Write short notes on the following and post them on your OneNote page
Internet Website Tools.
Distinguish between the following tools as used in websites
- Search engines
- Keyword density
- Keyword prominence
- Page ranking
What is a social networking site?
What are the most common and recent social networking site?
Search Engine Techniques
http://www.slideshare.net/chaumanduc/google-search-techniques-1240734
http://www.searchingspot.com/techniques.htm
Page Ranking
http://www.slideshare.net/chaumanduc/google-search-techniques-1240734
http://www.searchingspot.com/techniques.htm
Page Ranking
https://www.youtube.com/watch?v=g9p1ji4EFLc
SEO -Search engine optimization
Search engine optimization is a methodology of strategies, techniques and tactics used to increase the amount of visitors to a website by obtaining a high-ranking placement in the search results page of a search engine
Web 1.0, Web 2.0, web 3.0 and Web 4.0 and web 5.0
Distinguish between each of the about briefly.
http://www.slideshare.net/mstrickland/the-evolution-of-web-30
http://flatworldbusiness.wordpress.com/flat-education/previously/web-1-0-vs-web-2-0-vs-web-3-0-a-bird-eye-on-the-definition/
http://www.slideshare.net/joh5700/web-40-and-beyond-18806151
Write short notes on the following;
Define each term listed here: wikis, blogs, micro-blogs, RDF(resource description framework), RSS (really simple syndication) feeds, mashups, forums, social bookmarking, online collaborative applications, podcasts, photocasts, vidcasts, social networking sites, templates, tagging, viral marketing, webcasts, widgets, virtual worlds and learning environments.
Internet Services
- What are web database? Give examples of web database you know.
- Describe the different online marketing technologies available
- Describe what a content management system is. an examples is Moodle
- Distinguish with examples between push and pull technologies
- Describe the following E-commerce technologies; B2B, B2C and C2C
- Describe the different online payment services; e.g Paypall
SEO -Search engine optimization
Search engine optimization is a methodology of strategies, techniques and tactics used to increase the amount of visitors to a website by obtaining a high-ranking placement in the search results page of a search engine
Web 1.0, Web 2.0, web 3.0 and Web 4.0 and web 5.0
Distinguish between each of the about briefly.
http://www.slideshare.net/mstrickland/the-evolution-of-web-30
http://flatworldbusiness.wordpress.com/flat-education/previously/web-1-0-vs-web-2-0-vs-web-3-0-a-bird-eye-on-the-definition/
http://www.slideshare.net/joh5700/web-40-and-beyond-18806151
Write short notes on the following;
Define each term listed here: wikis, blogs, micro-blogs, RDF(resource description framework), RSS (really simple syndication) feeds, mashups, forums, social bookmarking, online collaborative applications, podcasts, photocasts, vidcasts, social networking sites, templates, tagging, viral marketing, webcasts, widgets, virtual worlds and learning environments.
Internet Services
- What are web database? Give examples of web database you know.
- Describe the different online marketing technologies available
- Describe what a content management system is. an examples is Moodle
- Distinguish with examples between push and pull technologies
- Describe the following E-commerce technologies; B2B, B2C and C2C
- Describe the different online payment services; e.g Paypall
Internet Security
Internet security can be provided by using Firewalls, Proxy servers, Encryprions, and Digital signatures
Internet security can be provided by using Firewalls, Proxy servers, Encryprions, and Digital signatures
- Using diagrams explain how firewalls work: https://www.youtube.com/watch?v=ZTBzAr2Tu0o
- Describe the role of proxy server in the management of Internet security. https://www.youtube.com/watch?v=bF6v7-wd9qI&t=5s
- Describe what SSL is https://www.youtube.com/watch?v=SJJmoDZ3il8
- What is encryption and how is Public key different from Private key encryption. Use diagrams where possible. https://www.youtube.com/watch?v=CR8ZFRVmQLg
- Describe what digital signatures are and explain how they function.
- Describe other internet security measures in place and describe how each of the works.
Internet Threat
Describe each of the internet threat below and suggest the several solutions with examples where possible for each of the threats.
- Viruses
- hackers
- Phishing
- Spaminng
- Pharming
- Spyware
- Adware
Sample networks question