Evaluation Copy. Internet Business Foundations: Self-Study Guide CIW v5 Foundations Series. CCSSM-CF2IBF-PR-909 version 2.



Similar documents
Classroom Setup Guide

Web Foundations Series Internet Business Associate

Optional Lab 1-1: Learning about Internet standards organizations

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

Server Installation Guide ZENworks Patch Management 6.4 SP2

Online International Business Certificate Programs

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Sage HRMS 2014 Sage Employee Self Service

Windows Peer-to-Peer Network Configuration Guide

Online Master of Science in Information Technology Degree Program User s Guide for Students

How To Set Up A Thermal Cycler With Veritilink Remote Management Software

EVALUATION COPY. Site Development Associate. Self-Study Guide Web Foundations Series. CCSSM-CF2SDF-PR-1208 version 2.0 rd082712



Web Design Specialist. (Adobe CS6 Web Edition) Self-Study Guide Volume 1 Web Design Series. CCSSM-CDWDSG-PR-1305 version 1.

Core Protection for Virtual Machines 1

DIGIPASS CertiID. Getting Started 3.1.0

formerly Help Desk Authority Upgrade Guide

Sentinel Management Server

Server Management 2.0

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

Getting Started with Microsoft Office Live Meeting. Published October 2007

Interworks. Interworks Cloud Platform Installation Guide

Student ANGEL FAQs. General Issues: System Requirements:

Installation Guide for Pulse on Windows Server 2012

MGC WebCommander Web Server Manager

Windows Domain Network Configuration Guide

Appendix B Lab Setup Guide

Site Development Associate. Academic Student Guide Web Foundations Series. ECL02-CFSDFN-PR-1208 version 2.0 rd072212

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0

Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009

RealPresence Platform Director

Installing Management Applications on VNX for File

Ascent Capture 5 Web Validation Server Getting Started with Ascent Capture Web Validation Server

Frequently Asked Questions for the USA TODAY e-newspaper

Fiery E100 Color Server. Welcome

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

Installation and Program Essentials

Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide

Dell Statistica Statistica Enterprise Installation Instructions

Installing and Configuring vcloud Connector

Setup and Configuration Guide for Pathways Mobile Estimating

Attachment E ACCESSING THE FCC NETWORK USING WINDOWS 95/98 FOR ULS FILING

System Administration Training Guide. S100 Installation and Site Management

Kaspersky Password Manager

Network Scanner Tool R3.1. User s Guide Version

Classroom Setup Guide

PHD Virtual Backup for Hyper-V

Portions of this product were created using LEADTOOLS LEAD Technologies, Inc. ALL RIGHTS RESERVED.

WEB DEVELOPMENT CAREERS WEB DEVELOPMENT WEB DEVELOPMENT STARTER PACK WEB DEVELOPMENT CAREERS

Paul McFedries. Home Server 2011 LEASHE. Third Edition. 800 East 96th Street, Indianapolis, Indiana USA

HP ARCHIVING SOFTWARE FOR EXCHANGE

Troubleshooting File and Printer Sharing in Microsoft Windows XP

FileMaker Server 7. Administrator s Guide. For Windows and Mac OS

VPOP3 Your post office Getting Started Guide

intertrax Suite resource MGR Web

Additional Requirements for ARES-G2 / RSA-G2. One Ethernet 10 Base T/100 Base TX network card required for communication with the instrument.

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

Scholastic Reading Inventory Installation Guide

Setting Up . on Your Touch by HTC

StruxureWare Power Monitoring 7.0.1

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

RealPresence Media Manager Blackboard Learn 9.1 Learning Management System Integration Guide

FileMaker Server 8. Administrator s Guide

Parallels Plesk Control Panel

Installation Guide for Pulse on Windows Server 2008R2

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

SuperLumin Nemesis. Administration Guide. February 2011

Nasuni Management Console Guide

Setting Up . on Your Sprint Power Vision SM Mogul by HTC

EVALUATION COPY. Web Design Specialist. (Adobe CS6 Web Edition) Student Guide Volume 1 Web Design Series. CCL05-CDWDSG-PR-1211 version 1.

EntraPass WebStation. Installation Manual DN

Microsoft BackOffice Small Business Server 4.5 Installation Instructions for Compaq Prosignia and ProLiant Servers

Diamond II v2.3 Service Pack 4 Installation Manual

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1

SMART Vantage. Installation guide

Windows 2003 Server Installation Guide

User Guide. Laplink Software, Inc. User Guide MN-LLE-EN-05 (REV. 2/2010) h t t p : / / w w w. l a p l i n k. c o m / h e l p

Setting Up on Your Palm. Treo 700wx Smartphone

WebMarshal User Guide

MULTIFUNCTIONAL DIGITAL SYSTEMS. Network Fax Guide

UNICORN 6.4. Administration and Technical Manual

Cisco Unified Workforce Optimization

Novell ZENworks 10 Configuration Management SP3

Accessing Websites. Mac/PC Compatibility: QuickStart Guide for Business

Enterprise Vault Installing and Configuring

UNICORN 7.0. Administration and Technical Manual

Resolving H202 Errors (INTERNAL)

Magaya Software Installation Guide

Sample- for evaluation purposes only! Outlook Web App. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc.

Setting Up a Unisphere Management Station for the VNX Series P/N Revision A01 January 5, 2010

Server Sentinel Client Workstation

Installation and Program Essentials

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC , revision 2.029, May 2012.

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Transcription:

Internet Business Foundations: Self-Study Guide CIW v5 Foundations Series CCSSM-CF2IBF-PR-909 version 2.0 rd082609

Internet Business Foundations: Self-Study Guide

President James Stanger, Ph.D. Vice President, Publishing Todd Hopkins Senior Content Developer Kenneth A. Kozakis Managing Editor Susan M. Lane Editor Sarah Skodak Project Manager/Publisher Tina Strong Customer Service ComputerPREP Certification Partners, LLC 1230 W. Washington St., Ste. 111 Tempe, AZ 85281 (602) 275-7700 Copyright 2009, All rights reserved.

Internet Business Foundations Developer Kenneth A. Kozakis Contributors James Stanger, Ph.D., Patrick T. Lane, Irina Heer and Stephen Schneiter Editor Susan M. Lane Publisher Tina Strong Project Managers Todd Hopkins and Tina Strong Trademarks Certification Partners is a trademark of Certification Partners, LLC. All product names and services identified throughout this book are trademarks or registered trademarks of their respective companies. They are used throughout this book in editorial fashion only. No such use, or the use of any trade name, is intended to convey endorsement or other affiliation with the book. Copyrights of any screen captures in this book are the property of the software's manufacturer. Disclaimer Certification Partners, LLC, makes a genuine attempt to ensure the accuracy and quality of the content described herein; however, Certification Partners makes no warranty, express or implied, with respect to the quality, reliability, accuracy, or freedom from error of this document or the products it describes. Certification Partners makes no representation or warranty with respect to the contents hereof and specifically disclaims any implied warranties of fitness for any particular purpose. Certification Partners disclaims all liability for any direct, indirect, incidental or consequential, special or exemplary damages resulting from the use of the information in this document or from the use of any products described in this document. Mention of any product or organization does not constitute an endorsement by Certification Partners of that product or corporation. Data used in examples and labs is intended to be fictional even if actual data is used or accessed. Any resemblance to, or use of real persons or organizations should be treated as entirely coincidental. Certification Partners makes every effort to ensure the accuracy of URLs referenced in all its material, but cannot guarantee that all URLs will be available throughout the life of a course. When this course/cd-rom was published, all URLs were checked for accuracy and completeness. However, due to the everchanging nature of the Internet, some URLs may no longer be available or may have been redirected. Copyright Information This training manual is copyrighted and all rights are reserved by Certification Partners, LLC. No part of this publication may be reproduced, transmitted, stored in a retrieval system, modified, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise without written permission of Certification Partners, 1230 W. Washington Street, Suite 111, Tempe, AZ 85281. Copyright 2009 by Certification Partners, LLC All Rights Reserved ISBN: 1-59302-770-2

iv

v Table of Contents Course Description... xiv Self-Study Courseware... xv Course Objectives... xvi Course Setup Guide and System Requirements... xvi Conventions and Graphics... xxiii Lesson 1: Introduction to IT Business and Careers... 1-1 Pre-Assessment Questions...1-3 Information Technology (IT)...1-4 IT Job Roles...1-4 IT Industry Career Opportunities... 1-14 Technical Concepts and Training... 1-20 Technology Adoption Models... 1-21 Business Modeling... 1-23 Data Modeling... 1-26 The Importance of Standards... 1-27 Case Study... 1-29 Lesson 1 Review... 1-32 Lesson 1 Supplemental Material... 1-34 Lesson 2: Introduction to Internet Technology... 2-1 Pre-Assessment Questions...2-3 Internet Technology...2-4 Overview of Networks...2-4 Overview of the Internet...2-6 Connecting to the Internet... 2-10 Internet Protocols... 2-15 Domain Name System (DNS)... 2-19 Cloud Computing... 2-23 Case Study... 2-30 Lesson 2 Review... 2-33 Lesson 2 Supplemental Material... 2-34 Lesson 3: Web Browsing... 3-1 Pre-Assessment Questions...3-3 Introduction to Web Browsing...3-4 Basic Functions of Web Browsers...3-4 Installing a Web Browser...3-4 Web Addresses...3-7 How Browsers Work... 3-11 Browser Choices... 3-16 Resources for Technical Data... 3-19 Browsing Techniques... 3-24 Browser Elements... 3-28 Configuring Web Browser Preferences... 3-29 Cookies... 3-40 Configuring Browser Security... 3-45 Proxy Servers... 3-48 Google Chrome... 3-51 Troubleshooting Internet Client Problems...3-55 Browsers in the Business World... 3-55 Case Study... 3-65 Lesson 3 Review... 3-68 Lesson 3 Supplemental Material... 3-69 Lesson 4: Multimedia on the Web... 4-1 Pre-Assessment Questions...4-2 Introduction to Multimedia on the Web...4-3 Objects, Active Content and Languages...4-3 Objects and Security Issues...4-6

vi Introduction to Plug-in Technology...4-6 Data Compression and Decompression...4-8 Plug-in Installation...4-9 Types of Plug-ins...4-9 Firefox Add-Ons... 4-18 Types of Viewers... 4-20 Miscellaneous File Formats... 4-22 Downloading Files with a Browser... 4-28 Case Study... 4-30 Lesson 4 Review... 4-32 Lesson 4 Supplemental Material... 4-33 Lesson 5: Databases and Web Search Engines... 5-1 Pre-Assessment Questions...5-3 Introduction to Data Searching Tools...5-4 Overview of Databases...5-4 Introduction to Web Search Engines...5-9 Registering a Web Site with a Search Engine... 5-10 Types of Web Searches... 5-11 Basic Web Searching Techniques... 5-14 Boolean Operators... 5-18 Advanced Web Searching Techniques... 5-21 Using Web Searches to Perform Job Tasks... 5-23 Unexpected Web Search Results... 5-24 Web Search Strategies... 5-26 Evaluating Resources... 5-28 Organizing Internet Research... 5-34 Citing Copyrighted Online Resources... 5-38 Case Study... 5-39 Lesson 5 Review... 5-41 Lesson 5 Supplemental Material... 5-42 Lesson 6: E-Mail and Personal Information Management... 6-1 Pre-Assessment Questions...6-3 Introduction to Electronic Mail (E-Mail)...6-4 How E-Mail Works...6-4 E-Mail Configuration Requirements...6-9 E-Mail Message Components... 6-17 Creating and Sending E-Mail Messages...6-17 Receiving and Viewing E-Mail Messages...6-24 E-Mail in the Workplace... 6-27 E-Mail Problems and Solutions... 6-34 Personal Information Management (PIM)...6-39 Case Study... 6-42 Lesson 6 Review... 6-44 Lesson 6 Supplemental Material... 6-45 Lesson 7: Internet Services and Tools... 7-1 Pre-Assessment Questions...7-2 Internet Resource Tools...7-2 Newsgroups...7-2 List Servers and Listserve Groups...7-2 Telnet...7-2 File Transfer Protocol (FTP)...7-2 Managing Downloaded Files...7-2 Virtual Network Computing (VNC) and Microsoft Terminal Services...7-2 Peer-to-Peer Networks...7-2 Lightweight Directory Access Protocol (LDAP)...7-2 Concurrent Versions System (CVS)...7-2 Troubleshooting Using TCP/IP Tools...7-2 Universal Development Models...7-2 Open-Source Development...7-2

vii Proprietary Software and EULAs...7-2 Software Patents...7-2 Case Study...7-2 Lesson 7 Review...7-2 Lesson 7 Supplemental Material...7-2 Lesson 8: Internet Communication... 8-2 Pre-Assessment Questions...8-2 Communicating via the Internet...8-2 Modern Web Technologies...8-2 Social Networking...8-2 Messaging...8-2 Blogging...8-2 Communicating Effectively over the Internet...8-2 Convergence and Unified Communications Technologies...8-2 Case Study...8-2 Lesson 8 Review...8-2 Lesson 8 Supplemental Material...8-2 Lesson 9: Internet Security... 9-2 Pre-Assessment Questions...9-2 Introduction to Internet Security...9-2 Encryption...9-2 Authentication...9-2 Firewalls...9-2 Malware (Malicious Software)...9-2 Virus Detection and Prevention...9-2 Spyware...9-2 Updates and Patches...9-2 Screen Savers...9-2 Security-Related Ethical and Legal Issues...9-2 Typosquatting...9-2 Case Study...9-2 Lesson 9 Review...9-2 Lesson 9 Supplemental Material...9-2 Lesson 10: IT Project and Program Management... 10-2 Pre-Assessment Questions... 10-2 Overview of IT Project and Program Management... 10-2 Project Management Fundamentals... 10-2 Project Management Skills... 10-2 Project Management Phases... 10-2 The Project Triangle... 10-2 Project Management Software... 10-2 Creating Project Schedules... 10-2 Documenting Projects... 10-2 Planning and Scheduling Meetings... 10-2 Reviewing Projects... 10-2 Quality Assurance... 10-2 Business Implications of IT Projects... 10-2 Project Management Institute (PMI)... 10-2 Program Management Concepts... 10-2 Case Study... 10-2 Lesson 10 Review... 10-2 Lesson 10 Supplemental Material... 10-2 Appendixes... Appendixes-2 CIW Foundations Glossary... Glossary-2 Index... Index-2 Companion CD-ROM Contents...Companion CD-ROM Contents-2

viii List of Labs Lab 1-1: Exploring basic Web site design concepts...1-5 Lab 1-2: Using Internet technology to conduct job searches... 1-16 Lab 1-3: Creating a plain-text résumé... 1-19 Lab 1-4: Creating an RTF résumé... 1-19 Lab 2-1: Sampling current and historic Web site designs...2-9 Lab 2-2: Using Internet protocols in Mozilla Firefox... 2-22 Lab 2-3: Exploring Google's cloud-computing capabilities... 2-26 Lab 3-1: Installing the Firefox 3.0 browser...3-5 Lab 3-2: Browsing Web pages using various browsers...3-9 Lab 3-3: Viewing the default Firefox 3.0 protocols... 3-15 Lab 3-4: Accessing statistics, and accessing secure and non-secure Web pages... 3-19 Lab 3-5: Reviewing Web trends... 3-23 Lab 3-6: Using browser features to enhance your browsing experience... 3-26 Lab 3-7: Configuring font size in Mozilla Firefox... 3-31 Lab 3-8: Setting a browser home page in Mozilla Firefox... 3-32 Lab 3-9: Managing the History folder in Mozilla Firefox... 3-33 Lab 3-10: Configuring the browser cache in Mozilla Firefox... 3-38 Lab 3-11: Controlling image loading in Mozilla Firefox... 3-39 Lab 3-12: Controlling cookies in Mozilla Firefox... 3-44 Lab 3-13: Changing security settings in Mozilla Firefox... 3-47 Lab 3-14: Using Google Chrome... 3-52 Lab 3-15: Conducting a Web conference... 3-58 Lab 3-16: Delivering Web feeds to your computer... 3-62 Lab 4-1: Using Adobe Flash Player with Mozilla Firefox... 4-10 Lab 4-2: Using the RealPlayer plug-in with Mozilla Firefox... 4-13 Lab 4-3: Using the Apple QuickTime plug-in with Mozilla Firefox... 4-15 Lab 4-4: Using the Windows Media Player plug-in with Mozilla Firefox... 4-16 Lab 4-5: Using Firefox add-ons... 4-18 Lab 4-6: Installing and using Adobe Reader with Mozilla Firefox... 4-21 Lab 4-7: Viewing Ogg Vorbis files in Windows Media Player... 4-24 Lab 4-8: Downloading and storing Web site content using Mozilla Firefox... 4-29 Lab 5-1: Performing a directory search using Yahoo!... 5-15 Lab 5-2: Performing a keyword search using AltaVista... 5-17 Lab 5-3: Using the plus sign (+) and minus sign (-) operators in AltaVista... 5-20 Lab 5-4: Performing an advanced search in AltaVista... 5-22 Lab 5-5: Using the Internet to perform job tasks... 5-23 Lab 5-6: Reviewing Web search tips and tricks... 5-25 Lab 5-7: Using unusual search tricks and browsing techniques... 5-27 Lab 5-8: Evaluating Internet resources... 5-32 Lab 5-9: Organizing Internet research using Zotero... 5-35 Lab 6-1: Configuring Thunderbird as your e-mail client... 6-12 Lab 6-2: Configuring a Web-based e-mail account using Gmail... 6-15 Lab 6-3: Creating and sending e-mail messages using Thunderbird... 6-18 Lab 6-4: Creating and sending e-mail messages using Gmail... 6-20 Lab 6-5: Creating e-mail signatures in Thunderbird and Gmail... 6-21 Lab 6-6: Attaching files to e-mail messages... 6-23 Lab 6-7: Receiving and viewing e-mail messages... 6-25 Lab 6-8: Setting up a spam filter in Thunderbird...6-36 Lab 7-1: Exploring LISTSERV...7-2 Lab 7-2: Exploring Topica...7-2 Lab 7-3: Accessing a library database using Telnet...7-2 Lab 7-4: Installing the FireFTP Firefox add-on as your FTP client...7-2 Lab 7-5: Downloading files using command-line FTP...7-2 Lab 7-6: Downloading files using the Firefox FTP client...7-2 Lab 7-7: Downloading files using FireFTP...7-2 Lab 7-8: Uploading files to an FTP site using FireFTP...7-2 Lab 7-9: Defining MIME types...7-2 Lab 7-10: Compressing and decompressing files using bzip2 and bunzip2...7-2 Lab 7-11: Using the TightVNC remote administration application...7-2

ix Lab 7-12: Using Remote Desktop Connection...7-2 Lab 7-13: Using TCP/IP diagnostic tools...7-2 Lab 8-1: Using the Windows Live Messenger instant messaging client...8-2 Lab 8-2: Sending text messages using Twitter...8-2 Lab 8-3: Using Windows Remote Assistance...8-2 Lab 8-4: Creating a blog...8-2 Lab 9-1: Viewing your desktop firewall settings...9-2 Lab 9-2: Installing and using spyware-detection software...9-2 Lab 9-3: Activating a screen saver...9-2 Lab 10-1: Installing the GanttProject project management tool... 10-2 Lab 10-2: Creating a project schedule... 10-2 List of Activities Activity 1-1: Identifying Information Technology (IT) job roles... 1-35 Activity 1-2: Diagramming a business ontology model... 1-36 Activity 2-1: Identifying direct Internet connection types... 2-35 Activity 2-2: Identifying Web sites based on domain name structure... 2-36 Activity 3-1: Defining browser terminology... 3-70 Activity 4-1: Identifying computer languages... 4-34 Activity 5-1: Identifying database components... 5-43 Activity 5-2: Identifying Boolean operator actions... 5-43 Activity 6-1: Defining e-mail terms and concepts... 6-46 Activity 7-1: Choosing the right tool for the job...7-2 Activity 8-1: Identifying Web 2.0 technologies...8-2 Activity 9-1: Identifying security terms...9-2 Activity 9-2: Identifying types of viruses...9-2 Activity 10-1: Identifying project management phases... 10-2 Activity 10-2: Identifying PMBOK topics... 10-2 List of Optional Labs Optional Lab 1-1: Learning about Internet standards organizations... 1-37 Optional Lab 2-1: Learning about the Internet... 2-37 Optional Lab 2-2: Creating your own radio station with Pandora... 2-38 Optional Lab 3-1: Organizing Favorites in Microsoft Internet Explorer... 3-71 Optional Lab 3-2: Organizing Bookmarks in Mozilla Firefox... 3-72 Optional Lab 3-3: Configuring font size in Microsoft Internet Explorer... 3-73 Optional Lab 3-4: Setting a browser home page in Microsoft Internet Explorer... 3-73 Optional Lab 3-5: Managing the History folder in Microsoft Internet Explorer... 3-74 Optional Lab 3-6: Configuring the browser cache in Microsoft Internet Explorer... 3-75 Optional Lab 3-7: Controlling image loading in Microsoft Internet Explorer... 3-76 Optional Lab 3-8: Setting automatic cookie handling in Microsoft Internet Explorer... 3-77 Optional Lab 3-9: Configuring Microsoft Internet Explorer to display cookie warnings... 3-77 Optional Lab 3-10: Setting safety levels in Microsoft Internet Explorer... 3-78 Optional Lab 4-1: Using Adobe Flash Player with Microsoft Internet Explorer... 4-34 Optional Lab 4-2: Using Adobe Reader with Microsoft Internet Explorer... 4-35 Optional Lab 4-3: Downloading and storing Web site content using Microsoft Internet Explorer... 4-36 Optional Lab 5-1: Performing a directory search using Excite... 5-44 Optional Lab 5-2: Performing a keyword search using Excite... 5-44 Optional Lab 5-3: Using the plus sign and minus sign operators in Lycos... 5-45 Optional Lab 5-4: Using Boolean operators in Lycos... 5-46 Optional Lab 6-1: Configuring Windows Mail as your e-mail client... 6-46 Optional Lab 6-2: Setting up a Web-based e-mail account using Windows Live Hotmail... 6-48 Optional Lab 6-3: Creating an e-mail signature in Windows Mail and Windows Live Hotmail... 6-50 Optional Lab 6-4: Adding contacts and importing an address book in Windows Mail... 6-51 Optional Lab 6-5: Setting up an automatic reply message in FasterMail... 6-52 Optional Lab 6-6: Finding EML and MSF files... 6-53 Optional Lab 6-7: Installing and configuring Aethera... 6-53 Optional Lab 7-1: Configuring and using Thunderbird Newsgroups...7-2 Optional Lab 7-2: Configuring and using Windows Mail as a news client...7-2

x Optional Lab 7-3: Exploring the Majordomo list server...7-2 Optional Lab 7-4: Exploring Yahoo! Groups...7-2 Optional Lab 7-5: Downloading files using the Internet Explorer FTP client...7-2 Optional Lab 8-1: Using SMS to send and receive text messages...8-2 Optional Lab 9-1: Uncovering typosquatters...9-2 Optional Lab 10-1: Using software to create a project schedule... 10-2 List of Quizzes Lesson 1 Quiz... 1-38 Lesson 2 Quiz... 2-40 Lesson 3 Quiz... 3-80 Lesson 4 Quiz... 4-39 Lesson 5 Quiz... 5-47 Lesson 6 Quiz... 6-55 Lesson 7 Quiz...7-2 Lesson 8 Quiz...8-2 Lesson 9 Quiz...9-2 Lesson 10 Quiz... 10-2 List of Figures Figure 1-1: Web site design plain Web page...1-5 Figure 1-2: Web site design more interesting Web page...1-5 Figure 1-3: Viewing Web page for design qualities...1-6 Figure 1-4: Inserting HTML code...1-7 Figure 1-5: Improved Web page...1-7 Figure 1-6: Web site usage report...1-9 Figure 1-7: Monster home page... 1-16 Figure 1-8: Typical business ontology model... 1-24 Figure 2-1: Client/server model...2-5 Figure 2-2: Multiple connections among servers...2-6 Figure 2-3: Internet Archive's Wayback Machine page...2-9 Figure 2-4: Typical domain name... 2-19 Figure 2-5: CIW Web site home page in Mozilla Firefox... 2-22 Figure 2-6: Google Docs page... 2-27 Figure 2-7: Google Maps page... 2-27 Figure 2-8: igoogle page... 2-28 Figure 2-9: Personalized igoogle page... 2-29 Figure OL2-1: Pandora home page... 2-38 Figure OL2-2: Personalizing Pandora radio station... 2-39 Figure 3-1: Mozilla Firefox Setup Wizard...3-5 Figure 3-2: Firefox Setup Type screen...3-6 Figure 3-3: Firefox Import Settings and Data screen...3-6 Figure 3-4: Typical Uniform Resource Locator (URL)...3-7 Figure 3-5: CIW Certified home page... 3-10 Figure 3-6: Options dialog box Firefox... 3-15 Figure 3-7: Default protocols Firefox... 3-15 Figure 3-8: Safari Web browser interface... 3-17 Figure 3-9: Opera Web browser interface... 3-18 Figure 3-10: Page Info dialog box non-secure page in Firefox... 3-20 Figure 3-11: Page Info dialog box secure page in Firefox... 3-21 Figure 3-12: Certificate Viewer dialog box Firefox... 3-21 Figure 3-13: Certificate dialog box secure page in Internet Explorer... 3-22 Figure 3-14: Google Zeitgeist home page... 3-23 Figure 3-15: Mozilla Firefox Bookmarks... 3-24 Figure 3-16: Microsoft Internet Explorer Favorites... 3-25 Figure 3-17: Add A Favorite dialog box... 3-26 Figure 3-18: Adding to Favorites... 3-26 Figure 3-19: Internet Options dialog box Microsoft Internet Explorer... 3-30 Figure 3-20: Options dialog box Mozilla Firefox... 3-30

xi Figure 3-21: Fonts dialog box Mozilla Firefox... 3-31 Figure 3-22: Specifying home page in Firefox... 3-32 Figure 3-23: History settings in Firefox... 3-33 Figure 3-24: Clear Private Data dialog box... 3-34 Figure 3-25: Options dialog box Content panel... 3-35 Figure 3-26: Setting cache options Microsoft Internet Explorer... 3-36 Figure 3-27: Specifying cache settings in Firefox... 3-38 Figure 3-28: Controlling image loading in Firefox... 3-40 Figure 3-29: Controlling cookies Microsoft Internet Explorer... 3-42 Figure 3-30: Controlling cookies Mozilla Firefox... 3-43 Figure 3-31: Cookies dialog box Mozilla Firefox... 3-44 Figure 3-32: Confirm Setting Cookie dialog box Mozilla Firefox... 3-45 Figure 3-33: Internet Options dialog box Security tab... 3-46 Figure 3-34: Disabling JavaScript and Java Firefox... 3-47 Figure 3-35: JavaScript active content... 3-48 Figure 3-36: Connection Settings dialog box Firefox... 3-49 Figure 3-37: Internet Options dialog box, Connections tab Internet Explorer... 3-50 Figure 3-38: Local Area Network (LAN) Settings dialog box Internet Explorer... 3-50 Figure 3-39: Google Chrome window... 3-53 Figure 3-40: Google Chrome comic book... 3-53 Figure 3-41: Cookies dialog box Google Chrome... 3-54 Figure 3-42: CIW Community login page extranet... 3-56 Figure 3-43: Webinar session... 3-57 Figure 3-44: Dimdim Web Meeting interface... 3-59 Figure 3-45: Join Meeting form... 3-60 Figure 3-46: Feed subscription button... 3-62 Figure 3-47: Preview of current feeds... 3-63 Figure 3-48: Add Live Bookmark dialog box... 3-63 Figure OL3-1: Organize Favorites dialog box Internet Explorer... 3-71 Figure OL3-2: Library window showing bookmarks Firefox... 3-72 Figure OL3-3: Delete Browsing History dialog box Internet Explorer... 3-74 Figure OL3-4: Controlling image loading in Internet Explorer... 3-76 Figure OL3-5: Advanced Privacy Settings dialog box Internet Explorer... 3-77 Figure OL3-6: Privacy Alert dialog box Internet Explorer... 3-78 Figure OL3-7: High safety level Internet Explorer... 3-79 Figure 4-1: Embedded RealPlayer video...4-8 Figure 4-2: Adobe Downloads page Firefox... 4-11 Figure 4-3: Installing Adobe Flash Player in Firefox... 4-11 Figure 4-4: Downloads window... 4-11 Figure 4-5: QTVR sequence... 4-14 Figure 4-6: itunes window... 4-15 Figure 4-7: Specifying where to open movie clip... 4-16 Figure 4-8: Windows Media Player window... 4-17 Figure 4-9: Add-ons page Firefox... 4-18 Figure 4-10: Web page with blocked Flash content... 4-19 Figure 4-11: Add-ons Firefox... 4-19 Figure 4-12: PDF file in Adobe Reader Firefox... 4-22 Figure 4-13: Vorbis.com's music page... 4-25 Figure 4-14: Playing Ogg Vorbis track... 4-26 Figure 4-15: Save As dialog box... 4-29 Figure 4-16: Save Image dialog box... 4-29 Figure OL4-1: PDF file in Adobe Reader Internet Explorer... 4-36 Figure OL4-2: Save Webpage dialog box Internet Explorer... 4-36 Figure OL4-3: Save Picture dialog box Internet Explorer... 4-37 Figure OL4-4: Save A Copy dialog box Internet Explorer... 4-37 Figure 5-1: Sample database table...5-4 Figure 5-2: Sample relational database...5-5 Figure 5-3: Related tables...5-5 Figure 5-4: One-to-many database table relationship...5-7 Figure 5-5: Many-to-many database table relationship...5-7 Figure 5-6: Yahoo! keyword search field... 5-12

xii Figure 5-7: Yahoo! static directory... 5-13 Figure 5-8: AltaVista home page... 5-16 Figure 5-9: AltaVista Advanced Web Search page... 5-21 Figure 5-10: Google home page... 5-24 Figure 5-11: Google Image Search page... 5-28 Figure 5-12: YouTube home page... 5-33 Figure 5-13 BBC News home page... 5-33 Figure 5-14: Zotero window... 5-35 Figure 5-15: Zotero window with collection... 5-36 Figure OL5-1: Excite home page... 5-44 Figure OL5-2: Lycos home page... 5-45 Figure 6-1: Windows Mail Properties dialog box General tab... 6-10 Figure 6-2: Windows Mail Properties dialog box Servers tab... 6-10 Figure 6-3: Thunderbird Account Wizard Identity screen... 6-11 Figure 6-4: Thunderbird Account Wizard Server Information screen... 6-12 Figure 6-5: Setting up Mozilla Thunderbird as your e-mail client... 6-13 Figure 6-6: Thunderbird Inbox... 6-14 Figure 6-7: Gmail Inbox window... 6-16 Figure 6-8: Creating message in Thunderbird... 6-19 Figure 6-9: Creating message in Gmail... 6-19 Figure 6-10: Thunderbird window sections... 6-24 Figure 6-11: Unprofessional e-mail in business setting... 6-31 Figure 6-12: Professional e-mail in business setting... 6-31 Figure 6-13: Filter Rules dialog box... 6-36 Figure 6-14: Setting up spam filter... 6-37 Figure 6-15: PIM calendar entries in Aethera... 6-39 Figure 6-16: PIM contact information in Aethera... 6-40 Figure OL6-1: Microsoft Windows Mail main window... 6-47 Figure OL6-2: Configured e-mail account in Windows Mail... 6-48 Figure OL6-3: Windows Live Hotmail window... 6-49 Figure OL6-4: Adding contact... 6-51 Figure OL6-5: Aethera 1.2.1 interface... 6-54 Figure 7-1: L-Soft home page...7-2 Figure 7-2: Topica home page...7-2 Figure 7-3: Accessing library database using Telnet...7-2 Figure 7-4: Sample SSH session...7-2 Figure 7-5: Using command-line FTP...7-2 Figure 7-6: Using Mozilla Firefox FTP client...7-2 Figure 7-7: FireFTP window...7-2 Figure 7-8: Using FireFTP to access FTP server...7-2 Figure 7-9: WinSCP client...7-2 Figure 7-10: File with undefined MIME type...7-2 Figure 7-11: TightVNC Server Current User Properties dialog box...7-2 Figure 7-12: New TightVNC Connection dialog box...7-2 Figure 7-13: VNC display on client computer...7-2 Figure 7-14: Remote Desktop Connection dialog box...7-2 Figure 7-15: Using TCP/IP diagnostic tools...7-2 Figure OL7-1: Subscribe dialog box Thunderbird...7-2 Figure OL7-2: Newsgroup Subscriptions dialog box Windows Mail...7-2 Figure OL7-3: Majordomo home page...7-2 Figure OL7-4: Yahoo! Groups home page...7-2 Figure OL7-5: Internet Explorer FTP client in Windows Explorer...7-2 Figure 8-1: Meebo home page...8-2 Figure 8-2: Wikipedia home page...8-2 Figure 8-3: Signing in to Windows Live Messenger...8-2 Figure 8-4: Adding Windows Live Messenger contact...8-2 Figure 8-5: Windows Live Messenger window with contact...8-2 Figure 8-6: Windows Live Messenger conversation window...8-2 Figure 8-7: Finding lab partner on Twitter...8-2 Figure 8-8: Windows Remote Assistance...8-2 Figure 8-9: Waiting for incoming connection Windows Remote Assistance...8-2

xiii Figure 8-10: Compose window Blogger.com...8-2 Figure 8-11: Posted blog entry in template...8-2 Figure 8-12: Posted comment entry...8-2 Figure 9-1: Web page personal information form...9-2 Figure 9-2: Windows Firewall window...9-2 Figure 9-3: Windows Firewall Settings dialog box Exceptions list...9-2 Figure 9-4: Ad-Aware spyware-detection application...9-2 Figure 9-5: Detected spyware objects...9-2 Figure 9-6: Screen Saver Settings dialog box...9-2 Figure 10-1: Organizational structure project team members... 10-2 Figure 10-2: Sample Gantt chart... 10-2 Figure 10-3: GanttProject window... 10-2 Figure 10-4: GanttProject Properties dialog box for task... 10-2 Figure 10-5: Task list and Gantt chart... 10-2 Figure OL10-1: Task list and Gantt chart final... 10-2 List of Tables Table 1-1: Ontology terms... 1-24 Table 1-2: Business ontology model objects... 1-25 Table 2-1: Common speeds for direct Internet connections... 2-14 Table 2-2: Installed vs. cloud-computing-based services... 2-24 Table 3-1: Elements of Web browser... 3-28 Table 3-2: Internet Explorer Privacy level effects on cookies... 3-42 Table 3-3: Cookie handling options Firefox... 3-43 Table 5-1: Types of Web searches... 5-12 Table 5-2: Boolean operators... 5-19 Table 6-1: E-mail message components... 6-17 Table 6-2: E-mail response options... 6-27 Table 7-1: SSH-based utilities...7-2 Table 7-2: Popular file types found on FTP servers...7-2 Table 7-3: Compression applications and common file name extensions...7-2 Table 7-4: Open-source software development terms...7-2 Table 8-1: SMS addresses for major U.S. cellular providers...8-2 Table 9-1: Computer virus types...9-2

xiv Course Description Internet Business Foundations prepares you to work effectively in today's business environment. In this course, you will learn about the tasks involved in various Information Technology (IT) job roles, and explore career opportunities in the IT industry. You will also learn about Internet connection methods, Internet protocols, the Domain Name System (DNS) and cloud computing. You will study the basic functions of Web browsers, the components of Web addresses, the use and control of cookies, and browser use in the business world. You will learn how browser plug-ins and add-ons can improve your Web-browsing experience, and you will use browsers to download and manage files. You will learn about databases as they relate to Web search engines, and you will use search engines to conduct basic and advanced Web searches. This course also teaches you to configure e-mail clients and use e-mail, and it provides guidelines for communicating effectively over the Internet using modern Web technologies and social networking tools. You will also learn about Internet research and collaboration tools, software development tools, and the patent and licensing practices that accompany software applications. You will learn about the risks associated with being connected to the Internet, and about the security measures that can keep your computer system and your personal information secure. Finally, you will study the fundamental elements of project and program management, and the importance of acquiring these skills for all IT job roles. All CIW Foundations courses offer Case Studies about real-world skills applications, and job-related topics such as project management, and the relationship between technology and business operations. The CIW Foundations courses prepare you to take the CIW v5 Foundations certification exam. Guided, step-by-step labs provide opportunities to practice new skills. You can challenge yourself and review your skills after each lesson in the Lesson Summary and Lesson Review sections. Additional skill reinforcement is provided in Activities, Optional Labs and Lesson Quizzes that are included in the coursebook and on the companion CD-ROM. The companion CD-ROM contains the lab files used in the course. To practice the skills presented in the coursebook, refer to the Course Setup Guide And System Requirements section for information about system requirements and using the lab files. Series Internet Business Foundations is the first course in the CIW Foundations series. CIW Foundations consists of the following courses: Internet Business Foundations Site Development Foundations Network Technology Foundations Prerequisites No prior experience using the Internet, developing Web pages or configuring networks is necessary. However, you should be familiar with an operating system such as Microsoft Windows Vista before taking this course. The CIW Foundations courseware does not provide entry-level computer literacy. Rather, it builds upon computer literacy training and certifications such as Microsoft Office Specialist (www.microsoft.com) and IC 3 (www.certiport.com).

xv Certification The CIW Foundations series of courses prepares you to take the high-stakes CIW Foundations certification exam. If you pass the CIW Foundations exam, you will earn the highly respected CIW Associate certification, which is recognized throughout the industry as validating essential Internet skills for the workplace. The CIW Associate certification proves that an individual has evolved from being an Internet consumer to an Internet producer, capable of producing real-world Internet applications. A CIW Associate certificant can use common Internet-ready applications, can create properly formed HTML/XHTML documents, knows database essentials, understands project management concepts and can troubleshoot networks. For information about taking the CIW Foundations exam, visit www.ciwcertified.com. Self-Study Courseware This coursebook was developed for self-directed training. Along with comprehensive instructional text and objectives checklists, this coursebook provides easy-to-follow hands-on labs and a glossary of coursespecific terms. It also provides Internet addresses needed to complete some labs, although due to the constantly changing nature of the Internet, some addresses may no longer be valid. The coursebook also includes margin notes that provide additional tips and commentary to supplement course narrative, and that direct you to material relating directly to specified CIW Foundations exam objectives. Each course lesson includes practice, study and assessment materials such as preview and review questions, Case Studies, Application Projects, pen-and-paper-based Activities, Optional Labs and Quizzes. The coursebook includes a companion CD-ROM that provides files needed to complete labs. The companion CD-ROM also includes an appendix listing the CIW v5 Foundations certification exam objectives and locations of corresponding material in the coursebook. The companion CD-ROM provides all answers to Activities, Optional Labs and Lesson Quizzes. Lesson Quizzes are provided as study and self-assessment resources only; success on these materials in no way guarantees a passing score on the CIW v5 Foundations certification exam. After you have finished the course, you will find this coursebook to be a valuable resource for reviewing labs at home or in the workplace and applying the skills you have learned. Additional online resources In addition to the material found in the coursebooks, you can visit CIW Online at www.certificationpartners.com/cciivv/ciw-online/index.html to help you prepare for the CIW v5 Foundations certification exam. CIW Online provides a variety of online tools you can use to supplement the Official CIW Courseware, including: Practice Exam questions The CIW Certification Practice Exams help measure proficiency on specific topics or the full range of CIW skills objectives. With nearly 700 exam questions, this powerful tool can be used to pre-assess certification aptitude, to prepare for the high-stakes exam environment, and to identify skills gaps and additional study needs. Visit www.ciwcertified.com/training/practice-exams.asp or call (602) 275-7700 for product and purchase information about currently available CIW Certification Practice Exams. Course review questions The course review questions consist of more than 1,300 multiple-choice questions that cover numerous topics throughout the Foundations course material, not just those topics addressed by the CIW exam objectives. The questions are completely integrated with material from the book and can be used to assess your understanding of the course material. Interactive exercises These activities consist of fill-in-the-blank, true-or-false, categorizing, matching and crossword puzzle exercises. The self-testing exercises provide immediate scoring and feedback after completion, allowing you to focus on topics that require additional study. The exercises

xvi are based on Foundations content and prepare you to excel in tests and quizzes that feature multiplechoice questions. Online flashcards Over 400 glossary flashcards test your vocabulary of important Foundations terms. The interactive flashcards show a vocabulary term on one side and the definition on the other. You may move through the flashcards as necessary for extra review. Course Objectives After completing this course, you will be able to: Define Information Technology (IT) job roles, explore career opportunities in the IT industry, and effectively communicate technical information to non-technical audiences. Define technology adoption, business and data models, and identify the importance of standards. Define networks, the Internet, Internet connection methods, Internet protocols, the Domain Name System (DNS) and cloud computing. Identify the basic functions of Web browsers and the components of Web addresses, configure browser preferences and security, use and control cookies, extend browser functionality with plug-ins and add-ons, use browsers to download and manage files, and identify ways in which browsers are used in the business world to maintain intranets/extranets and to conduct training and conferences. Define and use multimedia. Define databases and database components, define Web search engines, and conduct Web searches using Boolean operators and advanced search techniques. Evaluate and organize information you retrieve from resources on the Internet. Install and configure e-mail clients, use e-mail effectively in the work environment, identify and resolve e-mail problems, and identify the functions of personal information management (PIM) software. Use news clients, listserve groups, Telnet, FTP, VNC and Microsoft Terminal Services, and troubleshoot Internet client issues using TCP/IP tools. Identify software development tools, compare proprietary software to open-source development, and explain the patent and licensing practices that accompany software programs and tools. Identify and use modern Web 2.0 technologies, such as Ajax, wikis, folksonomy, Web feeds, podcasts, semantic Web, mashups, social networking, instant messaging, text messaging and blogging. Apply guidelines for effective communication over the Internet, and identify unified communications technologies that seek to simplify and integrate all forms of communication. Identify topics related to Web security such as encryption, authentication, firewalls, malware, spyware, patches, updates and typosquatting. Identify ethical and legal issues related to Internet use, such as privacy concerns, copyright issues, licensing issues, trademark issues and encryption policies. Identify project and program management skills and phases, and discuss the business implications of IT decisions. Course Setup Guide and System Requirements In order to implement this course, you will need to set up your computer based on the hardware, software and connectivity requirements listed in the following sections. However, you may want to use additional software to further explore network interaction or related technologies.

xvii Hardware requirements The following table summarizes the hardware requirements for all courses in the CIW program. Note: The CIW hardware requirements are similar to the minimum system requirements for Microsoft Windows Vista Business implementation. Hardware Specifications Processor L2 cache Hard disk RAM CD-RW Network interface card (NIC) Sound card/speakers Video adapter Minimum Requirements 1 GHz 32-bit (x86) or 64-bit (x64) processor 256 KB 40 GB with at least 15 GB of available space At least 1 GB 32X 10BaseT or 100BaseTX (10 or 100 Mbps) Required for movie clips and labs that use sound Support for DirectX9 graphics with: WDDM Driver At least 128 MB of graphics memory Pixel Shader 2.0 in hardware 32 bits per pixel Monitor Super VGA (1024 x 768) Software requirements If you are taking all three CIW Foundations self-study courses sequentially, there is no need to reformat your computer for each course. The recommended software configurations for computers used to complete the labs in this book series are as follows. Internet Business Foundations To be installed before starting the course: Microsoft Windows Vista Business (typical installation) Microsoft Internet Explorer 8.0 (typical installation) To be installed during course labs: Firefox 3.0.5 (binary provided in the C:\CIW\Internet\Lab Files\Lesson03 folder) Google Chrome 1.0 (binary provided in the C:\CIW\Internet\Lab Files\Lesson03 folder) Ogg Codecs (binary provided in the C:\CIW\Internet\Lab Files\Lesson04 folder) Aethera (binary provided in the C:\CIW\Internet\Lab Files\Lesson06 folder) Thunderbird 2.0 (binary provided in the C:\CIW\Internet\Lab Files\Lesson06 folder) TightVNC, Bzip2 and Bunzip2 (binaries provided in the C:\CIW\Internet\Lab Files\Lesson07 folder) Audacity and Windows Live Messenger (binaries provided in the C:\CIW\Internet\Lab Files\Lesson08 folder) Ad-AwareAE (binary provided in the C:\CIW\Internet\Lab Files\Lesson09 folder) GanttProject (binary provided in the C:\CIW\Internet\Lab Files\Lesson10 folder)

xviii Site Development Foundations To be installed before starting the course: Microsoft Windows Vista Business (typical installation) Microsoft Internet Explorer 8.0 (typical installation) Firefox 3.0.5 (typical installation) To be installed during course labs: Lynx (binary provided in the C:\CIW\Site_Dev\Lab Files\Lesson01\Lab_1-2\Lynx folder) FormMail (binary provided in the C:\CIW\Site_Dev\Lab Files\Lesson07\FormMail folder) KompoZer (binary provided in the C:\CIW\Site_Dev\Lab Files\Lesson10 folder) Audacity (binary provided in the C:\CIW\Site_Dev\Lab Files\Lesson11 folder) XAMPP (binary provided in the C:\CIW\Site_Dev\Lab Files\Lesson11\Lab_11-1\XAMPP folder) Network Technology Foundations To be installed before starting the course: Microsoft Windows Vista Business (typical installation) Microsoft Internet Explorer 8.0 (typical installation) Firefox 3.0.5 (typical installation) To be installed during course labs: utorrent (binary provided in the C:\CIW\Network\Lab Files\Lesson01 folder) FileZilla_v3.0.2.1 (torrent file provided in the C:\CIW\Network\Lab Files\Lesson01 folder) 7-Zip (binary provided in the C:\CIW\Network\Lab Files\Lesson01 folder) FineCrypt 10.1 (binary provided in the C:\CIW\Network\Lab Files\Lesson05 folder) Installing and configuring Microsoft Windows Vista Business The three CIW v5 Foundations self-study courses can be completed without reinstalling the operating system for each course. Install Windows Vista Business with the default settings. The only requirement is that your system must be able to access the Internet in order for you to perform the hands-on labs in all CIW v5 Foundations self-study courses. Note: If you have already installed Windows Vista Business and have Internet access, you can skip this section. The instructions for installing Windows Vista Business are as follows: 1. Obtain a valid license for all copies of Windows Vista Business. 2. Begin setup by setting the boot sequence for your computer so that it will boot from the CD drive, then insert the Windows Vista Business CD-ROM and reboot. 3. When prompted, specify your installation language, time and currency format, and keyboard type. 4. When prompted, enter your 25-digit product key. 5. Accept the license terms.

xix 6. Specify to conduct a Custom (advanced) installation. Use the following parameters to perform a custom installation of Windows Vista Business. When This Information Is Required Partition Location Partition Size User Name Type Administrator Password Confirm Password Windows Protection Method Date, Time and Time Zone Settings Use Phase 1 Default (C:) Entire hard disk drive Phase 2 (after Windows formats and installs files to your hard disk drive) Your name password (all lowercase letters) password (all lowercase letters) Specify: Use Recommended Settings Customize for your location Configure Windows Vista Business for use in these courses by specifying the following settings: Specify a valid IP address 1. Log on as Administrator. 2. Select Start Control Panel, then double-click Network And Sharing Center. 3. Click the View Status link next to Local Area Connection, then click the Properties button to display the Local Area Connection Properties dialog box. 4. In the list box, click Internet Protocol Version 4 (TCP/IPv4), then click Properties to open the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box. 5. Select Use The Following IP Address, then manually enter the IP address information specific to your system. You can use DHCP if you prefer; however, prepare the system for networking. Note: Do not enter DNS configurations; you will configure DNS during the labs. 6. Click OK, then close all open dialog boxes and windows. Specify the CLASSROOM workgroup 1. Select Start Control Panel, then double-click System to open the System window. 2. In the Computer Name, Domain, And Workgroup Settings section, click the Change Settings link to display the Computer Name tab of the System Properties dialog box. Click the Change button. 3. In the Member Of section, click Workgroup, type classroom in the Workgroup field, click OK, enter your name and password when prompted, then restart your computer.

xx Disable the Windows Vista Business firewall 1. Select Start Control Panel, then double-click Windows Firewall to open the Windows Firewall window. 2. Click the Change Settings link to display the Windows Firewall Settings dialog box. Select Off (Not Recommended), then click OK. 3. Close all open windows. When you are finished configuring Windows Vista Business, verify that your system is working and that it can communicate with other systems on the Internet. Enabling the Fast User Switching feature and creating user accounts In the Internet Business Foundations course, there are a number of labs in Lesson 6 that require multiple users in order to demonstrate e-mail features. Fast User Switching is a feature of Windows Vista that allows multiple users to share the same computer workstation by making it possible for you to switch among users without logging off the computer. For example, suppose you send an e-mail message to another user. You can use Fast User Switching to log off as the user who sent the e-mail message, and then log on as the user who received the message, without closing the programs you were running as the user who sent the e-mail message. Note: You must enable the Fast User Switching feature and add two new user accounts in order to complete the labs in Lesson 6 that require multiple users. By so doing, you can play the part of both users (the sender and the recipient) as you advance through the lab steps. Fast User Switching is enabled by default in Windows Vista. Complete the following steps to add two new user accounts. 1. Click Start, then right-click Computer and select Manage. The Computer Management window will appear. 2. Expand Local Users And Groups, then right-click Users and select New User. The New User dialog box will appear. 3. Type a name of your choice for the new account (such as User1) and specify a password that meets the following criteria: The password must be at least six characters long. The password must contain a combination of at least three of the following characters: uppercase letters, lowercase letters, numbers, or symbols (e.g., punctuation marks). The password cannot contain the user's user name or screen name. 4. Deselect User Must Change Password At Next Logon, then click Create. 5. Repeat Steps 3 and 4 to create a new account for User2. 6. Close the New User dialog box and the Computer Management window. 7. Now, you will assign administrator privileges to the new user accounts. Select Start Control Panel User Accounts. Click the Manage Another Account link. 8. Click User1, then click the Change The Account Type link. Click Administrator, then click Change Account Type.

xxi 9. Click the Manage Another Account link, click User2, then repeat Step 8 to assign administrator privileges to User2. When you are finished, close the Control Panel window. 10. From the Windows Vista Desktop, click the Start button, then click the right arrow to the right of the lock icon in the lower-right corner of the Start menu window. Notice the Switch User option that appears at the top of the submenu. You use the Switch User option to specify the user account you want to use to log on to your computer. 11. Click the Switch User option. Notice that a screen appears displaying icons and names for all user accounts that have been assigned to your computer. 12. Click the icon that represents your user account (not one of the two new user accounts you just created) to log on to the system. You will use the two new user accounts in Lesson 6. Connectivity requirements Internet connectivity is required for this course. You will experience optimal performance with a dedicated Internet connection (e.g., a cable/dsl modem or a T1 line). However, you can complete the course using a slower connection (e.g., 56-Kbps modem). CIW v5 Foundations Self-Study Kit Companion CD-ROM Each coursebook includes a companion CD-ROM. The files on the CD-ROM are referenced and used throughout the course. When you insert the CIW v5 Foundations Self-Study Kit Companion CD-ROM, you will see a list of courses. Select the appropriate course, and you will be prompted to unzip an executable file. This executable file will create a directory of all supplemental materials for the course. You can choose to download the directory to the default location, which is C:\CIW\[Course_Title]. Optionally, you can select another location. After you choose the location and unzip the file, a directory will be created on your hard disk drive. All supplemental files for the course will be downloaded to this directory. You can then create a shortcut to this directory on your Desktop. As you perform the course labs, you can use this shortcut to access your lab files quickly. CIW v5 Foundations Movies The CIW Foundations courses offer movie files from LearnKey that discuss selected technology topics. To view the movies, log on to the CIW Online Campus at http://www.certification-partners.com/ciw-online/. Use the coupon provided with your materials to register for the movies and view them online. If you have any questions, please contact Product Support at (866) 370-3511 or support@certification-partners.com. To view the movies, you need the following programs: Microsoft Internet Explorer 5.5 (or later) browser (www.microsoft.com), or Mozilla Firefox 3.0 (or later) browser (www.mozilla.com) Windows Media Player 9 (or later) and all necessary codecs Windows Update, to obtain the latest updates for the versions of Internet Explorer and Media Player you have installed on your computer Note: You will install Windows Media Player and Mozilla Firefox software on your system during labs in the Internet Business Foundations self-study course. Consider the following points about the CIW v5 Foundations Movies:

xxii The movies provide supplementary instruction in a multimedia format, and enhance the coursebook narrative and labs. However, movie content does not comprehensively address CIW Foundations exam objectives and is not intended to replace coursebook content. CIW Foundations coursebooks include a Movie Time appendix that indicates appropriate points at which to view the supplemental movies. The coupon provided allows you access to the CIW Online Campus to view the movies. Do not distribute the coupon to unauthorized users.

xxiii Conventions and Graphics The following conventions are used in this coursebook. Terms Lab Text Notations Program Code or Commands Technology terms defined in the margins are indicated in bold type the first time they appear in the text. However, not every word in bold type is a term requiring definition. Text that you enter during a lab appears in italic bold type. Names of components that you access or change in a lab appear in bold type. Notations or comments regarding screenshots, labs or other text are indicated in italic type. Text used in program code or operating system commands appears in the Lucida Sans Typewriter font. The following graphics are used in this coursebook. Tech Notes point out exceptions or special circumstances that you may find when working with a particular procedure. Tech Notes that occur within a lab are displayed without the graphic. Tech Tips offer special-interest information about the current subject. Warnings alert you about cautions to observe or actions to avoid. This graphic signals the start of a lab or other hands-on activity. The Movie Time graphic signals appropriate points in the course at which to view movie clips. All movie clips are 2009 LearnKey, Inc. Each lesson summary includes an Application Project. This project is designed to provoke interest and apply the skills taught in the lesson to your daily activities. Each lesson concludes with a summary of the skills and objectives taught in that lesson. You can use the Skills Review checklist to evaluate what you have learned. This graphic indicates a line of code that is completed on the following line.

xxiv

1Lesson 1: Introduction to IT Business and Careers Objectives By the end of this lesson, you will be able to: 1.1.1: Distinguish between individual job roles within the IT industry and the IT profession as a whole. 1.1.2: Identify responsibilities, tasks and skills of a Web site designer. 1.1.3: Distinguish between a Web architect and a Web application developer. 1.1.4: Identify responsibilities, tasks and skills of a Web site analyst. 1.1.5: Identify responsibilities, tasks and skills of a Web site manager. 1.1.6: Identify responsibilities, tasks and skills of a database administrator. 1.1.7: Identify responsibilities, tasks and skills of a server administrator, including e- mail/groupware administrator, Web server administrator. 1.1.8: Identify responsibilities, tasks and skills of a network engineer. 1.1.9: Distinguish between a security manager and a security analyst/consultant. 1.1.10: Identify responsibilities, tasks and skills of a PC repair technician. 1.1.11: Identify responsibilities, tasks and skills of a help desk technician. 1.1.12: Identify responsibilities, tasks and skills of a Web marketing professional. 1.1.13: Interpret a common business organization chart, including identifying duties of a Chief Executive Officer (CEO) versus a Chief Operations Officer (COO). 1.2.2: Explain Internet history, define current protocols (e.g., IPv4, IPv6, related protocols), and identify timelines and models for technology adoption curves such as (e.g., Moore's Law, Geoffrey Moore's technology adoption life cycle, and Kuhn's concept of paradigm shifts). 1.15.6: Explain common models for information flow and reporting between IT and upper management, as well as IT and other areas of the organization, including identifying project approval steps, SWOT analysis, data modeling vs. business ontology.

1-2 Internet Business Foundations 1.15.15: Identify the importance of quality management and assurance, including ISO 9000 standards. 1.20.1: Identify and explore career opportunities in the IT industry that relate to personal career goals. 1.20.2: Conduct job searches. 1.20.3: Use Internet technology to obtain employment, including employment sites and networking sites such as LinkedIn. 1.20.4: Create a résumé and place it in an appropriate file format (e.g., ASCII, HTML, RTF, PDF). 1.20.5: Determine the relevance and necessity of education as job roles, responsibilities and technologies change. 1.21.1: Communicate technical issues and concerns to an end user. 1.21.2: Demonstrate the value of IT-related expenses to management and stakeholders.

Lesson 1: Introduction to IT Business and Careers 1-3 Pre-Assessment Questions 1. In which job role does an individual determine the visibility of Web sites across multiple clients and search engines? a. Web site analyst b. Network engineer c. SEO analyst d. Server administrator 2. In computer science and Web technology, what is ontology? a. The return-on-investment (ROI) impact of IT decisions on an organization's bottom line b. The tendancy for organizational and market changes to occur in a revolutionary manner c. The process of determining the requirements that a database must fulfill in order to function properly for an organization d. The study of how a particular part of a company, called a domain, is organized 3. Why is it important for people who want jobs in the IT industry to have good communication skills?

1-4 Internet Business Foundations Information Technology (IT) Information Technology (IT) The management and processing of information using computers and computer networks. OBJECTIVE 1.1.1: Individual IT job roles NOTE: Project management concepts and techniques will be presented extensively in a later lesson. OBJECTIVE 1.1.2: Web site designer job role Web site designer An individual who is responsible for the organization and appearance of a Web site. Information Technology (IT) refers to all aspects of managing and processing information using computers and computer networks. Because computers are vital to information management in all organizations and companies, most organizations have dedicated computer personnel referred to as IT departments. IT departments generally deal with computer, telecommunications, network and other related technologies and services to provide employees with the resources necessary to reach their organizations' goals. Information Technology is one of the fastest-growing career fields in the world today. IT skills are essential in all industries and are necessary in many different job roles. IT Job Roles The following sections will identify the various job roles in the IT industry, including the responsibilities, tasks and skills they encompass. As you will see, many of the responsibilities and skills overlap, so distinctions between job roles are not always precise. Many of the job roles listed in this section are integral components of most organizations. However, many are outsourced to contractors in the United States or, increasingly, sent offshore to be performed by qualified personnel in developing countries. By incorporating business and project management skills into your skill set, you will make yourself more marketable for employment in the U.S. IT industry. Adopting a holistic perspective Competent IT professionals understand how their work affects others. Therefore, a professional must have a working knowledge of various IT concepts and practices relevant to the company. A holistic perspective the ability to place a particular technology or practice in context with the entire company is vital. A holistic perspective in relation to IT involves understanding the needs of the business, as well as the various technologies required to design and deliver specific products. These products may be software designed by the company, services provided by the company or marketing pieces such as HTML-based e-mail and Web sites. As you learn about the IT profession, take the time to consider how all of the job roles discussed here must work closely with each other in order to create effective business solutions. Web site designers Web site designers create the "look and feel" that visitors will see when they access a site on the World Wide Web. Web site designers determine the most effective site layouts, color schemes, navigational links and fonts to maintain visitor interest in the site. Site designers primarily establish the organization, mood and tone of the site relative to its content, with input from various parties. These parties include members of the marketing, sales and IT departments. In short, Web site designers are responsible for developing the user interface and aesthetics of a Web site, given input from those who know the company s audience and the company's technological abilities. Web site designers must understand Web development technology and be proficient in Web languages such as Hypertext Markup Language (HTML), CSS, JavaScript; graphics applications such as Flash and Silverlight, Photoshop, Fireworks and the GIMP; and Web site development applications such as Adobe Dreamweaver and Microsoft Expression. They must also possess good communication, organizational and visual design skills.

Lesson 1: Introduction to IT Business and Careers 1-5 Web site designers work closely with other departments within organizations and with potential site viewers to determine the information and format that the site will present online. NOTE: Knowledge of HTML is not required to complete this lab. The HTML code you type is for demonstration only. Figures 1-1 and 1-2 show two different designs for the same Web site. Figure 1-1 shows a Web page with rudimentary formatting applied. A Web site designer may look at this page, determine that the page will not effectively grab the attention of potential viewers, and change the formatting and color scheme to make the page more interesting, thereby increasing viewer awareness of and participation in the Web site. Figure 1-1: Web site design plain Web page Figure 1-2 shows the same Web page with additional formatting applied. Notice that this Web page is more interesting and easier to read than the preceding Web page. Figure 1-2: Web site design more interesting Web page In the following lab, you will review basic Web site design concepts. Suppose you are the Web site designer for your company. Your project manager has asked you to prepare several prototypes of the Summer Youth Blitz Web page for Habitat For Humanity. What formatting attributes or images would you use to increase the page's visual appeal? Lab 1-1: Exploring basic Web site design concepts In this lab, you will modify an HTML page to make it more aesthetically pleasing and informative. 1. First, you will view the existing HTML page and consider ways to improve it. Open Windows Explorer and navigate to the C:\CIW\Internet\Lab Files\Lesson01 folder.

1-6 Internet Business Foundations NOTE: This course assumes that the default browser is Mozilla Firefox. All screen captures that use the default browser will appear in Firefox. 2. Double-click the Lab_1-1 folder, then double-click Blitz.html. This step opens your default browser and displays the Web page shown in Figure 1-3. Note: If you want to display file name extensions in Windows Explorer, select Organize Folder And Search Options, then click the View tab. Deselect Hide Extensions For Known File Types, click the Apply button, then click OK. Figure 1-3: Viewing Web page for design qualities Consider the following points about this Web page: The page provides a clear explanation of the Habitat For Humanity Summer Youth Blitz and offers a link to an application form. The page contains some graphical content, such as the side bar. The World Wide Web lends itself to graphical content. If you add the right image, you will better convey the page's message. An image can also increase the attractiveness of the page. What technologies are necessary to deliver this page? Consider the different parties that need to coordinate with each other in order for this to occur, including network engineers, server administrators, database administrators and designers. Suppose that as a Web site designer, you have decided to add an image. Working with a graphic artist, you have created an image and want to insert this image into the page. 3. Next, you will change the HTML file so that it is more aesthetically pleasing. Close your browser window. 4. In Windows Explorer, double-click SYB.jpg to display the image that you will add to enhance the existing Web page. 5. Close the image file. 6. In Windows Explorer, right-click Blitz.html, then click Properties. The Properties dialog box will display. 7. Verify that the Read-Only check box is deselected, then click OK. This step ensures that you will be able to edit the HTML file.

Lesson 1: Introduction to IT Business and Careers 1-7 8. In Windows Explorer, right-click Blitz.html, then click Open With Notepad. This step opens the Notepad application. You will see the HTML code display in the Notepad window. NOTE: In Step 10, ensure that you type the HTML code on one line exactly as written. 9. Scroll down approximately 90 percent of the file until you see the gap immediately before the following line: <P>Summer Youth Blitz is a unique service experience for a 10. In the white space two lines above the preceding text, type the following code: <img src="syb.jpg" width="300" height="222" border="0" alt="do something real this summer - build a home for a family" /> Note: Ensure that the above code displays as a single line. The HTML code (including your newly inserted code) should match Figure 1-4. Figure 1-4: Inserting HTML code 11. Press CTRL+S to save the changes, then close the Notepad window. 12. Open Blitz.html in your Web browser. The modified Web page should appear as shown in Figure 1-5. Figure 1-5: Improved Web page

1-8 Internet Business Foundations NOTE: If you are using Microsoft Internet Explorer as your default browser, the pop-up box will appear. If you are using Mozilla Firefox, you will need to load the POPUP ALT add-on (Tools Add-Ons) and restart Firefox in order for the pop-up box to appear. OBJECTIVE 1.1.3: Web architect vs. Web application developer Web application developer An individual who develops primarily server-side Web applications. Web architect An individual who creates the overview plan of a Web site's development. OBJECTIVE 1.1.4: Web site analyst job role Web site analyst An individual who analyzes Web site statistics to determine the site's effectiveness. 13. Position the mouse pointer over the inserted graphic. Notice that a pop-up box with the text "Do something real this summer - build a home for a family" displays for several seconds. 14. Consider ways that adding this new image helps convey the message contained in this page's text. You have just helped enhance the design of this page. 15. Close the browser window. In this lab, you considered Web site design issues and modified a page. You now have a better understanding of the Web site designer job role. Web application developers and Web architects Web application developers use Web programming languages or products to develop Web sites, generally for Web server applications. Web application developers design, build and test the Web pages and hyperlinks that form the site. Web application developers must be proficient in programming and scripting languages such as Java, JavaScript, C++, Perl and others. Web application developers may also lead project teams that design Web applications, so strong project management and analytical abilities are desirable skills for this job role. Web architects are responsible for the overview plan of a Web site's development. They consult with management and Web site users to design and implement the plan for developing and maintaining an organization's Web site. They often manage Web site designers and Web application developers to design, develop, document and maintain an organization's Web presence. Web architects must have solid project management, organizational and communication skills in order to provide technical leadership to an application development staff. Web site analysts Web site analysts are responsible for analyzing Web site effectiveness from the viewpoints of both the organization and the end user. Analysts may design and conduct user surveys to obtain feedback about Web site features, then provide recommendations to improve the site's effectiveness. Analysts may also develop and monitor Web site tracking methods to determine the number of visitors, or "hits," a site receives. Good analytical and communication skills are required for Web site analysts. Analysts gather and analyze statistical data, and often work with IT and marketing departments to recommend ways to increase a Web site's effectiveness. An analyst can also spend a considerable amount of time writing HTML, as well as creating graphics and writing client-side code such as JavaScript and VBScript. Figure 1-6 shows an example of a Web site usage summary report generated by a Web site analyst. The report indicates that Web traffic remained relatively steady for several months, then declined dramatically in August. A Web site analyst would use these statistics, along with other research, to provide information to marketing and sales departments about their efforts. For example, if data shows that traffic increases with concentrated marketing efforts, then the Web site can be used to measure marketing success.

Lesson 1: Introduction to IT Business and Careers 1-9 dead link A hyperlink that, when clicked, sends a Web site visitor to a page or resource that does not exist on the server. OBJECTIVE 1.1.5: Web site manager job role Web site manager An individual who manages a Web development team. Figure 1-6: Web site usage report A Web site analyst will probably be called to examine the data further to see whether decreased traffic has translated into decreased profitability for the company. Data analysis also has technical uses. For example, you can review usage statistics to help the IT department plan for increases in Web activity that accompany concentrated marketing efforts. It may become necessary to obtain a larger server or plan for more bandwidth if Web traffic is anticipated to increase dramatically. Finally, an analyst may be asked to make technical changes to the site. Such changes may include modifying HTML, updating server-side scripts to eliminate errors, and finetuning database connectivity. One common activity of a Web site analyst is to look for evidence of locations at which visitors become confused, or get sent to missing pages, called dead links. One possible indicator of a dead link is the "404 Page Not Found" error, which you may see in a Web server log file. Regardless of the specific activities you undertake, if you are an effective Web site analyst, your Web site will operate more efficiently, from both a sales-and-marketing perspective and a technical perspective. Web site managers A Web site manager in a large organization generally manages the Web development team. A Web site manager in a small company could perform all the Web development job roles discussed previously. In short, Web site managers provide organizational leadership for Web site content and all related initiatives. Web site managers are typically involved in standardizing the content, style, design and development procedures required to create and maintain an organization's Web site. Site managers also assess the costs and benefits of implementing these standards. Site managers may also evaluate alternative Web technologies and standards, and train Web designers and application developers. Web site managers do not necessarily need to possess highly technical skills. However, they must demonstrate the ability to remain up-to-date in their knowledge and understanding of current Web technologies and processes. Site managers must also possess the ability to analyze, interpret and integrate a wide variety of data, evaluate Web resource utilization, forecast customer and organizational site needs, and anticipate and resolve ethical issues related to site content and design.

1-10 Internet Business Foundations OBJECTIVE 1.1.6: Database administrator job role database administrator An individual who is responsible for the maintenance and security of an organization's database resources and data. NOTE: Databases will be discussed in greater detail in a later lesson. OBJECTIVE 1.1.7: Server administrator job roles server administrator An individual who manages and maintains network servers. Database administrators Databases store and manage information. Databases are used in all areas of an organization to store information related to employees, vendors, customers, inventory, resources and so on. The power of databases lies in their ability to organize, sort and access information to meet specific user requirements. Database administrators are responsible for the maintenance and security of an organization's database resources and data. They are also responsible for researching and analyzing the latest database technologies and developments, and for providing recommendations to senior management about database use and information management procedures and standards. Database administrators develop and implement database maintenance plans to check the integrity of the data, manage the physical resources necessary to store and manipulate the data, administer and enforce data usage standards, and audit database systems to maintain system performance. Database administrators also manage backup and recovery procedures to prevent data loss, and apply database software upgrades and repairs as needed. Database administrators must be able to judge system effectiveness and efficiency, analyze information to propose solutions and solve problems, evaluate the impact of resource allocations, and communicate effectively with senior management when discussing the benefits and risks of proposed technology solutions. Server administrators Server administrators are responsible for designing, implementing, managing and maintaining network servers, and associated applications and peripheral devices. Server administrators may also implement policies and procedures for ensuring the security and integrity of the servers and network, and protect the network from viruses and other intrusion threats, such as hacking. Other responsibilities include providing technical assistance and training to IT staff and system users, troubleshooting server and network problems, implementing cost-effective solutions, suggesting and implementing system improvements, and providing data backup services. Server administrators should be proficient in a variety of network operating systems and applications, such as Windows, UNIX/Linux, Microsoft Internet Information Services (IIS), Microsoft SQL Server and Microsoft Exchange. They should also be familiar with Web technologies such as HTML, Extensible Markup Language (XML) and File Transfer Protocol (FTP), and applications such as Adobe Dreamweaver. In addition to possessing strong technical skills, server administrators must display strong communication skills so they can distill complex server and network issues into understandable concepts upon which senior management can make decisions and users can take action. Communication skills also include project management skills, as you will learn later in this lesson. Server administrators can be classified into subcategories, such as Web server administrators or e-mail/groupware administrators. Web server administrators are responsible for servers that act as gateways between the organization and the Internet. E- mail/groupware administrators are responsible for network servers upon which e-mail clients and groupware (software that enables groups of people in a local area network [LAN] to organize their activities) are located. E-mail/groupware administrators install and maintain e-mail clients, develop and maintain security procedures to protect the integrity of electronic data transfers, and analyze and recommend improvements for e-mail utilization, capacity and performance.

Lesson 1: Introduction to IT Business and Careers 1-11 OBJECTIVE 1.1.8: Network engineer job role network engineer An individual who manages and maintains a network infrastructure. NOTE: LANs, WANs, IPv4 and IPv6 will be presented later in this lesson. OBJECTIVE 1.1.9: Security manager vs. security analyst/consultant security manager An individual who manages the security measures used to protect electronic data. security analyst/consultant An individual who examines an organization's security requirements and determines the necessary infrastructure. Network engineers Network engineers focus on the design, implementation, delivery and support of network components, policies and procedures used by an organization. Network engineers are responsible for configuring and testing network devices, and setting up and maintaining the network infrastructure. Network engineers also analyze, design and implement networking technologies to better meet the needs of the organization and the network users. Network engineers support and maintain network devices such as Web servers, e-mail servers, routers, connecting cables and so forth. Network engineers may also be responsible for system security, data backup, disaster recovery planning and virus protection. Network engineers must be able to implement LANs and wide area networks (WANs), and be proficient in a variety of networking skills, such as routing and switching, network traffic analysis, and device configuration and testing. Network engineers must also be knowledgeable in a variety of network technologies and protocols, such as network communication media, Virtual Private Networks (VPNs), firewalls, Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6). Network engineers must also possess excellent communication skills to be able to present technical information in an understandable way to management, non-technical associates and customers. Convergence technologies and information technology Traditionally, telephone networks have been limited to sending voice data (e.g., telephone calls). Since the mid-1990s, however, telephone networks have increasingly transported network-based data. Any equipment used to carry voice/data and run by telephone companies is called a telephony network. Similarly, data networks have traditionally been limited to sending standard network data (such as files from a Windows client to a Windows server via TCP/IP). Increasingly, however, voice and data networks have been combined, or converged, creating convergent networks. Convergent networks can help reduce cost to companies and organizations. Increasingly, Internet connections are used to carry voice communication. Network engineers are often asked to manage these networks. Security managers and security analysts/consultants Security managers are responsible for managing the security measures used to protect electronic data. They maintain the software and procedures necessary to protect the confidentiality and integrity of information, and legitimate access to it. Security managers perform security risk assessments, prepare for disaster recovery, monitor security control systems to ensure that appropriate security clearances and information access levels are maintained, and work with other departments to maintain secure data and information flow. Security managers may also implement and document the organization's security policies and procedures, provide security training to management and employees, and monitor and recommend advancements in information security technologies. Security analysts/consultants are responsible for examining an organization's security requirements and determining the hardware, communications and software capabilities needed to satisfy the requirements. Security analysts/consultants may lead project teams that perform risk assessment, information security program development and implementation, network security architecture review and design, product reviews, and security solution deployments. In addition to the technical skills related to information security, security analysts/consultants should have strong project management, consulting and

1-12 Internet Business Foundations communication skills. They will often manage security-related projects, write technical reports understandable to non-technical readers and communicate recommendations to senior management. search engine optimization (SEO) The process of improving the volume and quality of traffic to a Web site by structuring content to improve search engine ranking. A specific activity of Internet marketing. SEO analyst An individual who determines the visibility of Web sites across multiple clients and search engines. OBJECTIVE 1.1.12: Web marketing manager job role Web marketing manager An individual who develops and implements plans to exploit the Internet for marketing and sales opportunities. Security managers and analysts/consultants should possess knowledge of server operating systems (Windows, UNIX/Linux, etc.), firewall technology, virus-scanning software, security management software, security assessment software, intrusiondetection systems, VPNs, and so forth. SEO analysts Search engine optimization (SEO) is the process of improving the volume and quality of traffic to a Web site based on the relevance of the site to search terms entered into a search engine. Generally, the higher a site ranks (i.e., the earlier it appears in search engine results pages), the more searchers will visit that site. SEO analysts are responsible for performing keyword research to determine the visibility of Web sites across multiple clients and search engines. SEO analysts will often work with the marketing team to develop interactive marketing strategies to increase Web site visiblity. SEO analysts should have a basic knowledge of HTML, CSS, JavaScript and other programming languages; experience in keyword research; and familiarity with search engine ranking, traffic and analysis software. SEO analysts should also possess strong analysis and writing skills, as well as communication and teamwork skills. Analysts must be able to analyze and summarize data, and present anaytical reports. Web marketing managers Web marketing managers are responsible for developing and implementing plans to take advantage of the sales and marketing opportunities available through the Internet. They help define their companies' objectives for using electronic commerce (e-commerce) and decide which computer applications are needed to achieve them. Internet marketing managers must possess knowledge of Internet-based applications and be able to analyze Web site traffic in order to develop recommendations to improve their companies' search engine optimization capabilities. Internet marketing managers must also possess business management and project management skills in order to develop budgets for projects, monitor project costs, provide status reports to management, and incorporate feedback from management. They must also possess strong analysis and writing skills, as well as communication and teamwork skills. Blog managers Blogging has become increasingly important to marketing a company, product or service. A well-run blog will discuss relevant topics. A blog manager has the following responsibilities: Publishing of articles in a timely manner. Ensuring that content is relevant. Enforcing quality control, including proper tone, grammar and spelling. Maintaining the blogging site or account. Coordinating writers to ensure that entries are made consistently.

Lesson 1: Introduction to IT Business and Careers 1-13 Archiving and organizing blog, audio and video entries so that content can be searched and retrieved for later use. OBJECTIVE 1.1.10: PC repair technician job role PC repair technician An individual who installs, modifies and repairs personal computer (PC) hardware components. NOTE: Consider the A+ certification with respect to PC repair and help desk technicians. OBJECTIVE 1.1.11: Help desk technician job role help desk technician An individual who diagnoses and resolves users' technical hardware and software problems. Managing talent, because many bloggers feel a sense of celebrity and think they need not keep to a schedule. A blog manager should understand how to work with these types of personalities. PC repair technicians Personal computer (PC) repair technicians install, modify and repair personal computer hardware components, such as PCs, disk drives, CD/DVD drives, tape devices, monitors, keyboards, data input devices and other peripheral equipment. PC repair technicians also install software, such as PC operating systems and application programs. PC technicians should be familiar with operating system and application program functionality in order to test and modify system functions to ensure proper performance. PC technicians need to possess communication skills in order to provide technical assistance and training to end users, answer user inquiries regarding PC operations, diagnose hardware problems, and provide solutions. In addition, PC technicians must be able to use standard shop tools, such as soldering equipment, power tools and hand tools. PC technicians also need to be aware of standard safety procedures associated with the repair and maintenance of electronic equipment. Help desk technicians Help desk technicians diagnose and resolve users' technical hardware and software problems. Help desk technicians typically receive questions from users who are having problems using computer hardware or software, or who want to know how to use a specific software application. Technicians must use their knowledge of hardware, operating systems, applications and any relevant procedures to determine the sources of problems and provide solutions. Technicians may need to research problems with co-workers, programmers, IT staff, hardware vendors or software vendors in order to provide solutions. Technicians may also be involved in testing hardware and software to evaluate their ease of use, and to determine their applicability to the current work environment. Help desk technicians must possess knowledge specific to the hardware, operating systems and software used by the organization. They must also possess strong communication skills to effectively discuss, troubleshoot and solve user problems, usually by telephone. Help desk technicians may also be responsible for documenting their troubleshooting and problem-solving activities, escalating problems they cannot solve that require immediate resolution, and making recommendations to senior management to streamline or improve help desk functions. Project management and IT responsibilities The following additional skills are necessary to become a successful IT professional: The ability to plan projects, which includes estimating costs for software, hardware and labor, as well as working with management to obtain project approval Writing skills, so that plans can be distributed to all relevant individuals The ability to work with vendors to obtain cost and time estimates for the proper software and equipment

1-14 Internet Business Foundations All IT workers must have some project management skills to excel at their positions and lead projects. OBJECTIVE 1.20.1: IT career goals OBJECTIVE 1.20.2: Job searches IT job skills in the future In most organizations, the current IT career model approximates a pyramid with many entry-level positions at the bottom, and fewer positions available as you move up the hierarchy. Many IT managers believe that the future IT career model will be diamondshaped: few entry-level jobs (because of offshore outsourcing of many IT positions), many mid-level positions, and few high-level positions. In the diamond-shaped model, managers foresee a lack of experienced professionals to fill the mid-level positions. Smaller companies that do not outsource due to scale may be the source of mid-level IT jobs required in larger organizations. It is increasingly important that IT professionals possess general business knowledge, negotiating skills, intercultural skills and project management skills. As an IT professional, you must be able to make informed decisions and fulfill commitments. If your company has outsourced some of its positions and you are working with foreign personnel, you may be able to avoid typical cross-cultural problems by doing the following: Learning common greetings or phrases in other languages Learning about common cultural misunderstandings so you can avoid them Developing good listening skills to better understand processes, issues and so forth that may be communicated to you in various ways Developing good communication skills to better disseminate information to those with whom you work IT Industry Career Opportunities IT refers to all aspects of managing and processing information using computers and computer networks. IT departments generally deal with computer, telecommunication, network and other related technologies and services to provide employees with the resources necessary to reach their organizations' goals. IT is one of the fastest-growing career fields in the world today. IT skills are essential in all industries and are necessary in many different job roles. The following sections will explore methods you can employ to conduct effective job searches, create résumés, and take advantage of educational degree programs and certifications to provide you with the skills, training and competitive advantage you need when searching for the IT job of your choice. Conducting job searches You can employ many methods to explore career opportunities in the IT (or any) industry, such as: Participating in on-campus interviews (if you are a college/university student). Searching the newspaper classified ads for jobs. Visiting employment agencies and employment placement services. Attending job or career fairs. Volunteering for positions related to your career interests.

Lesson 1: Introduction to IT Business and Careers 1-15 Seeking part-time work through temporary employment agencies or internships. Networking (socially) and gathering employment information from friends, acquaintances, business associates and association members. OBJECTIVE 1.20.3: Internet technology and employment Working with an executive search firm. Mailing cover letters and résumés to targeted organizations. Applying in person directly to targeted employers. Entering résumés electronically in database placement services or posting them on appropriate Web sites. Using Internet technology to conduct job searches. The traditional methods of seeking employment (for example, classified ads, job and career fairs, and so forth) are perhaps the most common but least effective means of gaining employment, especially when these methods are not combined with other methods. A combination of some or all of these methods would be the most effective way to conduct a job search. However, using Internet technology may be the most effective means of gathering information about different job roles and responsibilities, and conducting a job search. Using the Internet to conduct job searches You can browse Usenet newsgroups using Google Groups (http://groups.google.com), and use a variety of search engines to search the Internet for information about career opportunities in the IT industry. By entering keywords to narrow your search to specific job types, you can retrieve available job listings that relate to your personal career goals. The following sites (and many others) provide information about careers and contain thousands of job listings: Guru.com (www.guru.com) Excite Careers (http://jobs.excite.com) Yahoo! HotJobs (http://hotjobs.yahoo.com) GoFreelance (www.gofreelance.com) Freelance Switch Job Listings (http://jobs.freelanceswitch.com) All Freelance Directory (www.allfreelance.com) Sologig (www.sologig.com) Monster (www.monster.com) CollegeRecruiter.com (www.collegerecruiter.com) The Wall Street Journal's CareerJournal (http://cj.careers.adicio.com/careers/jobsearch/results) Payscale (www.payscale.com) CareerBuilder.com (www.careerbuilder.com) Building a personal network The Internet provides opportunities for you to network with business associates and other people who may be able to provide job leads. Sites such as LinkedIn (www.linkedin.com) allow you to build a professional profile online similar to a résumé, listing current and past job positions, skills, and education. You can then form links or

1-16 Internet Business Foundations connections to other people on the site with whom you have worked or associated. You and your connections become a network through which you can find other people you know or with whom you have professional skills or interests in common. Users can also write and post professional recommendations for each other. Other professional networking sites include Spoke (www.spoke.com), ZoomInfo (www.zoominfo.com), Jigsaw (www.jigsaw.com) and Plaxo (www.plaxo.com). As you evolve from being a Web consumer to being a Web producer of goods and services, consider the importance of using various sites to build your network. In the following lab, you will search a major Web site devoted to job listings in numerous fields. Assume you are a recent college graduate with a bachelor's degree in computer science. After a summer of working as a computer repair technician in your uncle's computer service and repair shop, you decide that you want to pursue a career as a network engineer or systems administrator. You can use Internet technology to search for entry-level jobs that are suitable to your career goals. Lab 1-2: Using Internet technology to conduct job searches In this lab, you will use the Monster Web site to search for information about IT careers. 1. Select Start All Programs Mozilla Firefox Mozilla Firefox to start the Firefox browser. 2. Click in the Location Bar, type www.monster.com, then press ENTER. The Monster home page and search engine will appear, as shown in Figure 1-7. Figure 1-7: Monster home page 3. Click in the Search Jobs text box, type network engineer, then press ENTER. This step accesses the Job Search Results page and retrieves all job listings containing the specified keywords in the job descriptions. 4. Click several hyperlinks and view the job descriptions and requirements. Click the Back button in the toolbar to return to the search results page after viewing each hyperlink.