Evaluation Copy. Internet Business Foundations: Self-Study Guide CIW v5 Foundations Series. CCSSM-CF2IBF-PR-909 version 2.

Size: px
Start display at page:

Download "Evaluation Copy. Internet Business Foundations: Self-Study Guide CIW v5 Foundations Series. CCSSM-CF2IBF-PR-909 version 2."

Transcription

1 Internet Business Foundations: Self-Study Guide CIW v5 Foundations Series CCSSM-CF2IBF-PR-909 version 2.0 rd082609

2

3 Internet Business Foundations: Self-Study Guide

4 President James Stanger, Ph.D. Vice President, Publishing Todd Hopkins Senior Content Developer Kenneth A. Kozakis Managing Editor Susan M. Lane Editor Sarah Skodak Project Manager/Publisher Tina Strong Customer Service ComputerPREP Certification Partners, LLC 1230 W. Washington St., Ste. 111 Tempe, AZ (602) Copyright 2009, All rights reserved.

5 Internet Business Foundations Developer Kenneth A. Kozakis Contributors James Stanger, Ph.D., Patrick T. Lane, Irina Heer and Stephen Schneiter Editor Susan M. Lane Publisher Tina Strong Project Managers Todd Hopkins and Tina Strong Trademarks Certification Partners is a trademark of Certification Partners, LLC. All product names and services identified throughout this book are trademarks or registered trademarks of their respective companies. They are used throughout this book in editorial fashion only. No such use, or the use of any trade name, is intended to convey endorsement or other affiliation with the book. Copyrights of any screen captures in this book are the property of the software's manufacturer. Disclaimer Certification Partners, LLC, makes a genuine attempt to ensure the accuracy and quality of the content described herein; however, Certification Partners makes no warranty, express or implied, with respect to the quality, reliability, accuracy, or freedom from error of this document or the products it describes. Certification Partners makes no representation or warranty with respect to the contents hereof and specifically disclaims any implied warranties of fitness for any particular purpose. Certification Partners disclaims all liability for any direct, indirect, incidental or consequential, special or exemplary damages resulting from the use of the information in this document or from the use of any products described in this document. Mention of any product or organization does not constitute an endorsement by Certification Partners of that product or corporation. Data used in examples and labs is intended to be fictional even if actual data is used or accessed. Any resemblance to, or use of real persons or organizations should be treated as entirely coincidental. Certification Partners makes every effort to ensure the accuracy of URLs referenced in all its material, but cannot guarantee that all URLs will be available throughout the life of a course. When this course/cd-rom was published, all URLs were checked for accuracy and completeness. However, due to the everchanging nature of the Internet, some URLs may no longer be available or may have been redirected. Copyright Information This training manual is copyrighted and all rights are reserved by Certification Partners, LLC. No part of this publication may be reproduced, transmitted, stored in a retrieval system, modified, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise without written permission of Certification Partners, 1230 W. Washington Street, Suite 111, Tempe, AZ Copyright 2009 by Certification Partners, LLC All Rights Reserved ISBN:

6 iv

7 v Table of Contents Course Description... xiv Self-Study Courseware... xv Course Objectives... xvi Course Setup Guide and System Requirements... xvi Conventions and Graphics... xxiii Lesson 1: Introduction to IT Business and Careers Pre-Assessment Questions Information Technology (IT) IT Job Roles IT Industry Career Opportunities Technical Concepts and Training Technology Adoption Models Business Modeling Data Modeling The Importance of Standards Case Study Lesson 1 Review Lesson 1 Supplemental Material Lesson 2: Introduction to Internet Technology Pre-Assessment Questions Internet Technology Overview of Networks Overview of the Internet Connecting to the Internet Internet Protocols Domain Name System (DNS) Cloud Computing Case Study Lesson 2 Review Lesson 2 Supplemental Material Lesson 3: Web Browsing Pre-Assessment Questions Introduction to Web Browsing Basic Functions of Web Browsers Installing a Web Browser Web Addresses How Browsers Work Browser Choices Resources for Technical Data Browsing Techniques Browser Elements Configuring Web Browser Preferences Cookies Configuring Browser Security Proxy Servers Google Chrome Troubleshooting Internet Client Problems Browsers in the Business World Case Study Lesson 3 Review Lesson 3 Supplemental Material Lesson 4: Multimedia on the Web Pre-Assessment Questions Introduction to Multimedia on the Web Objects, Active Content and Languages Objects and Security Issues...4-6

8 vi Introduction to Plug-in Technology Data Compression and Decompression Plug-in Installation Types of Plug-ins Firefox Add-Ons Types of Viewers Miscellaneous File Formats Downloading Files with a Browser Case Study Lesson 4 Review Lesson 4 Supplemental Material Lesson 5: Databases and Web Search Engines Pre-Assessment Questions Introduction to Data Searching Tools Overview of Databases Introduction to Web Search Engines Registering a Web Site with a Search Engine Types of Web Searches Basic Web Searching Techniques Boolean Operators Advanced Web Searching Techniques Using Web Searches to Perform Job Tasks Unexpected Web Search Results Web Search Strategies Evaluating Resources Organizing Internet Research Citing Copyrighted Online Resources Case Study Lesson 5 Review Lesson 5 Supplemental Material Lesson 6: and Personal Information Management Pre-Assessment Questions Introduction to Electronic Mail ( ) How Works Configuration Requirements Message Components Creating and Sending Messages Receiving and Viewing Messages in the Workplace Problems and Solutions Personal Information Management (PIM) Case Study Lesson 6 Review Lesson 6 Supplemental Material Lesson 7: Internet Services and Tools Pre-Assessment Questions Internet Resource Tools Newsgroups List Servers and Listserve Groups Telnet File Transfer Protocol (FTP) Managing Downloaded Files Virtual Network Computing (VNC) and Microsoft Terminal Services Peer-to-Peer Networks Lightweight Directory Access Protocol (LDAP) Concurrent Versions System (CVS) Troubleshooting Using TCP/IP Tools Universal Development Models Open-Source Development...7-2

9 vii Proprietary Software and EULAs Software Patents Case Study Lesson 7 Review Lesson 7 Supplemental Material Lesson 8: Internet Communication Pre-Assessment Questions Communicating via the Internet Modern Web Technologies Social Networking Messaging Blogging Communicating Effectively over the Internet Convergence and Unified Communications Technologies Case Study Lesson 8 Review Lesson 8 Supplemental Material Lesson 9: Internet Security Pre-Assessment Questions Introduction to Internet Security Encryption Authentication Firewalls Malware (Malicious Software) Virus Detection and Prevention Spyware Updates and Patches Screen Savers Security-Related Ethical and Legal Issues Typosquatting Case Study Lesson 9 Review Lesson 9 Supplemental Material Lesson 10: IT Project and Program Management Pre-Assessment Questions Overview of IT Project and Program Management Project Management Fundamentals Project Management Skills Project Management Phases The Project Triangle Project Management Software Creating Project Schedules Documenting Projects Planning and Scheduling Meetings Reviewing Projects Quality Assurance Business Implications of IT Projects Project Management Institute (PMI) Program Management Concepts Case Study Lesson 10 Review Lesson 10 Supplemental Material Appendixes... Appendixes-2 CIW Foundations Glossary... Glossary-2 Index... Index-2 Companion CD-ROM Contents...Companion CD-ROM Contents-2

10 viii List of Labs Lab 1-1: Exploring basic Web site design concepts Lab 1-2: Using Internet technology to conduct job searches Lab 1-3: Creating a plain-text résumé Lab 1-4: Creating an RTF résumé Lab 2-1: Sampling current and historic Web site designs Lab 2-2: Using Internet protocols in Mozilla Firefox Lab 2-3: Exploring Google's cloud-computing capabilities Lab 3-1: Installing the Firefox 3.0 browser Lab 3-2: Browsing Web pages using various browsers Lab 3-3: Viewing the default Firefox 3.0 protocols Lab 3-4: Accessing statistics, and accessing secure and non-secure Web pages Lab 3-5: Reviewing Web trends Lab 3-6: Using browser features to enhance your browsing experience Lab 3-7: Configuring font size in Mozilla Firefox Lab 3-8: Setting a browser home page in Mozilla Firefox Lab 3-9: Managing the History folder in Mozilla Firefox Lab 3-10: Configuring the browser cache in Mozilla Firefox Lab 3-11: Controlling image loading in Mozilla Firefox Lab 3-12: Controlling cookies in Mozilla Firefox Lab 3-13: Changing security settings in Mozilla Firefox Lab 3-14: Using Google Chrome Lab 3-15: Conducting a Web conference Lab 3-16: Delivering Web feeds to your computer Lab 4-1: Using Adobe Flash Player with Mozilla Firefox Lab 4-2: Using the RealPlayer plug-in with Mozilla Firefox Lab 4-3: Using the Apple QuickTime plug-in with Mozilla Firefox Lab 4-4: Using the Windows Media Player plug-in with Mozilla Firefox Lab 4-5: Using Firefox add-ons Lab 4-6: Installing and using Adobe Reader with Mozilla Firefox Lab 4-7: Viewing Ogg Vorbis files in Windows Media Player Lab 4-8: Downloading and storing Web site content using Mozilla Firefox Lab 5-1: Performing a directory search using Yahoo! Lab 5-2: Performing a keyword search using AltaVista Lab 5-3: Using the plus sign (+) and minus sign (-) operators in AltaVista Lab 5-4: Performing an advanced search in AltaVista Lab 5-5: Using the Internet to perform job tasks Lab 5-6: Reviewing Web search tips and tricks Lab 5-7: Using unusual search tricks and browsing techniques Lab 5-8: Evaluating Internet resources Lab 5-9: Organizing Internet research using Zotero Lab 6-1: Configuring Thunderbird as your client Lab 6-2: Configuring a Web-based account using Gmail Lab 6-3: Creating and sending messages using Thunderbird Lab 6-4: Creating and sending messages using Gmail Lab 6-5: Creating signatures in Thunderbird and Gmail Lab 6-6: Attaching files to messages Lab 6-7: Receiving and viewing messages Lab 6-8: Setting up a spam filter in Thunderbird Lab 7-1: Exploring LISTSERV Lab 7-2: Exploring Topica Lab 7-3: Accessing a library database using Telnet Lab 7-4: Installing the FireFTP Firefox add-on as your FTP client Lab 7-5: Downloading files using command-line FTP Lab 7-6: Downloading files using the Firefox FTP client Lab 7-7: Downloading files using FireFTP Lab 7-8: Uploading files to an FTP site using FireFTP Lab 7-9: Defining MIME types Lab 7-10: Compressing and decompressing files using bzip2 and bunzip Lab 7-11: Using the TightVNC remote administration application...7-2

11 ix Lab 7-12: Using Remote Desktop Connection Lab 7-13: Using TCP/IP diagnostic tools Lab 8-1: Using the Windows Live Messenger instant messaging client Lab 8-2: Sending text messages using Twitter Lab 8-3: Using Windows Remote Assistance Lab 8-4: Creating a blog Lab 9-1: Viewing your desktop firewall settings Lab 9-2: Installing and using spyware-detection software Lab 9-3: Activating a screen saver Lab 10-1: Installing the GanttProject project management tool Lab 10-2: Creating a project schedule List of Activities Activity 1-1: Identifying Information Technology (IT) job roles Activity 1-2: Diagramming a business ontology model Activity 2-1: Identifying direct Internet connection types Activity 2-2: Identifying Web sites based on domain name structure Activity 3-1: Defining browser terminology Activity 4-1: Identifying computer languages Activity 5-1: Identifying database components Activity 5-2: Identifying Boolean operator actions Activity 6-1: Defining terms and concepts Activity 7-1: Choosing the right tool for the job Activity 8-1: Identifying Web 2.0 technologies Activity 9-1: Identifying security terms Activity 9-2: Identifying types of viruses Activity 10-1: Identifying project management phases Activity 10-2: Identifying PMBOK topics List of Optional Labs Optional Lab 1-1: Learning about Internet standards organizations Optional Lab 2-1: Learning about the Internet Optional Lab 2-2: Creating your own radio station with Pandora Optional Lab 3-1: Organizing Favorites in Microsoft Internet Explorer Optional Lab 3-2: Organizing Bookmarks in Mozilla Firefox Optional Lab 3-3: Configuring font size in Microsoft Internet Explorer Optional Lab 3-4: Setting a browser home page in Microsoft Internet Explorer Optional Lab 3-5: Managing the History folder in Microsoft Internet Explorer Optional Lab 3-6: Configuring the browser cache in Microsoft Internet Explorer Optional Lab 3-7: Controlling image loading in Microsoft Internet Explorer Optional Lab 3-8: Setting automatic cookie handling in Microsoft Internet Explorer Optional Lab 3-9: Configuring Microsoft Internet Explorer to display cookie warnings Optional Lab 3-10: Setting safety levels in Microsoft Internet Explorer Optional Lab 4-1: Using Adobe Flash Player with Microsoft Internet Explorer Optional Lab 4-2: Using Adobe Reader with Microsoft Internet Explorer Optional Lab 4-3: Downloading and storing Web site content using Microsoft Internet Explorer Optional Lab 5-1: Performing a directory search using Excite Optional Lab 5-2: Performing a keyword search using Excite Optional Lab 5-3: Using the plus sign and minus sign operators in Lycos Optional Lab 5-4: Using Boolean operators in Lycos Optional Lab 6-1: Configuring Windows Mail as your client Optional Lab 6-2: Setting up a Web-based account using Windows Live Hotmail Optional Lab 6-3: Creating an signature in Windows Mail and Windows Live Hotmail Optional Lab 6-4: Adding contacts and importing an address book in Windows Mail Optional Lab 6-5: Setting up an automatic reply message in FasterMail Optional Lab 6-6: Finding EML and MSF files Optional Lab 6-7: Installing and configuring Aethera Optional Lab 7-1: Configuring and using Thunderbird Newsgroups Optional Lab 7-2: Configuring and using Windows Mail as a news client...7-2

12 x Optional Lab 7-3: Exploring the Majordomo list server Optional Lab 7-4: Exploring Yahoo! Groups Optional Lab 7-5: Downloading files using the Internet Explorer FTP client Optional Lab 8-1: Using SMS to send and receive text messages Optional Lab 9-1: Uncovering typosquatters Optional Lab 10-1: Using software to create a project schedule List of Quizzes Lesson 1 Quiz Lesson 2 Quiz Lesson 3 Quiz Lesson 4 Quiz Lesson 5 Quiz Lesson 6 Quiz Lesson 7 Quiz Lesson 8 Quiz Lesson 9 Quiz Lesson 10 Quiz List of Figures Figure 1-1: Web site design plain Web page Figure 1-2: Web site design more interesting Web page Figure 1-3: Viewing Web page for design qualities Figure 1-4: Inserting HTML code Figure 1-5: Improved Web page Figure 1-6: Web site usage report Figure 1-7: Monster home page Figure 1-8: Typical business ontology model Figure 2-1: Client/server model Figure 2-2: Multiple connections among servers Figure 2-3: Internet Archive's Wayback Machine page Figure 2-4: Typical domain name Figure 2-5: CIW Web site home page in Mozilla Firefox Figure 2-6: Google Docs page Figure 2-7: Google Maps page Figure 2-8: igoogle page Figure 2-9: Personalized igoogle page Figure OL2-1: Pandora home page Figure OL2-2: Personalizing Pandora radio station Figure 3-1: Mozilla Firefox Setup Wizard Figure 3-2: Firefox Setup Type screen Figure 3-3: Firefox Import Settings and Data screen Figure 3-4: Typical Uniform Resource Locator (URL) Figure 3-5: CIW Certified home page Figure 3-6: Options dialog box Firefox Figure 3-7: Default protocols Firefox Figure 3-8: Safari Web browser interface Figure 3-9: Opera Web browser interface Figure 3-10: Page Info dialog box non-secure page in Firefox Figure 3-11: Page Info dialog box secure page in Firefox Figure 3-12: Certificate Viewer dialog box Firefox Figure 3-13: Certificate dialog box secure page in Internet Explorer Figure 3-14: Google Zeitgeist home page Figure 3-15: Mozilla Firefox Bookmarks Figure 3-16: Microsoft Internet Explorer Favorites Figure 3-17: Add A Favorite dialog box Figure 3-18: Adding to Favorites Figure 3-19: Internet Options dialog box Microsoft Internet Explorer Figure 3-20: Options dialog box Mozilla Firefox

13 xi Figure 3-21: Fonts dialog box Mozilla Firefox Figure 3-22: Specifying home page in Firefox Figure 3-23: History settings in Firefox Figure 3-24: Clear Private Data dialog box Figure 3-25: Options dialog box Content panel Figure 3-26: Setting cache options Microsoft Internet Explorer Figure 3-27: Specifying cache settings in Firefox Figure 3-28: Controlling image loading in Firefox Figure 3-29: Controlling cookies Microsoft Internet Explorer Figure 3-30: Controlling cookies Mozilla Firefox Figure 3-31: Cookies dialog box Mozilla Firefox Figure 3-32: Confirm Setting Cookie dialog box Mozilla Firefox Figure 3-33: Internet Options dialog box Security tab Figure 3-34: Disabling JavaScript and Java Firefox Figure 3-35: JavaScript active content Figure 3-36: Connection Settings dialog box Firefox Figure 3-37: Internet Options dialog box, Connections tab Internet Explorer Figure 3-38: Local Area Network (LAN) Settings dialog box Internet Explorer Figure 3-39: Google Chrome window Figure 3-40: Google Chrome comic book Figure 3-41: Cookies dialog box Google Chrome Figure 3-42: CIW Community login page extranet Figure 3-43: Webinar session Figure 3-44: Dimdim Web Meeting interface Figure 3-45: Join Meeting form Figure 3-46: Feed subscription button Figure 3-47: Preview of current feeds Figure 3-48: Add Live Bookmark dialog box Figure OL3-1: Organize Favorites dialog box Internet Explorer Figure OL3-2: Library window showing bookmarks Firefox Figure OL3-3: Delete Browsing History dialog box Internet Explorer Figure OL3-4: Controlling image loading in Internet Explorer Figure OL3-5: Advanced Privacy Settings dialog box Internet Explorer Figure OL3-6: Privacy Alert dialog box Internet Explorer Figure OL3-7: High safety level Internet Explorer Figure 4-1: Embedded RealPlayer video Figure 4-2: Adobe Downloads page Firefox Figure 4-3: Installing Adobe Flash Player in Firefox Figure 4-4: Downloads window Figure 4-5: QTVR sequence Figure 4-6: itunes window Figure 4-7: Specifying where to open movie clip Figure 4-8: Windows Media Player window Figure 4-9: Add-ons page Firefox Figure 4-10: Web page with blocked Flash content Figure 4-11: Add-ons Firefox Figure 4-12: PDF file in Adobe Reader Firefox Figure 4-13: Vorbis.com's music page Figure 4-14: Playing Ogg Vorbis track Figure 4-15: Save As dialog box Figure 4-16: Save Image dialog box Figure OL4-1: PDF file in Adobe Reader Internet Explorer Figure OL4-2: Save Webpage dialog box Internet Explorer Figure OL4-3: Save Picture dialog box Internet Explorer Figure OL4-4: Save A Copy dialog box Internet Explorer Figure 5-1: Sample database table Figure 5-2: Sample relational database Figure 5-3: Related tables Figure 5-4: One-to-many database table relationship Figure 5-5: Many-to-many database table relationship Figure 5-6: Yahoo! keyword search field

14 xii Figure 5-7: Yahoo! static directory Figure 5-8: AltaVista home page Figure 5-9: AltaVista Advanced Web Search page Figure 5-10: Google home page Figure 5-11: Google Image Search page Figure 5-12: YouTube home page Figure 5-13 BBC News home page Figure 5-14: Zotero window Figure 5-15: Zotero window with collection Figure OL5-1: Excite home page Figure OL5-2: Lycos home page Figure 6-1: Windows Mail Properties dialog box General tab Figure 6-2: Windows Mail Properties dialog box Servers tab Figure 6-3: Thunderbird Account Wizard Identity screen Figure 6-4: Thunderbird Account Wizard Server Information screen Figure 6-5: Setting up Mozilla Thunderbird as your client Figure 6-6: Thunderbird Inbox Figure 6-7: Gmail Inbox window Figure 6-8: Creating message in Thunderbird Figure 6-9: Creating message in Gmail Figure 6-10: Thunderbird window sections Figure 6-11: Unprofessional in business setting Figure 6-12: Professional in business setting Figure 6-13: Filter Rules dialog box Figure 6-14: Setting up spam filter Figure 6-15: PIM calendar entries in Aethera Figure 6-16: PIM contact information in Aethera Figure OL6-1: Microsoft Windows Mail main window Figure OL6-2: Configured account in Windows Mail Figure OL6-3: Windows Live Hotmail window Figure OL6-4: Adding contact Figure OL6-5: Aethera interface Figure 7-1: L-Soft home page Figure 7-2: Topica home page Figure 7-3: Accessing library database using Telnet Figure 7-4: Sample SSH session Figure 7-5: Using command-line FTP Figure 7-6: Using Mozilla Firefox FTP client Figure 7-7: FireFTP window Figure 7-8: Using FireFTP to access FTP server Figure 7-9: WinSCP client Figure 7-10: File with undefined MIME type Figure 7-11: TightVNC Server Current User Properties dialog box Figure 7-12: New TightVNC Connection dialog box Figure 7-13: VNC display on client computer Figure 7-14: Remote Desktop Connection dialog box Figure 7-15: Using TCP/IP diagnostic tools Figure OL7-1: Subscribe dialog box Thunderbird Figure OL7-2: Newsgroup Subscriptions dialog box Windows Mail Figure OL7-3: Majordomo home page Figure OL7-4: Yahoo! Groups home page Figure OL7-5: Internet Explorer FTP client in Windows Explorer Figure 8-1: Meebo home page Figure 8-2: Wikipedia home page Figure 8-3: Signing in to Windows Live Messenger Figure 8-4: Adding Windows Live Messenger contact Figure 8-5: Windows Live Messenger window with contact Figure 8-6: Windows Live Messenger conversation window Figure 8-7: Finding lab partner on Twitter Figure 8-8: Windows Remote Assistance Figure 8-9: Waiting for incoming connection Windows Remote Assistance...8-2

15 xiii Figure 8-10: Compose window Blogger.com Figure 8-11: Posted blog entry in template Figure 8-12: Posted comment entry Figure 9-1: Web page personal information form Figure 9-2: Windows Firewall window Figure 9-3: Windows Firewall Settings dialog box Exceptions list Figure 9-4: Ad-Aware spyware-detection application Figure 9-5: Detected spyware objects Figure 9-6: Screen Saver Settings dialog box Figure 10-1: Organizational structure project team members Figure 10-2: Sample Gantt chart Figure 10-3: GanttProject window Figure 10-4: GanttProject Properties dialog box for task Figure 10-5: Task list and Gantt chart Figure OL10-1: Task list and Gantt chart final List of Tables Table 1-1: Ontology terms Table 1-2: Business ontology model objects Table 2-1: Common speeds for direct Internet connections Table 2-2: Installed vs. cloud-computing-based services Table 3-1: Elements of Web browser Table 3-2: Internet Explorer Privacy level effects on cookies Table 3-3: Cookie handling options Firefox Table 5-1: Types of Web searches Table 5-2: Boolean operators Table 6-1: message components Table 6-2: response options Table 7-1: SSH-based utilities Table 7-2: Popular file types found on FTP servers Table 7-3: Compression applications and common file name extensions Table 7-4: Open-source software development terms Table 8-1: SMS addresses for major U.S. cellular providers Table 9-1: Computer virus types...9-2

16 xiv Course Description Internet Business Foundations prepares you to work effectively in today's business environment. In this course, you will learn about the tasks involved in various Information Technology (IT) job roles, and explore career opportunities in the IT industry. You will also learn about Internet connection methods, Internet protocols, the Domain Name System (DNS) and cloud computing. You will study the basic functions of Web browsers, the components of Web addresses, the use and control of cookies, and browser use in the business world. You will learn how browser plug-ins and add-ons can improve your Web-browsing experience, and you will use browsers to download and manage files. You will learn about databases as they relate to Web search engines, and you will use search engines to conduct basic and advanced Web searches. This course also teaches you to configure clients and use , and it provides guidelines for communicating effectively over the Internet using modern Web technologies and social networking tools. You will also learn about Internet research and collaboration tools, software development tools, and the patent and licensing practices that accompany software applications. You will learn about the risks associated with being connected to the Internet, and about the security measures that can keep your computer system and your personal information secure. Finally, you will study the fundamental elements of project and program management, and the importance of acquiring these skills for all IT job roles. All CIW Foundations courses offer Case Studies about real-world skills applications, and job-related topics such as project management, and the relationship between technology and business operations. The CIW Foundations courses prepare you to take the CIW v5 Foundations certification exam. Guided, step-by-step labs provide opportunities to practice new skills. You can challenge yourself and review your skills after each lesson in the Lesson Summary and Lesson Review sections. Additional skill reinforcement is provided in Activities, Optional Labs and Lesson Quizzes that are included in the coursebook and on the companion CD-ROM. The companion CD-ROM contains the lab files used in the course. To practice the skills presented in the coursebook, refer to the Course Setup Guide And System Requirements section for information about system requirements and using the lab files. Series Internet Business Foundations is the first course in the CIW Foundations series. CIW Foundations consists of the following courses: Internet Business Foundations Site Development Foundations Network Technology Foundations Prerequisites No prior experience using the Internet, developing Web pages or configuring networks is necessary. However, you should be familiar with an operating system such as Microsoft Windows Vista before taking this course. The CIW Foundations courseware does not provide entry-level computer literacy. Rather, it builds upon computer literacy training and certifications such as Microsoft Office Specialist ( and IC 3 (

17 xv Certification The CIW Foundations series of courses prepares you to take the high-stakes CIW Foundations certification exam. If you pass the CIW Foundations exam, you will earn the highly respected CIW Associate certification, which is recognized throughout the industry as validating essential Internet skills for the workplace. The CIW Associate certification proves that an individual has evolved from being an Internet consumer to an Internet producer, capable of producing real-world Internet applications. A CIW Associate certificant can use common Internet-ready applications, can create properly formed HTML/XHTML documents, knows database essentials, understands project management concepts and can troubleshoot networks. For information about taking the CIW Foundations exam, visit Self-Study Courseware This coursebook was developed for self-directed training. Along with comprehensive instructional text and objectives checklists, this coursebook provides easy-to-follow hands-on labs and a glossary of coursespecific terms. It also provides Internet addresses needed to complete some labs, although due to the constantly changing nature of the Internet, some addresses may no longer be valid. The coursebook also includes margin notes that provide additional tips and commentary to supplement course narrative, and that direct you to material relating directly to specified CIW Foundations exam objectives. Each course lesson includes practice, study and assessment materials such as preview and review questions, Case Studies, Application Projects, pen-and-paper-based Activities, Optional Labs and Quizzes. The coursebook includes a companion CD-ROM that provides files needed to complete labs. The companion CD-ROM also includes an appendix listing the CIW v5 Foundations certification exam objectives and locations of corresponding material in the coursebook. The companion CD-ROM provides all answers to Activities, Optional Labs and Lesson Quizzes. Lesson Quizzes are provided as study and self-assessment resources only; success on these materials in no way guarantees a passing score on the CIW v5 Foundations certification exam. After you have finished the course, you will find this coursebook to be a valuable resource for reviewing labs at home or in the workplace and applying the skills you have learned. Additional online resources In addition to the material found in the coursebooks, you can visit CIW Online at to help you prepare for the CIW v5 Foundations certification exam. CIW Online provides a variety of online tools you can use to supplement the Official CIW Courseware, including: Practice Exam questions The CIW Certification Practice Exams help measure proficiency on specific topics or the full range of CIW skills objectives. With nearly 700 exam questions, this powerful tool can be used to pre-assess certification aptitude, to prepare for the high-stakes exam environment, and to identify skills gaps and additional study needs. Visit or call (602) for product and purchase information about currently available CIW Certification Practice Exams. Course review questions The course review questions consist of more than 1,300 multiple-choice questions that cover numerous topics throughout the Foundations course material, not just those topics addressed by the CIW exam objectives. The questions are completely integrated with material from the book and can be used to assess your understanding of the course material. Interactive exercises These activities consist of fill-in-the-blank, true-or-false, categorizing, matching and crossword puzzle exercises. The self-testing exercises provide immediate scoring and feedback after completion, allowing you to focus on topics that require additional study. The exercises

18 xvi are based on Foundations content and prepare you to excel in tests and quizzes that feature multiplechoice questions. Online flashcards Over 400 glossary flashcards test your vocabulary of important Foundations terms. The interactive flashcards show a vocabulary term on one side and the definition on the other. You may move through the flashcards as necessary for extra review. Course Objectives After completing this course, you will be able to: Define Information Technology (IT) job roles, explore career opportunities in the IT industry, and effectively communicate technical information to non-technical audiences. Define technology adoption, business and data models, and identify the importance of standards. Define networks, the Internet, Internet connection methods, Internet protocols, the Domain Name System (DNS) and cloud computing. Identify the basic functions of Web browsers and the components of Web addresses, configure browser preferences and security, use and control cookies, extend browser functionality with plug-ins and add-ons, use browsers to download and manage files, and identify ways in which browsers are used in the business world to maintain intranets/extranets and to conduct training and conferences. Define and use multimedia. Define databases and database components, define Web search engines, and conduct Web searches using Boolean operators and advanced search techniques. Evaluate and organize information you retrieve from resources on the Internet. Install and configure clients, use effectively in the work environment, identify and resolve problems, and identify the functions of personal information management (PIM) software. Use news clients, listserve groups, Telnet, FTP, VNC and Microsoft Terminal Services, and troubleshoot Internet client issues using TCP/IP tools. Identify software development tools, compare proprietary software to open-source development, and explain the patent and licensing practices that accompany software programs and tools. Identify and use modern Web 2.0 technologies, such as Ajax, wikis, folksonomy, Web feeds, podcasts, semantic Web, mashups, social networking, instant messaging, text messaging and blogging. Apply guidelines for effective communication over the Internet, and identify unified communications technologies that seek to simplify and integrate all forms of communication. Identify topics related to Web security such as encryption, authentication, firewalls, malware, spyware, patches, updates and typosquatting. Identify ethical and legal issues related to Internet use, such as privacy concerns, copyright issues, licensing issues, trademark issues and encryption policies. Identify project and program management skills and phases, and discuss the business implications of IT decisions. Course Setup Guide and System Requirements In order to implement this course, you will need to set up your computer based on the hardware, software and connectivity requirements listed in the following sections. However, you may want to use additional software to further explore network interaction or related technologies.

19 xvii Hardware requirements The following table summarizes the hardware requirements for all courses in the CIW program. Note: The CIW hardware requirements are similar to the minimum system requirements for Microsoft Windows Vista Business implementation. Hardware Specifications Processor L2 cache Hard disk RAM CD-RW Network interface card (NIC) Sound card/speakers Video adapter Minimum Requirements 1 GHz 32-bit (x86) or 64-bit (x64) processor 256 KB 40 GB with at least 15 GB of available space At least 1 GB 32X 10BaseT or 100BaseTX (10 or 100 Mbps) Required for movie clips and labs that use sound Support for DirectX9 graphics with: WDDM Driver At least 128 MB of graphics memory Pixel Shader 2.0 in hardware 32 bits per pixel Monitor Super VGA (1024 x 768) Software requirements If you are taking all three CIW Foundations self-study courses sequentially, there is no need to reformat your computer for each course. The recommended software configurations for computers used to complete the labs in this book series are as follows. Internet Business Foundations To be installed before starting the course: Microsoft Windows Vista Business (typical installation) Microsoft Internet Explorer 8.0 (typical installation) To be installed during course labs: Firefox (binary provided in the C:\CIW\Internet\Lab Files\Lesson03 folder) Google Chrome 1.0 (binary provided in the C:\CIW\Internet\Lab Files\Lesson03 folder) Ogg Codecs (binary provided in the C:\CIW\Internet\Lab Files\Lesson04 folder) Aethera (binary provided in the C:\CIW\Internet\Lab Files\Lesson06 folder) Thunderbird 2.0 (binary provided in the C:\CIW\Internet\Lab Files\Lesson06 folder) TightVNC, Bzip2 and Bunzip2 (binaries provided in the C:\CIW\Internet\Lab Files\Lesson07 folder) Audacity and Windows Live Messenger (binaries provided in the C:\CIW\Internet\Lab Files\Lesson08 folder) Ad-AwareAE (binary provided in the C:\CIW\Internet\Lab Files\Lesson09 folder) GanttProject (binary provided in the C:\CIW\Internet\Lab Files\Lesson10 folder)

20 xviii Site Development Foundations To be installed before starting the course: Microsoft Windows Vista Business (typical installation) Microsoft Internet Explorer 8.0 (typical installation) Firefox (typical installation) To be installed during course labs: Lynx (binary provided in the C:\CIW\Site_Dev\Lab Files\Lesson01\Lab_1-2\Lynx folder) FormMail (binary provided in the C:\CIW\Site_Dev\Lab Files\Lesson07\FormMail folder) KompoZer (binary provided in the C:\CIW\Site_Dev\Lab Files\Lesson10 folder) Audacity (binary provided in the C:\CIW\Site_Dev\Lab Files\Lesson11 folder) XAMPP (binary provided in the C:\CIW\Site_Dev\Lab Files\Lesson11\Lab_11-1\XAMPP folder) Network Technology Foundations To be installed before starting the course: Microsoft Windows Vista Business (typical installation) Microsoft Internet Explorer 8.0 (typical installation) Firefox (typical installation) To be installed during course labs: utorrent (binary provided in the C:\CIW\Network\Lab Files\Lesson01 folder) FileZilla_v (torrent file provided in the C:\CIW\Network\Lab Files\Lesson01 folder) 7-Zip (binary provided in the C:\CIW\Network\Lab Files\Lesson01 folder) FineCrypt 10.1 (binary provided in the C:\CIW\Network\Lab Files\Lesson05 folder) Installing and configuring Microsoft Windows Vista Business The three CIW v5 Foundations self-study courses can be completed without reinstalling the operating system for each course. Install Windows Vista Business with the default settings. The only requirement is that your system must be able to access the Internet in order for you to perform the hands-on labs in all CIW v5 Foundations self-study courses. Note: If you have already installed Windows Vista Business and have Internet access, you can skip this section. The instructions for installing Windows Vista Business are as follows: 1. Obtain a valid license for all copies of Windows Vista Business. 2. Begin setup by setting the boot sequence for your computer so that it will boot from the CD drive, then insert the Windows Vista Business CD-ROM and reboot. 3. When prompted, specify your installation language, time and currency format, and keyboard type. 4. When prompted, enter your 25-digit product key. 5. Accept the license terms.

21 xix 6. Specify to conduct a Custom (advanced) installation. Use the following parameters to perform a custom installation of Windows Vista Business. When This Information Is Required Partition Location Partition Size User Name Type Administrator Password Confirm Password Windows Protection Method Date, Time and Time Zone Settings Use Phase 1 Default (C:) Entire hard disk drive Phase 2 (after Windows formats and installs files to your hard disk drive) Your name password (all lowercase letters) password (all lowercase letters) Specify: Use Recommended Settings Customize for your location Configure Windows Vista Business for use in these courses by specifying the following settings: Specify a valid IP address 1. Log on as Administrator. 2. Select Start Control Panel, then double-click Network And Sharing Center. 3. Click the View Status link next to Local Area Connection, then click the Properties button to display the Local Area Connection Properties dialog box. 4. In the list box, click Internet Protocol Version 4 (TCP/IPv4), then click Properties to open the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box. 5. Select Use The Following IP Address, then manually enter the IP address information specific to your system. You can use DHCP if you prefer; however, prepare the system for networking. Note: Do not enter DNS configurations; you will configure DNS during the labs. 6. Click OK, then close all open dialog boxes and windows. Specify the CLASSROOM workgroup 1. Select Start Control Panel, then double-click System to open the System window. 2. In the Computer Name, Domain, And Workgroup Settings section, click the Change Settings link to display the Computer Name tab of the System Properties dialog box. Click the Change button. 3. In the Member Of section, click Workgroup, type classroom in the Workgroup field, click OK, enter your name and password when prompted, then restart your computer.

22 xx Disable the Windows Vista Business firewall 1. Select Start Control Panel, then double-click Windows Firewall to open the Windows Firewall window. 2. Click the Change Settings link to display the Windows Firewall Settings dialog box. Select Off (Not Recommended), then click OK. 3. Close all open windows. When you are finished configuring Windows Vista Business, verify that your system is working and that it can communicate with other systems on the Internet. Enabling the Fast User Switching feature and creating user accounts In the Internet Business Foundations course, there are a number of labs in Lesson 6 that require multiple users in order to demonstrate features. Fast User Switching is a feature of Windows Vista that allows multiple users to share the same computer workstation by making it possible for you to switch among users without logging off the computer. For example, suppose you send an message to another user. You can use Fast User Switching to log off as the user who sent the message, and then log on as the user who received the message, without closing the programs you were running as the user who sent the message. Note: You must enable the Fast User Switching feature and add two new user accounts in order to complete the labs in Lesson 6 that require multiple users. By so doing, you can play the part of both users (the sender and the recipient) as you advance through the lab steps. Fast User Switching is enabled by default in Windows Vista. Complete the following steps to add two new user accounts. 1. Click Start, then right-click Computer and select Manage. The Computer Management window will appear. 2. Expand Local Users And Groups, then right-click Users and select New User. The New User dialog box will appear. 3. Type a name of your choice for the new account (such as User1) and specify a password that meets the following criteria: The password must be at least six characters long. The password must contain a combination of at least three of the following characters: uppercase letters, lowercase letters, numbers, or symbols (e.g., punctuation marks). The password cannot contain the user's user name or screen name. 4. Deselect User Must Change Password At Next Logon, then click Create. 5. Repeat Steps 3 and 4 to create a new account for User2. 6. Close the New User dialog box and the Computer Management window. 7. Now, you will assign administrator privileges to the new user accounts. Select Start Control Panel User Accounts. Click the Manage Another Account link. 8. Click User1, then click the Change The Account Type link. Click Administrator, then click Change Account Type.

23 xxi 9. Click the Manage Another Account link, click User2, then repeat Step 8 to assign administrator privileges to User2. When you are finished, close the Control Panel window. 10. From the Windows Vista Desktop, click the Start button, then click the right arrow to the right of the lock icon in the lower-right corner of the Start menu window. Notice the Switch User option that appears at the top of the submenu. You use the Switch User option to specify the user account you want to use to log on to your computer. 11. Click the Switch User option. Notice that a screen appears displaying icons and names for all user accounts that have been assigned to your computer. 12. Click the icon that represents your user account (not one of the two new user accounts you just created) to log on to the system. You will use the two new user accounts in Lesson 6. Connectivity requirements Internet connectivity is required for this course. You will experience optimal performance with a dedicated Internet connection (e.g., a cable/dsl modem or a T1 line). However, you can complete the course using a slower connection (e.g., 56-Kbps modem). CIW v5 Foundations Self-Study Kit Companion CD-ROM Each coursebook includes a companion CD-ROM. The files on the CD-ROM are referenced and used throughout the course. When you insert the CIW v5 Foundations Self-Study Kit Companion CD-ROM, you will see a list of courses. Select the appropriate course, and you will be prompted to unzip an executable file. This executable file will create a directory of all supplemental materials for the course. You can choose to download the directory to the default location, which is C:\CIW\[Course_Title]. Optionally, you can select another location. After you choose the location and unzip the file, a directory will be created on your hard disk drive. All supplemental files for the course will be downloaded to this directory. You can then create a shortcut to this directory on your Desktop. As you perform the course labs, you can use this shortcut to access your lab files quickly. CIW v5 Foundations Movies The CIW Foundations courses offer movie files from LearnKey that discuss selected technology topics. To view the movies, log on to the CIW Online Campus at Use the coupon provided with your materials to register for the movies and view them online. If you have any questions, please contact Product Support at (866) or support@certification-partners.com. To view the movies, you need the following programs: Microsoft Internet Explorer 5.5 (or later) browser ( or Mozilla Firefox 3.0 (or later) browser ( Windows Media Player 9 (or later) and all necessary codecs Windows Update, to obtain the latest updates for the versions of Internet Explorer and Media Player you have installed on your computer Note: You will install Windows Media Player and Mozilla Firefox software on your system during labs in the Internet Business Foundations self-study course. Consider the following points about the CIW v5 Foundations Movies:

24 xxii The movies provide supplementary instruction in a multimedia format, and enhance the coursebook narrative and labs. However, movie content does not comprehensively address CIW Foundations exam objectives and is not intended to replace coursebook content. CIW Foundations coursebooks include a Movie Time appendix that indicates appropriate points at which to view the supplemental movies. The coupon provided allows you access to the CIW Online Campus to view the movies. Do not distribute the coupon to unauthorized users.

25 xxiii Conventions and Graphics The following conventions are used in this coursebook. Terms Lab Text Notations Program Code or Commands Technology terms defined in the margins are indicated in bold type the first time they appear in the text. However, not every word in bold type is a term requiring definition. Text that you enter during a lab appears in italic bold type. Names of components that you access or change in a lab appear in bold type. Notations or comments regarding screenshots, labs or other text are indicated in italic type. Text used in program code or operating system commands appears in the Lucida Sans Typewriter font. The following graphics are used in this coursebook. Tech Notes point out exceptions or special circumstances that you may find when working with a particular procedure. Tech Notes that occur within a lab are displayed without the graphic. Tech Tips offer special-interest information about the current subject. Warnings alert you about cautions to observe or actions to avoid. This graphic signals the start of a lab or other hands-on activity. The Movie Time graphic signals appropriate points in the course at which to view movie clips. All movie clips are 2009 LearnKey, Inc. Each lesson summary includes an Application Project. This project is designed to provoke interest and apply the skills taught in the lesson to your daily activities. Each lesson concludes with a summary of the skills and objectives taught in that lesson. You can use the Skills Review checklist to evaluate what you have learned. This graphic indicates a line of code that is completed on the following line.

26 xxiv

27 1Lesson 1: Introduction to IT Business and Careers Objectives By the end of this lesson, you will be able to: 1.1.1: Distinguish between individual job roles within the IT industry and the IT profession as a whole : Identify responsibilities, tasks and skills of a Web site designer : Distinguish between a Web architect and a Web application developer : Identify responsibilities, tasks and skills of a Web site analyst : Identify responsibilities, tasks and skills of a Web site manager : Identify responsibilities, tasks and skills of a database administrator : Identify responsibilities, tasks and skills of a server administrator, including e- mail/groupware administrator, Web server administrator : Identify responsibilities, tasks and skills of a network engineer : Distinguish between a security manager and a security analyst/consultant : Identify responsibilities, tasks and skills of a PC repair technician : Identify responsibilities, tasks and skills of a help desk technician : Identify responsibilities, tasks and skills of a Web marketing professional : Interpret a common business organization chart, including identifying duties of a Chief Executive Officer (CEO) versus a Chief Operations Officer (COO) : Explain Internet history, define current protocols (e.g., IPv4, IPv6, related protocols), and identify timelines and models for technology adoption curves such as (e.g., Moore's Law, Geoffrey Moore's technology adoption life cycle, and Kuhn's concept of paradigm shifts) : Explain common models for information flow and reporting between IT and upper management, as well as IT and other areas of the organization, including identifying project approval steps, SWOT analysis, data modeling vs. business ontology.

28 1-2 Internet Business Foundations : Identify the importance of quality management and assurance, including ISO 9000 standards : Identify and explore career opportunities in the IT industry that relate to personal career goals : Conduct job searches : Use Internet technology to obtain employment, including employment sites and networking sites such as LinkedIn : Create a résumé and place it in an appropriate file format (e.g., ASCII, HTML, RTF, PDF) : Determine the relevance and necessity of education as job roles, responsibilities and technologies change : Communicate technical issues and concerns to an end user : Demonstrate the value of IT-related expenses to management and stakeholders.

29 Lesson 1: Introduction to IT Business and Careers 1-3 Pre-Assessment Questions 1. In which job role does an individual determine the visibility of Web sites across multiple clients and search engines? a. Web site analyst b. Network engineer c. SEO analyst d. Server administrator 2. In computer science and Web technology, what is ontology? a. The return-on-investment (ROI) impact of IT decisions on an organization's bottom line b. The tendancy for organizational and market changes to occur in a revolutionary manner c. The process of determining the requirements that a database must fulfill in order to function properly for an organization d. The study of how a particular part of a company, called a domain, is organized 3. Why is it important for people who want jobs in the IT industry to have good communication skills?

30 1-4 Internet Business Foundations Information Technology (IT) Information Technology (IT) The management and processing of information using computers and computer networks. OBJECTIVE 1.1.1: Individual IT job roles NOTE: Project management concepts and techniques will be presented extensively in a later lesson. OBJECTIVE 1.1.2: Web site designer job role Web site designer An individual who is responsible for the organization and appearance of a Web site. Information Technology (IT) refers to all aspects of managing and processing information using computers and computer networks. Because computers are vital to information management in all organizations and companies, most organizations have dedicated computer personnel referred to as IT departments. IT departments generally deal with computer, telecommunications, network and other related technologies and services to provide employees with the resources necessary to reach their organizations' goals. Information Technology is one of the fastest-growing career fields in the world today. IT skills are essential in all industries and are necessary in many different job roles. IT Job Roles The following sections will identify the various job roles in the IT industry, including the responsibilities, tasks and skills they encompass. As you will see, many of the responsibilities and skills overlap, so distinctions between job roles are not always precise. Many of the job roles listed in this section are integral components of most organizations. However, many are outsourced to contractors in the United States or, increasingly, sent offshore to be performed by qualified personnel in developing countries. By incorporating business and project management skills into your skill set, you will make yourself more marketable for employment in the U.S. IT industry. Adopting a holistic perspective Competent IT professionals understand how their work affects others. Therefore, a professional must have a working knowledge of various IT concepts and practices relevant to the company. A holistic perspective the ability to place a particular technology or practice in context with the entire company is vital. A holistic perspective in relation to IT involves understanding the needs of the business, as well as the various technologies required to design and deliver specific products. These products may be software designed by the company, services provided by the company or marketing pieces such as HTML-based and Web sites. As you learn about the IT profession, take the time to consider how all of the job roles discussed here must work closely with each other in order to create effective business solutions. Web site designers Web site designers create the "look and feel" that visitors will see when they access a site on the World Wide Web. Web site designers determine the most effective site layouts, color schemes, navigational links and fonts to maintain visitor interest in the site. Site designers primarily establish the organization, mood and tone of the site relative to its content, with input from various parties. These parties include members of the marketing, sales and IT departments. In short, Web site designers are responsible for developing the user interface and aesthetics of a Web site, given input from those who know the company s audience and the company's technological abilities. Web site designers must understand Web development technology and be proficient in Web languages such as Hypertext Markup Language (HTML), CSS, JavaScript; graphics applications such as Flash and Silverlight, Photoshop, Fireworks and the GIMP; and Web site development applications such as Adobe Dreamweaver and Microsoft Expression. They must also possess good communication, organizational and visual design skills.

31 Lesson 1: Introduction to IT Business and Careers 1-5 Web site designers work closely with other departments within organizations and with potential site viewers to determine the information and format that the site will present online. NOTE: Knowledge of HTML is not required to complete this lab. The HTML code you type is for demonstration only. Figures 1-1 and 1-2 show two different designs for the same Web site. Figure 1-1 shows a Web page with rudimentary formatting applied. A Web site designer may look at this page, determine that the page will not effectively grab the attention of potential viewers, and change the formatting and color scheme to make the page more interesting, thereby increasing viewer awareness of and participation in the Web site. Figure 1-1: Web site design plain Web page Figure 1-2 shows the same Web page with additional formatting applied. Notice that this Web page is more interesting and easier to read than the preceding Web page. Figure 1-2: Web site design more interesting Web page In the following lab, you will review basic Web site design concepts. Suppose you are the Web site designer for your company. Your project manager has asked you to prepare several prototypes of the Summer Youth Blitz Web page for Habitat For Humanity. What formatting attributes or images would you use to increase the page's visual appeal? Lab 1-1: Exploring basic Web site design concepts In this lab, you will modify an HTML page to make it more aesthetically pleasing and informative. 1. First, you will view the existing HTML page and consider ways to improve it. Open Windows Explorer and navigate to the C:\CIW\Internet\Lab Files\Lesson01 folder.

32 1-6 Internet Business Foundations NOTE: This course assumes that the default browser is Mozilla Firefox. All screen captures that use the default browser will appear in Firefox. 2. Double-click the Lab_1-1 folder, then double-click Blitz.html. This step opens your default browser and displays the Web page shown in Figure 1-3. Note: If you want to display file name extensions in Windows Explorer, select Organize Folder And Search Options, then click the View tab. Deselect Hide Extensions For Known File Types, click the Apply button, then click OK. Figure 1-3: Viewing Web page for design qualities Consider the following points about this Web page: The page provides a clear explanation of the Habitat For Humanity Summer Youth Blitz and offers a link to an application form. The page contains some graphical content, such as the side bar. The World Wide Web lends itself to graphical content. If you add the right image, you will better convey the page's message. An image can also increase the attractiveness of the page. What technologies are necessary to deliver this page? Consider the different parties that need to coordinate with each other in order for this to occur, including network engineers, server administrators, database administrators and designers. Suppose that as a Web site designer, you have decided to add an image. Working with a graphic artist, you have created an image and want to insert this image into the page. 3. Next, you will change the HTML file so that it is more aesthetically pleasing. Close your browser window. 4. In Windows Explorer, double-click SYB.jpg to display the image that you will add to enhance the existing Web page. 5. Close the image file. 6. In Windows Explorer, right-click Blitz.html, then click Properties. The Properties dialog box will display. 7. Verify that the Read-Only check box is deselected, then click OK. This step ensures that you will be able to edit the HTML file.

33 Lesson 1: Introduction to IT Business and Careers In Windows Explorer, right-click Blitz.html, then click Open With Notepad. This step opens the Notepad application. You will see the HTML code display in the Notepad window. NOTE: In Step 10, ensure that you type the HTML code on one line exactly as written. 9. Scroll down approximately 90 percent of the file until you see the gap immediately before the following line: <P>Summer Youth Blitz is a unique service experience for a 10. In the white space two lines above the preceding text, type the following code: <img src="syb.jpg" width="300" height="222" border="0" alt="do something real this summer - build a home for a family" /> Note: Ensure that the above code displays as a single line. The HTML code (including your newly inserted code) should match Figure 1-4. Figure 1-4: Inserting HTML code 11. Press CTRL+S to save the changes, then close the Notepad window. 12. Open Blitz.html in your Web browser. The modified Web page should appear as shown in Figure 1-5. Figure 1-5: Improved Web page

34 1-8 Internet Business Foundations NOTE: If you are using Microsoft Internet Explorer as your default browser, the pop-up box will appear. If you are using Mozilla Firefox, you will need to load the POPUP ALT add-on (Tools Add-Ons) and restart Firefox in order for the pop-up box to appear. OBJECTIVE 1.1.3: Web architect vs. Web application developer Web application developer An individual who develops primarily server-side Web applications. Web architect An individual who creates the overview plan of a Web site's development. OBJECTIVE 1.1.4: Web site analyst job role Web site analyst An individual who analyzes Web site statistics to determine the site's effectiveness. 13. Position the mouse pointer over the inserted graphic. Notice that a pop-up box with the text "Do something real this summer - build a home for a family" displays for several seconds. 14. Consider ways that adding this new image helps convey the message contained in this page's text. You have just helped enhance the design of this page. 15. Close the browser window. In this lab, you considered Web site design issues and modified a page. You now have a better understanding of the Web site designer job role. Web application developers and Web architects Web application developers use Web programming languages or products to develop Web sites, generally for Web server applications. Web application developers design, build and test the Web pages and hyperlinks that form the site. Web application developers must be proficient in programming and scripting languages such as Java, JavaScript, C++, Perl and others. Web application developers may also lead project teams that design Web applications, so strong project management and analytical abilities are desirable skills for this job role. Web architects are responsible for the overview plan of a Web site's development. They consult with management and Web site users to design and implement the plan for developing and maintaining an organization's Web site. They often manage Web site designers and Web application developers to design, develop, document and maintain an organization's Web presence. Web architects must have solid project management, organizational and communication skills in order to provide technical leadership to an application development staff. Web site analysts Web site analysts are responsible for analyzing Web site effectiveness from the viewpoints of both the organization and the end user. Analysts may design and conduct user surveys to obtain feedback about Web site features, then provide recommendations to improve the site's effectiveness. Analysts may also develop and monitor Web site tracking methods to determine the number of visitors, or "hits," a site receives. Good analytical and communication skills are required for Web site analysts. Analysts gather and analyze statistical data, and often work with IT and marketing departments to recommend ways to increase a Web site's effectiveness. An analyst can also spend a considerable amount of time writing HTML, as well as creating graphics and writing client-side code such as JavaScript and VBScript. Figure 1-6 shows an example of a Web site usage summary report generated by a Web site analyst. The report indicates that Web traffic remained relatively steady for several months, then declined dramatically in August. A Web site analyst would use these statistics, along with other research, to provide information to marketing and sales departments about their efforts. For example, if data shows that traffic increases with concentrated marketing efforts, then the Web site can be used to measure marketing success.

35 Lesson 1: Introduction to IT Business and Careers 1-9 dead link A hyperlink that, when clicked, sends a Web site visitor to a page or resource that does not exist on the server. OBJECTIVE 1.1.5: Web site manager job role Web site manager An individual who manages a Web development team. Figure 1-6: Web site usage report A Web site analyst will probably be called to examine the data further to see whether decreased traffic has translated into decreased profitability for the company. Data analysis also has technical uses. For example, you can review usage statistics to help the IT department plan for increases in Web activity that accompany concentrated marketing efforts. It may become necessary to obtain a larger server or plan for more bandwidth if Web traffic is anticipated to increase dramatically. Finally, an analyst may be asked to make technical changes to the site. Such changes may include modifying HTML, updating server-side scripts to eliminate errors, and finetuning database connectivity. One common activity of a Web site analyst is to look for evidence of locations at which visitors become confused, or get sent to missing pages, called dead links. One possible indicator of a dead link is the "404 Page Not Found" error, which you may see in a Web server log file. Regardless of the specific activities you undertake, if you are an effective Web site analyst, your Web site will operate more efficiently, from both a sales-and-marketing perspective and a technical perspective. Web site managers A Web site manager in a large organization generally manages the Web development team. A Web site manager in a small company could perform all the Web development job roles discussed previously. In short, Web site managers provide organizational leadership for Web site content and all related initiatives. Web site managers are typically involved in standardizing the content, style, design and development procedures required to create and maintain an organization's Web site. Site managers also assess the costs and benefits of implementing these standards. Site managers may also evaluate alternative Web technologies and standards, and train Web designers and application developers. Web site managers do not necessarily need to possess highly technical skills. However, they must demonstrate the ability to remain up-to-date in their knowledge and understanding of current Web technologies and processes. Site managers must also possess the ability to analyze, interpret and integrate a wide variety of data, evaluate Web resource utilization, forecast customer and organizational site needs, and anticipate and resolve ethical issues related to site content and design.

36 1-10 Internet Business Foundations OBJECTIVE 1.1.6: Database administrator job role database administrator An individual who is responsible for the maintenance and security of an organization's database resources and data. NOTE: Databases will be discussed in greater detail in a later lesson. OBJECTIVE 1.1.7: Server administrator job roles server administrator An individual who manages and maintains network servers. Database administrators Databases store and manage information. Databases are used in all areas of an organization to store information related to employees, vendors, customers, inventory, resources and so on. The power of databases lies in their ability to organize, sort and access information to meet specific user requirements. Database administrators are responsible for the maintenance and security of an organization's database resources and data. They are also responsible for researching and analyzing the latest database technologies and developments, and for providing recommendations to senior management about database use and information management procedures and standards. Database administrators develop and implement database maintenance plans to check the integrity of the data, manage the physical resources necessary to store and manipulate the data, administer and enforce data usage standards, and audit database systems to maintain system performance. Database administrators also manage backup and recovery procedures to prevent data loss, and apply database software upgrades and repairs as needed. Database administrators must be able to judge system effectiveness and efficiency, analyze information to propose solutions and solve problems, evaluate the impact of resource allocations, and communicate effectively with senior management when discussing the benefits and risks of proposed technology solutions. Server administrators Server administrators are responsible for designing, implementing, managing and maintaining network servers, and associated applications and peripheral devices. Server administrators may also implement policies and procedures for ensuring the security and integrity of the servers and network, and protect the network from viruses and other intrusion threats, such as hacking. Other responsibilities include providing technical assistance and training to IT staff and system users, troubleshooting server and network problems, implementing cost-effective solutions, suggesting and implementing system improvements, and providing data backup services. Server administrators should be proficient in a variety of network operating systems and applications, such as Windows, UNIX/Linux, Microsoft Internet Information Services (IIS), Microsoft SQL Server and Microsoft Exchange. They should also be familiar with Web technologies such as HTML, Extensible Markup Language (XML) and File Transfer Protocol (FTP), and applications such as Adobe Dreamweaver. In addition to possessing strong technical skills, server administrators must display strong communication skills so they can distill complex server and network issues into understandable concepts upon which senior management can make decisions and users can take action. Communication skills also include project management skills, as you will learn later in this lesson. Server administrators can be classified into subcategories, such as Web server administrators or /groupware administrators. Web server administrators are responsible for servers that act as gateways between the organization and the Internet. E- mail/groupware administrators are responsible for network servers upon which clients and groupware (software that enables groups of people in a local area network [LAN] to organize their activities) are located. /groupware administrators install and maintain clients, develop and maintain security procedures to protect the integrity of electronic data transfers, and analyze and recommend improvements for utilization, capacity and performance.

37 Lesson 1: Introduction to IT Business and Careers 1-11 OBJECTIVE 1.1.8: Network engineer job role network engineer An individual who manages and maintains a network infrastructure. NOTE: LANs, WANs, IPv4 and IPv6 will be presented later in this lesson. OBJECTIVE 1.1.9: Security manager vs. security analyst/consultant security manager An individual who manages the security measures used to protect electronic data. security analyst/consultant An individual who examines an organization's security requirements and determines the necessary infrastructure. Network engineers Network engineers focus on the design, implementation, delivery and support of network components, policies and procedures used by an organization. Network engineers are responsible for configuring and testing network devices, and setting up and maintaining the network infrastructure. Network engineers also analyze, design and implement networking technologies to better meet the needs of the organization and the network users. Network engineers support and maintain network devices such as Web servers, servers, routers, connecting cables and so forth. Network engineers may also be responsible for system security, data backup, disaster recovery planning and virus protection. Network engineers must be able to implement LANs and wide area networks (WANs), and be proficient in a variety of networking skills, such as routing and switching, network traffic analysis, and device configuration and testing. Network engineers must also be knowledgeable in a variety of network technologies and protocols, such as network communication media, Virtual Private Networks (VPNs), firewalls, Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6). Network engineers must also possess excellent communication skills to be able to present technical information in an understandable way to management, non-technical associates and customers. Convergence technologies and information technology Traditionally, telephone networks have been limited to sending voice data (e.g., telephone calls). Since the mid-1990s, however, telephone networks have increasingly transported network-based data. Any equipment used to carry voice/data and run by telephone companies is called a telephony network. Similarly, data networks have traditionally been limited to sending standard network data (such as files from a Windows client to a Windows server via TCP/IP). Increasingly, however, voice and data networks have been combined, or converged, creating convergent networks. Convergent networks can help reduce cost to companies and organizations. Increasingly, Internet connections are used to carry voice communication. Network engineers are often asked to manage these networks. Security managers and security analysts/consultants Security managers are responsible for managing the security measures used to protect electronic data. They maintain the software and procedures necessary to protect the confidentiality and integrity of information, and legitimate access to it. Security managers perform security risk assessments, prepare for disaster recovery, monitor security control systems to ensure that appropriate security clearances and information access levels are maintained, and work with other departments to maintain secure data and information flow. Security managers may also implement and document the organization's security policies and procedures, provide security training to management and employees, and monitor and recommend advancements in information security technologies. Security analysts/consultants are responsible for examining an organization's security requirements and determining the hardware, communications and software capabilities needed to satisfy the requirements. Security analysts/consultants may lead project teams that perform risk assessment, information security program development and implementation, network security architecture review and design, product reviews, and security solution deployments. In addition to the technical skills related to information security, security analysts/consultants should have strong project management, consulting and

38 1-12 Internet Business Foundations communication skills. They will often manage security-related projects, write technical reports understandable to non-technical readers and communicate recommendations to senior management. search engine optimization (SEO) The process of improving the volume and quality of traffic to a Web site by structuring content to improve search engine ranking. A specific activity of Internet marketing. SEO analyst An individual who determines the visibility of Web sites across multiple clients and search engines. OBJECTIVE : Web marketing manager job role Web marketing manager An individual who develops and implements plans to exploit the Internet for marketing and sales opportunities. Security managers and analysts/consultants should possess knowledge of server operating systems (Windows, UNIX/Linux, etc.), firewall technology, virus-scanning software, security management software, security assessment software, intrusiondetection systems, VPNs, and so forth. SEO analysts Search engine optimization (SEO) is the process of improving the volume and quality of traffic to a Web site based on the relevance of the site to search terms entered into a search engine. Generally, the higher a site ranks (i.e., the earlier it appears in search engine results pages), the more searchers will visit that site. SEO analysts are responsible for performing keyword research to determine the visibility of Web sites across multiple clients and search engines. SEO analysts will often work with the marketing team to develop interactive marketing strategies to increase Web site visiblity. SEO analysts should have a basic knowledge of HTML, CSS, JavaScript and other programming languages; experience in keyword research; and familiarity with search engine ranking, traffic and analysis software. SEO analysts should also possess strong analysis and writing skills, as well as communication and teamwork skills. Analysts must be able to analyze and summarize data, and present anaytical reports. Web marketing managers Web marketing managers are responsible for developing and implementing plans to take advantage of the sales and marketing opportunities available through the Internet. They help define their companies' objectives for using electronic commerce (e-commerce) and decide which computer applications are needed to achieve them. Internet marketing managers must possess knowledge of Internet-based applications and be able to analyze Web site traffic in order to develop recommendations to improve their companies' search engine optimization capabilities. Internet marketing managers must also possess business management and project management skills in order to develop budgets for projects, monitor project costs, provide status reports to management, and incorporate feedback from management. They must also possess strong analysis and writing skills, as well as communication and teamwork skills. Blog managers Blogging has become increasingly important to marketing a company, product or service. A well-run blog will discuss relevant topics. A blog manager has the following responsibilities: Publishing of articles in a timely manner. Ensuring that content is relevant. Enforcing quality control, including proper tone, grammar and spelling. Maintaining the blogging site or account. Coordinating writers to ensure that entries are made consistently.

39 Lesson 1: Introduction to IT Business and Careers 1-13 Archiving and organizing blog, audio and video entries so that content can be searched and retrieved for later use. OBJECTIVE : PC repair technician job role PC repair technician An individual who installs, modifies and repairs personal computer (PC) hardware components. NOTE: Consider the A+ certification with respect to PC repair and help desk technicians. OBJECTIVE : Help desk technician job role help desk technician An individual who diagnoses and resolves users' technical hardware and software problems. Managing talent, because many bloggers feel a sense of celebrity and think they need not keep to a schedule. A blog manager should understand how to work with these types of personalities. PC repair technicians Personal computer (PC) repair technicians install, modify and repair personal computer hardware components, such as PCs, disk drives, CD/DVD drives, tape devices, monitors, keyboards, data input devices and other peripheral equipment. PC repair technicians also install software, such as PC operating systems and application programs. PC technicians should be familiar with operating system and application program functionality in order to test and modify system functions to ensure proper performance. PC technicians need to possess communication skills in order to provide technical assistance and training to end users, answer user inquiries regarding PC operations, diagnose hardware problems, and provide solutions. In addition, PC technicians must be able to use standard shop tools, such as soldering equipment, power tools and hand tools. PC technicians also need to be aware of standard safety procedures associated with the repair and maintenance of electronic equipment. Help desk technicians Help desk technicians diagnose and resolve users' technical hardware and software problems. Help desk technicians typically receive questions from users who are having problems using computer hardware or software, or who want to know how to use a specific software application. Technicians must use their knowledge of hardware, operating systems, applications and any relevant procedures to determine the sources of problems and provide solutions. Technicians may need to research problems with co-workers, programmers, IT staff, hardware vendors or software vendors in order to provide solutions. Technicians may also be involved in testing hardware and software to evaluate their ease of use, and to determine their applicability to the current work environment. Help desk technicians must possess knowledge specific to the hardware, operating systems and software used by the organization. They must also possess strong communication skills to effectively discuss, troubleshoot and solve user problems, usually by telephone. Help desk technicians may also be responsible for documenting their troubleshooting and problem-solving activities, escalating problems they cannot solve that require immediate resolution, and making recommendations to senior management to streamline or improve help desk functions. Project management and IT responsibilities The following additional skills are necessary to become a successful IT professional: The ability to plan projects, which includes estimating costs for software, hardware and labor, as well as working with management to obtain project approval Writing skills, so that plans can be distributed to all relevant individuals The ability to work with vendors to obtain cost and time estimates for the proper software and equipment

40 1-14 Internet Business Foundations All IT workers must have some project management skills to excel at their positions and lead projects. OBJECTIVE : IT career goals OBJECTIVE : Job searches IT job skills in the future In most organizations, the current IT career model approximates a pyramid with many entry-level positions at the bottom, and fewer positions available as you move up the hierarchy. Many IT managers believe that the future IT career model will be diamondshaped: few entry-level jobs (because of offshore outsourcing of many IT positions), many mid-level positions, and few high-level positions. In the diamond-shaped model, managers foresee a lack of experienced professionals to fill the mid-level positions. Smaller companies that do not outsource due to scale may be the source of mid-level IT jobs required in larger organizations. It is increasingly important that IT professionals possess general business knowledge, negotiating skills, intercultural skills and project management skills. As an IT professional, you must be able to make informed decisions and fulfill commitments. If your company has outsourced some of its positions and you are working with foreign personnel, you may be able to avoid typical cross-cultural problems by doing the following: Learning common greetings or phrases in other languages Learning about common cultural misunderstandings so you can avoid them Developing good listening skills to better understand processes, issues and so forth that may be communicated to you in various ways Developing good communication skills to better disseminate information to those with whom you work IT Industry Career Opportunities IT refers to all aspects of managing and processing information using computers and computer networks. IT departments generally deal with computer, telecommunication, network and other related technologies and services to provide employees with the resources necessary to reach their organizations' goals. IT is one of the fastest-growing career fields in the world today. IT skills are essential in all industries and are necessary in many different job roles. The following sections will explore methods you can employ to conduct effective job searches, create résumés, and take advantage of educational degree programs and certifications to provide you with the skills, training and competitive advantage you need when searching for the IT job of your choice. Conducting job searches You can employ many methods to explore career opportunities in the IT (or any) industry, such as: Participating in on-campus interviews (if you are a college/university student). Searching the newspaper classified ads for jobs. Visiting employment agencies and employment placement services. Attending job or career fairs. Volunteering for positions related to your career interests.

41 Lesson 1: Introduction to IT Business and Careers 1-15 Seeking part-time work through temporary employment agencies or internships. Networking (socially) and gathering employment information from friends, acquaintances, business associates and association members. OBJECTIVE : Internet technology and employment Working with an executive search firm. Mailing cover letters and résumés to targeted organizations. Applying in person directly to targeted employers. Entering résumés electronically in database placement services or posting them on appropriate Web sites. Using Internet technology to conduct job searches. The traditional methods of seeking employment (for example, classified ads, job and career fairs, and so forth) are perhaps the most common but least effective means of gaining employment, especially when these methods are not combined with other methods. A combination of some or all of these methods would be the most effective way to conduct a job search. However, using Internet technology may be the most effective means of gathering information about different job roles and responsibilities, and conducting a job search. Using the Internet to conduct job searches You can browse Usenet newsgroups using Google Groups ( and use a variety of search engines to search the Internet for information about career opportunities in the IT industry. By entering keywords to narrow your search to specific job types, you can retrieve available job listings that relate to your personal career goals. The following sites (and many others) provide information about careers and contain thousands of job listings: Guru.com ( Excite Careers ( Yahoo! HotJobs ( GoFreelance ( Freelance Switch Job Listings ( All Freelance Directory ( Sologig ( Monster ( CollegeRecruiter.com ( The Wall Street Journal's CareerJournal ( Payscale ( CareerBuilder.com ( Building a personal network The Internet provides opportunities for you to network with business associates and other people who may be able to provide job leads. Sites such as LinkedIn ( allow you to build a professional profile online similar to a résumé, listing current and past job positions, skills, and education. You can then form links or

42 1-16 Internet Business Foundations connections to other people on the site with whom you have worked or associated. You and your connections become a network through which you can find other people you know or with whom you have professional skills or interests in common. Users can also write and post professional recommendations for each other. Other professional networking sites include Spoke ( ZoomInfo ( Jigsaw ( and Plaxo ( As you evolve from being a Web consumer to being a Web producer of goods and services, consider the importance of using various sites to build your network. In the following lab, you will search a major Web site devoted to job listings in numerous fields. Assume you are a recent college graduate with a bachelor's degree in computer science. After a summer of working as a computer repair technician in your uncle's computer service and repair shop, you decide that you want to pursue a career as a network engineer or systems administrator. You can use Internet technology to search for entry-level jobs that are suitable to your career goals. Lab 1-2: Using Internet technology to conduct job searches In this lab, you will use the Monster Web site to search for information about IT careers. 1. Select Start All Programs Mozilla Firefox Mozilla Firefox to start the Firefox browser. 2. Click in the Location Bar, type then press ENTER. The Monster home page and search engine will appear, as shown in Figure 1-7. Figure 1-7: Monster home page 3. Click in the Search Jobs text box, type network engineer, then press ENTER. This step accesses the Job Search Results page and retrieves all job listings containing the specified keywords in the job descriptions. 4. Click several hyperlinks and view the job descriptions and requirements. Click the Back button in the toolbar to return to the search results page after viewing each hyperlink.

Classroom Setup Guide

Classroom Setup Guide Classroom Setup Guide-1 Classroom Setup Guide The Classroom Setup Guide is divided into three sections: 1. Before You Begin This section includes courseware update links for instructors, a revision history

More information

Web Foundations Series Internet Business Associate

Web Foundations Series Internet Business Associate Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved

More information

Optional Lab 1-1: Learning about Internet standards organizations

Optional Lab 1-1: Learning about Internet standards organizations Optional Lab Answers-1 Optional Lab 1-1: Learning about Internet standards organizations In this optional lab, you will visit Web sites that provide information about various Internet standards organizations.

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

Online International Business Certificate Programs

Online International Business Certificate Programs Online International Business Certificate Programs User s Guide for Students Copyright 2007, Bisk Education, Inc., and Thunderbird School of Global Management. All rights reserved. i Table of Contents

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Sage HRMS 2014 Sage Employee Self Service

Sage HRMS 2014 Sage Employee Self Service Sage HRMS 2014 Sage Employee Self Service Pre-Installation Guide October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright 2013. Sage Software, Inc. All rights

More information

Windows Peer-to-Peer Network Configuration Guide

Windows Peer-to-Peer Network Configuration Guide Windows Peer-to-Peer Network Configuration Guide Windows Peer-to-Peer Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication

More information

Online Master of Science in Information Technology Degree Program User s Guide for Students

Online Master of Science in Information Technology Degree Program User s Guide for Students Online Master of Science in Information Technology Degree Program User s Guide for Students Copyright 2006, Bisk Education, Inc., and Florida Tech. All rights reserved. i Online User s Guide for Students

More information

How To Set Up A Thermal Cycler With Veritilink Remote Management Software

How To Set Up A Thermal Cycler With Veritilink Remote Management Software Installation Guide VeritiLink Remote Management Software Version 1.0 Installation Guide Getting Started VeritiLink Remote Management Software Version 1.0 Setting Up the Veriti Thermal Cyclers Setting

More information

EVALUATION COPY. Site Development Associate. Self-Study Guide Web Foundations Series. CCSSM-CF2SDF-PR-1208 version 2.0 rd082712

EVALUATION COPY. Site Development Associate. Self-Study Guide Web Foundations Series. CCSSM-CF2SDF-PR-1208 version 2.0 rd082712 Site Development Associate Self-Study Guide Web Foundations Series CCSSM-CF2SDF-PR-1208 version 2.0 rd082712 Site Development Associate Self-Study Guide President/Chief Certification Architect James Stanger,

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Web Design Specialist. (Adobe CS6 Web Edition) Self-Study Guide Volume 1 Web Design Series. CCSSM-CDWDSG-PR-1305 version 1.

Web Design Specialist. (Adobe CS6 Web Edition) Self-Study Guide Volume 1 Web Design Series. CCSSM-CDWDSG-PR-1305 version 1. Web Design Specialist (Adobe CS6 Web Edition) Self-Study Guide Volume 1 Web Design Series CCSSM-CDWDSG-PR-1305 version 1.1 rd05 13 Web Design Specialist (Adobe CS6 Web Edition) Self-Study Guide Volume

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Sentinel Management Server

Sentinel Management Server Sentinel Management Server Installation, Reinstallation, and Upgrade Guide Server Sentinel 4.4.3 and Higher April 2007 . unisys imagine it. done. Sentinel Management Server Installation, Reinstallation,

More information

Server Management 2.0

Server Management 2.0 Server Management 2.0 Installation and Configuration Guide Server Management 2.0 and Higher May 2008 . unisys imagine it. done. Server Management 2.0 Installation and Configuration Guide Server Management

More information

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide APPLICATION VERSION: 9.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

Getting Started with Microsoft Office Live Meeting. Published October 2007

Getting Started with Microsoft Office Live Meeting. Published October 2007 Getting Started with Microsoft Office Live Meeting Published October 2007 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

Student ANGEL FAQs. General Issues: System Requirements:

Student ANGEL FAQs. General Issues: System Requirements: Student ANGEL FAQs General Issues: What is ANGEL? How do I log in? What is my username and password? How do I activate my account? I forgot my C number/password, what do I do? I registered after the first

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information

More information

Windows Domain Network Configuration Guide

Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication may

More information

Appendix B Lab Setup Guide

Appendix B Lab Setup Guide JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course

More information

Site Development Associate. Academic Student Guide Web Foundations Series. ECL02-CFSDFN-PR-1208 version 2.0 rd072212

Site Development Associate. Academic Student Guide Web Foundations Series. ECL02-CFSDFN-PR-1208 version 2.0 rd072212 Site Development Associate Academic Student Guide Web Foundations Series ECL02-CFSDFN-PR-1208 version 2.0 rd072212 Site Development Associate Academic Student Guide President/Chief Certification Architect

More information

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Virtual CD v10. Network Management Server Manual. H+H Software GmbH Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual

More information

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0 Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:

More information

Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009

Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009 Getting Started with Microsoft Office Live Meeting Published October 2007 Last Update: August 2009 Information in this document, including URL and other Internet Web site references, is subject to change

More information

RealPresence Platform Director

RealPresence Platform Director RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Ascent Capture 5 Web Validation Server Getting Started with Ascent Capture Web Validation Server

Ascent Capture 5 Web Validation Server Getting Started with Ascent Capture Web Validation Server Ascent Capture 5 Web Validation Server Getting Started with Ascent Capture Web Validation Server 10300253-000 Revision A Copyright Copyright 2001 Kofax Image Products. All Rights Reserved. Printed in USA.

More information

Frequently Asked Questions for the USA TODAY e-newspaper

Frequently Asked Questions for the USA TODAY e-newspaper Frequently Asked Questions for the USA TODAY e-newspaper Navigating the USA TODAY e-newspaper A look at the toolbar Toolbar Functions, Buttons, and Descriptions The tab marked Contents will take the e-reader

More information

Fiery E100 Color Server. Welcome

Fiery E100 Color Server. Welcome Fiery E100 Color Server Welcome 2011 Electronics For Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45098226 27 June 2011 WELCOME 3 WELCOME This Welcome

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Installation and Program Essentials

Installation and Program Essentials CS PROFESSIONAL SUITE ACCOUNTING PRODUCTS Installation and Program Essentials version 2010.x.x TL 22538 (5/25/10) Copyright Information Text copyright 1998 2010 by Thomson Reuters/Tax & Accounting. All

More information

Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide

Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide Microsoft Corporation Published: October 2010 Abstract This step-by-step guide walks you through the

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Setup and Configuration Guide for Pathways Mobile Estimating

Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of

More information

Attachment E ACCESSING THE FCC NETWORK USING WINDOWS 95/98 FOR ULS FILING

Attachment E ACCESSING THE FCC NETWORK USING WINDOWS 95/98 FOR ULS FILING Attachment E ACCESSING THE FCC NETWORK USING WINDOWS 95/98 FOR ULS FILING This attachment describes how to use Windows 95/98 Dial-Up Networking to establish a direct connection from your PC to the FCC

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Kaspersky Password Manager

Kaspersky Password Manager Kaspersky Password Manager User Guide Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most questions that may arise.

More information

Network Scanner Tool R3.1. User s Guide Version 3.0.04

Network Scanner Tool R3.1. User s Guide Version 3.0.04 Network Scanner Tool R3.1 User s Guide Version 3.0.04 Copyright 2000-2004 by Sharp Corporation. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,

More information

Classroom Setup Guide

Classroom Setup Guide Classroom Setup Guide-1 Classroom Setup Guide The Fundamentals of CGI Using Perl Classroom Setup Guide is divided into three sections: 1. Before you begin includes Courseware Update links for instructors,

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

WEB DEVELOPMENT CAREERS WEB DEVELOPMENT WEB DEVELOPMENT STARTER PACK WEB DEVELOPMENT CAREERS

WEB DEVELOPMENT CAREERS WEB DEVELOPMENT WEB DEVELOPMENT STARTER PACK WEB DEVELOPMENT CAREERS WEB DEVELOPMENT CAREERS WEB DEVELOPMENT WEB DEVELOPMENT STARTER PACK WEB DEVELOPMENT CAREERS 1 CONTENTS PAGE 3 - Technical support guidelines 7 - Hardware and software requirements 9-3 month timetable

More information

Paul McFedries. Home Server 2011 LEASHE. Third Edition. 800 East 96th Street, Indianapolis, Indiana 46240 USA

Paul McFedries. Home Server 2011 LEASHE. Third Edition. 800 East 96th Street, Indianapolis, Indiana 46240 USA Paul McFedries Microsoft Windows9 Home Server 2011 LEASHE Third Edition 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of Contents Introduction 1 Part I Unleashing Windows Home Server Configuration

More information

HP EMAIL ARCHIVING SOFTWARE FOR EXCHANGE

HP EMAIL ARCHIVING SOFTWARE FOR EXCHANGE You can read the recommendations in the user guide, the technical guide or the installation guide for HP EMAIL ARCHIVING SOFTWARE FOR EXCHANGE. You'll find the answers to all your questions on the HP EMAIL

More information

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Troubleshooting File and Printer Sharing in Microsoft Windows XP Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows

More information

FileMaker Server 7. Administrator s Guide. For Windows and Mac OS

FileMaker Server 7. Administrator s Guide. For Windows and Mac OS FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark

More information

VPOP3 Your email post office Getting Started Guide

VPOP3 Your email post office Getting Started Guide VPOP3 Your email post office Getting Started Guide VPOP3 Getting Started Guide, version 2.1 1 Copyright Statement This manual is proprietary information of Paul Smith Computer Services and is not to be

More information

intertrax Suite resource MGR Web

intertrax Suite resource MGR Web intertrax Suite resource MGR Web Resource Management Installation Guide Version 4 2012 Copyright 2003-2012 by Salamander Technologies, Inc. Protected by US Patents 5,573,278; 5,596,652; 5,793,882; 6,761,312;

More information

Additional Requirements for ARES-G2 / RSA-G2. One Ethernet 10 Base T/100 Base TX network card required for communication with the instrument.

Additional Requirements for ARES-G2 / RSA-G2. One Ethernet 10 Base T/100 Base TX network card required for communication with the instrument. TA Instruments TRIOS Software Installation Instructions Installation Requirements Your TRIOS Instrument Control software includes all the components necessary to install or update the TRIOS software, as

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

Scholastic Reading Inventory Installation Guide

Scholastic Reading Inventory Installation Guide Scholastic Reading Inventory Installation Guide For use with Scholastic Reading Inventory version 2.0.1 or later and SAM version 2.0.2 or later Copyright 2011 by Scholastic Inc. All rights reserved. Published

More information

Setting Up Email. on Your Touch by HTC

Setting Up Email. on Your Touch by HTC Setting Up Email on Your Touch by HTC Intellectual Property Notices 2007 Sprint Nextel. All rights reserved. No reproduction in whole or in part without prior written approval. SPRINT and other trademarks

More information

StruxureWare Power Monitoring 7.0.1

StruxureWare Power Monitoring 7.0.1 StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions

More information

"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary

Charting the Course... ... to Your Success! MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test

More information

RealPresence Media Manager Blackboard Learn 9.1 Learning Management System Integration Guide

RealPresence Media Manager Blackboard Learn 9.1 Learning Management System Integration Guide INTEGRATION GUIDE Software 6.5 September 2013 3725-75322-002 Rev A RealPresence Media Manager Blackboard Learn 9.1 Learning Management System Integration Guide RealPresence Media Manager Blackboard Learn

More information

FileMaker Server 8. Administrator s Guide

FileMaker Server 8. Administrator s Guide FileMaker Server 8 Administrator s Guide 1994-2005 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc.,

More information

Parallels Plesk Control Panel

Parallels Plesk Control Panel Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

SuperLumin Nemesis. Administration Guide. February 2011

SuperLumin Nemesis. Administration Guide. February 2011 SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility

More information

Nasuni Management Console Guide

Nasuni Management Console Guide Nasuni Management Console Guide Version 5.5 April 2014 2014 Nasuni Corporation All Rights Reserved Document Information Nasuni Management Console Guide Version 5.5 April 2014 Copyright Copyright 2010-2014

More information

Setting Up Email. on Your Sprint Power Vision SM Mogul by HTC

Setting Up Email. on Your Sprint Power Vision SM Mogul by HTC Setting Up Email on Your Sprint Power Vision SM Mogul by HTC Intellectual Property Notices 2007 Sprint Nextel. All rights reserved. No reproduction in whole or in part without prior written approval. SPRINT

More information

EVALUATION COPY. Web Design Specialist. (Adobe CS6 Web Edition) Student Guide Volume 1 Web Design Series. CCL05-CDWDSG-PR-1211 version 1.

EVALUATION COPY. Web Design Specialist. (Adobe CS6 Web Edition) Student Guide Volume 1 Web Design Series. CCL05-CDWDSG-PR-1211 version 1. Web Design Specialist (Adobe CS6 Web Edition) Student Guide Volume 1 Web Design Series CCL05-CDWDSG-PR-1211 version 1.1 rd110712 Web Design Specialist (Adobe CS6 Web Edition) Student Guide Volume 1 President/Chief

More information

EntraPass WebStation. Installation Manual DN1864-1005

EntraPass WebStation. Installation Manual DN1864-1005 EntraPass WebStation Installation Manual EntraPass WebStation Installation Manual Table of Contents General Information...1 Copyright Info...1 Technical Support...1 Overview...2 Introduction... 2 Description...

More information

Microsoft BackOffice Small Business Server 4.5 Installation Instructions for Compaq Prosignia and ProLiant Servers

Microsoft BackOffice Small Business Server 4.5 Installation Instructions for Compaq Prosignia and ProLiant Servers Integration Note October 2000 Prepared by OS Integration Engineering Compaq Computer Corporation Contents Introduction...3 Requirements...3 Minimum Requirements...4 Required Information...5 Additional

More information

Diamond II v2.3 Service Pack 4 Installation Manual

Diamond II v2.3 Service Pack 4 Installation Manual Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1 Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of

More information

SMART Vantage. Installation guide

SMART Vantage. Installation guide SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the

More information

Windows 2003 Server Installation Guide

Windows 2003 Server Installation Guide Windows 2003 Server Installation Guide Revision 2.0 April 14, 2011 Licenses This manual is the exclusive property of Prometric, Inc. This manual is licensed for use with restrictions to authorized centers

More information

User Guide. Laplink Software, Inc. User Guide MN-LLE-EN-05 (REV. 2/2010) h t t p : / / w w w. l a p l i n k. c o m / h e l p

User Guide. Laplink Software, Inc. User Guide MN-LLE-EN-05 (REV. 2/2010) h t t p : / / w w w. l a p l i n k. c o m / h e l p 1 Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/help E-mail: CustomerService@laplink.com User Guide Laplink Software, Inc. 14335 NE 24th Street, Suite 201 Bellevue,

More information

Setting Up Email on Your Palm. Treo 700wx Smartphone

Setting Up Email on Your Palm. Treo 700wx Smartphone Setting Up Email on Your Palm Treo 700wx Smartphone Intellectual property notices 2006 Palm, Inc. All rights reserved. Trademark, copyright, patent, and other intellectual property notices are set forth

More information

WebMarshal User Guide

WebMarshal User Guide WebMarshal User Guide Legal Notice Copyright 2014 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is

More information

MULTIFUNCTIONAL DIGITAL SYSTEMS. Network Fax Guide

MULTIFUNCTIONAL DIGITAL SYSTEMS. Network Fax Guide MULTIFUNCTIONAL DIGITAL SYSTEMS Network Fax Guide 2009 KYOCERA MITA Corporation All rights reserved Preface Thank you for purchasing Multifunctional Digital Color Systems. This manual explains the instructions

More information

UNICORN 6.4. Administration and Technical Manual

UNICORN 6.4. Administration and Technical Manual UNICORN 6.4 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...

More information

Cisco Unified Workforce Optimization

Cisco Unified Workforce Optimization Cisco Unified Workforce Optimization Desktop Requirements Guide Version 10.5 First Published: June 18, 2014 Last Updated: March 6, 2015 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS

More information

Novell ZENworks 10 Configuration Management SP3

Novell ZENworks 10 Configuration Management SP3 AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties

More information

Accessing Websites. Mac/PC Compatibility: QuickStart Guide for Business

Accessing Websites. Mac/PC Compatibility: QuickStart Guide for Business Accessing Websites Mac/PC Compatibility: QuickStart Guide for Business 2 Accessing Websites QuickStart Guide for Business The Basics People use the web for research, entertainment, and business. And it

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

UNICORN 7.0. Administration and Technical Manual

UNICORN 7.0. Administration and Technical Manual UNICORN 7.0 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...

More information

Resolving H202 Errors (INTERNAL)

Resolving H202 Errors (INTERNAL) Resolving H202 Errors (INTERNAL) Contents Scope and audience.......3 General H202 Error Information...... 3 System Recommendations....4 QuickBooks Multi User Mode - QuickBooks Over a Network......4 QuickBooks

More information

Magaya Software Installation Guide

Magaya Software Installation Guide Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to

More information

Sample- for evaluation purposes only! Outlook Web App. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc.

Sample- for evaluation purposes only! Outlook Web App. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2015 Outlook Web App TeachUcomp, Inc. it s all about you Copyright: Copyright 2015 by TeachUcomp, Inc. All rights reserved. This publication,

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

Server Sentinel Client Workstation

Server Sentinel Client Workstation Server Sentinel Client Workstation Installation and Reinstallation Guide Server Sentinel 4.4.3 and Higher April 2008 . unisys imagine it. done. Server Sentinel Client Workstation Installation and Reinstallation

More information

Installation and Program Essentials

Installation and Program Essentials CS PROFESSIONAL SUITE ACCOUNTING PRODUCTS Installation and Program Essentials version 2015.x.x TL 28970 3/26/2015 Copyright Information Text copyright 1998 2015 by Thomson Reuters. All rights reserved.

More information

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012.

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Copyright 1995-2012 Lenel Systems International, Inc. Information

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information