In which job role does an individual diagnose and resolve users' technical hardware and software problems? a. b. c. d. 2. SEO analyst PC repair technician Help desk technician Server administrator
Which of the following best describes the job role of a Web architect? a. b. c. d. An individual effectiveness An individual An individual An individual development who analyzes Web site statistics to determine the site's who manages and maintains network servers who manages and maintains a network infrastructure who is responsible for the overall plan of a Web site's
3.
Which rsum format contains little formatting and is not necessarily designed to be visually impressive, but can be entered into various keyword-searchable rsum databases on various computer platforms and is not vulnerable to viruses? a. b. c. d. Text rsums RTF rsums PDF rsums HTML rsums
4.
Which of the following best describes the role that education plays in IT-industry careers? a. b. c. d. Completing a basic IT skills training course will qualify an individual for most IT job roles. Most IT jobs do not require any college degree but do require the professional certifications relevant to the position. Most IT jobs require a bachelor's degree at a minimum. Continual study is necessary to keep your skills current because IT technologies change so rapidly.
5.
Which skill is critical in most IT job roles? a. b. c. d. The ability to The ability to The ability to The ability to management configure and maintain server hardware design and lay out effective and aesthetically pleasing Web pages diagnose and resolve technical hardware and software problems communicate effectively with non-technical end users and
Version 1.0