ALA Tech Seminar

Post on 26-Jun-2015

186 Views

Category:

Documents

5 Downloads

Preview:

Click to see full reader

DESCRIPTION

Powerpoint used in training ALA members to help with their certification.

Transcript

ALA Tech Quiz Show

Question and Answer Samples and Techniques

Technology/Automation Management

• The Internet• Web-based technology• Hardware and software systems• Electronic Security and confidentiality

Michael ShufeldtIT Director

TRUE or FALSE?TRUE or FALSE?

Law practice today could not exist without the internet.

Ways to Surf/Browse to the Internet:

1. Internet Explorer2. Firefox3. Apple Safari4. Google Chrome

Ways to Connect to the Internet:

• T1 (dedicated circuit at 1.544 Mbps per line)• DSL (Digital Subscriber Line), Cable/Fiber Optic• Dial-Up Modem• 3G/4G Cell Network• ISDN (Integrated Services Digital Network

Google is an Example of:

A “Search Engine”

Search Engine Market Share*:

• Google (49%)• Yahoo (23.8%)• Bing (9.6%)• AOL (6.3%)• Ask (2.6%)

*Source: Nielsen Search Ratings

Match the concept to definition:

Newsgroup

Listserve

Real Time Comms

Uniform Resource Locator

TCP/IP

Protocols used on many networks

Chat over internet

Open discussion no subscription

Mailing list by email subscription

Web page address

Bonus: What is the emerging force in online communication?

Social Networking.

Facebook, LinkedIn, Twitter, MySpace and others.

A.

B.

C.

D.

E.

Microsoft Access is an example of?

All of the above

Annoying

A Word Processor

An Email Program

A database program

Match the tool with the job:

Outlook/Lotus Notes

Word/Wordperfect

Excel/Quattro Pro

Elite/Prolaw/Juris

Summation/DBText

Case/Trial Management

Spreadsheets

Send/Receive Email

Word Processing

DMS/Billing/More

Westlaw, Lexis/Nexis and Findlaw are examples of?

Online Legal Research.

Free options are also available, but more limited.

Basic Netiquette

1. ALL CAPS means shouting 2. Use underscores or asterisks for emphasizing words 3. Watch your tone -- it's written, not verbal communication 4. Check your spelling 5. Quote back only what is relevant 6. Use an automatic signature, especially if you are a business 7. Where are you located if requesting goods or services? 8. Don't send unsolicited file attachments 9. Use a descriptive Subject line 10. Only forward jokes and chainletters if you are SURE the recipient wants them (and hasn't already gotten a copy or three from someone else) 11. Don't send "Check This Out" Unsolicited URLs 12. Don't expose your email routing list to spammers 13. Avoid Flamewars14. Don't believe every cybermyth, urban legend, hoax or virus "alert" sent to you(verify it before believing or forwarding it to anyone else by visiting

15. Never imply you are representing your firm when you are not.

Hardware, Networking & Terminology

• PCs and Servers• Hubs, Switches and Routers• Optical and Solid State Disks• Bites and Bytes• Operating Systems

Match the term and definition:

Byte

Terabyte

Megabyte

ASCII

Kilobyte

1 Thousand Bytes

1 Million Bytes

8 Bits

1,000 Gigabytes

Standard code for information interchange

“RAM” Refers to?

Random Access Memory.

Serves as temporary storage for things like open programs and the

operating system.

DVDs and CDs are examples of?

Optical Disks.

Definition: (a disk coated with plastic that can store digital data as tiny pits etched in the surface; is read with a

laser that scans the surface). Source: Princeton University Publications

Windows 7, Vista, Mac O/S are examples of?

Operating Systems.Definition: (software that controls the execution of computer programs and may provide various services) Source:

Princeton University Publications

Match Term to Definition:

NAS (Network-Attached Storage)

SAN (Storage Area Network)

VPN

Terminal Services RDP

Remote Access via Emulation

Network Operating Sytem

Network Storage and File System

Network Storage Only

Virtual Private Network

NOS

Windows Server, UNIX are examples of?

Network Operating Systems*.*aka Server Operating System

A.

B.

C.

D.

E.

This network device forwards information from one network to another network.

All of the above

Modem

Hub

Switch

Router

Probably Not Very Useful Info

Difference between a Switch and Hub:

Shared versus dedicated channels. In an Ethernet network, every client, server and network device is wired to a hub or switch. A hub shares the total bandwidth among all users, while a switch provides a dedicated line at full bandwidth between every two devices transmitting to each other. In the 1990s, switches were much more costly than hubs, and devices were carefully evaluated based on the traffic requirement. By the turn of the century, switches became much less expensive, and the popularity of hubs began to wane.

Source: PC Mag Online Dictionary

Electronic Security and Confidentiality

• Antivirus• Firewalls• Backup/Disaster Recovery• Encryption of Online Content

TRUE or FALSE?TRUE or FALSE?

Antivirus is absolutely essential at every level of computer and server management.

Examples of Antivirus Programs

In No Particular Order:

• Kaspersky• Norton• Bit Defender• Panda• McAfee• G Data• Microsoft (now free)

This allows or blocks traffic into and out of a private network or the user's computer.*

Firewall.*Source: PC Magazine online

dictionary.

Note that firewalls can refer to either hardware or software.

Match Term to Definition:

RAID

Certificate

WPA

WEP

Wired Equivalent Privacy

Using algorithms to conceal data

Redundant array of inexpensive disks

A digital signature used for security

Wi-Fi Protected Access

Encryption

Disaster Recovery and Backup

Definition:The ability to recover from the loss of a complete site, whether

due to natural disaster or malicious intent. Disaster recovery strategies include replication and backup/restore.

Source: Microsoft Online Dictionary

Types:Online (becoming more and more prevalent)Disk to TapeDisk to DiskDisk to Optical DeviceSolid State: flash memory, thumb drives, USB flash drives,

CompactFlash, SmartMedia, Memory Stick, Secure Digital cards, etc

top related