Top Banner
ALA Tech Quiz Show Question and Answer Samples and Techniques
29

ALA Tech Seminar

Jun 26, 2015

Download

Documents

mshufeldt

Powerpoint used in training ALA members to help with their certification.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ALA Tech Seminar

ALA Tech Quiz Show

Question and Answer Samples and Techniques

Page 2: ALA Tech Seminar

Technology/Automation Management

• The Internet• Web-based technology• Hardware and software systems• Electronic Security and confidentiality

Michael ShufeldtIT Director

Page 3: ALA Tech Seminar

TRUE or FALSE?TRUE or FALSE?

Law practice today could not exist without the internet.

Page 4: ALA Tech Seminar

Ways to Surf/Browse to the Internet:

1. Internet Explorer2. Firefox3. Apple Safari4. Google Chrome

Page 5: ALA Tech Seminar

Ways to Connect to the Internet:

• T1 (dedicated circuit at 1.544 Mbps per line)• DSL (Digital Subscriber Line), Cable/Fiber Optic• Dial-Up Modem• 3G/4G Cell Network• ISDN (Integrated Services Digital Network

Page 6: ALA Tech Seminar

Google is an Example of:

A “Search Engine”

Page 7: ALA Tech Seminar

Search Engine Market Share*:

• Google (49%)• Yahoo (23.8%)• Bing (9.6%)• AOL (6.3%)• Ask (2.6%)

*Source: Nielsen Search Ratings

Page 8: ALA Tech Seminar

Match the concept to definition:

Newsgroup

Listserve

Real Time Comms

Uniform Resource Locator

TCP/IP

Protocols used on many networks

Chat over internet

Open discussion no subscription

Mailing list by email subscription

Web page address

Page 9: ALA Tech Seminar

Bonus: What is the emerging force in online communication?

Social Networking.

Facebook, LinkedIn, Twitter, MySpace and others.

Page 10: ALA Tech Seminar
Page 11: ALA Tech Seminar

A.

B.

C.

D.

E.

Microsoft Access is an example of?

All of the above

Annoying

A Word Processor

An Email Program

A database program

Page 12: ALA Tech Seminar

Match the tool with the job:

Outlook/Lotus Notes

Word/Wordperfect

Excel/Quattro Pro

Elite/Prolaw/Juris

Summation/DBText

Case/Trial Management

Spreadsheets

Send/Receive Email

Word Processing

DMS/Billing/More

Page 13: ALA Tech Seminar

Westlaw, Lexis/Nexis and Findlaw are examples of?

Online Legal Research.

Free options are also available, but more limited.

Page 14: ALA Tech Seminar

Basic Netiquette

1. ALL CAPS means shouting 2. Use underscores or asterisks for emphasizing words 3. Watch your tone -- it's written, not verbal communication 4. Check your spelling 5. Quote back only what is relevant 6. Use an automatic signature, especially if you are a business 7. Where are you located if requesting goods or services? 8. Don't send unsolicited file attachments 9. Use a descriptive Subject line 10. Only forward jokes and chainletters if you are SURE the recipient wants them (and hasn't already gotten a copy or three from someone else) 11. Don't send "Check This Out" Unsolicited URLs 12. Don't expose your email routing list to spammers 13. Avoid Flamewars14. Don't believe every cybermyth, urban legend, hoax or virus "alert" sent to you(verify it before believing or forwarding it to anyone else by visiting

15. Never imply you are representing your firm when you are not.

Page 15: ALA Tech Seminar

Hardware, Networking & Terminology

• PCs and Servers• Hubs, Switches and Routers• Optical and Solid State Disks• Bites and Bytes• Operating Systems

Page 16: ALA Tech Seminar

Match the term and definition:

Byte

Terabyte

Megabyte

ASCII

Kilobyte

1 Thousand Bytes

1 Million Bytes

8 Bits

1,000 Gigabytes

Standard code for information interchange

Page 17: ALA Tech Seminar

“RAM” Refers to?

Random Access Memory.

Serves as temporary storage for things like open programs and the

operating system.

Page 18: ALA Tech Seminar

DVDs and CDs are examples of?

Optical Disks.

Definition: (a disk coated with plastic that can store digital data as tiny pits etched in the surface; is read with a

laser that scans the surface). Source: Princeton University Publications

Page 19: ALA Tech Seminar

Windows 7, Vista, Mac O/S are examples of?

Operating Systems.Definition: (software that controls the execution of computer programs and may provide various services) Source:

Princeton University Publications

Page 20: ALA Tech Seminar

Match Term to Definition:

NAS (Network-Attached Storage)

SAN (Storage Area Network)

VPN

Terminal Services RDP

Remote Access via Emulation

Network Operating Sytem

Network Storage and File System

Network Storage Only

Virtual Private Network

NOS

Page 21: ALA Tech Seminar

Windows Server, UNIX are examples of?

Network Operating Systems*.*aka Server Operating System

Page 22: ALA Tech Seminar

A.

B.

C.

D.

E.

This network device forwards information from one network to another network.

All of the above

Modem

Hub

Switch

Router

Page 23: ALA Tech Seminar

Probably Not Very Useful Info

Difference between a Switch and Hub:

Shared versus dedicated channels. In an Ethernet network, every client, server and network device is wired to a hub or switch. A hub shares the total bandwidth among all users, while a switch provides a dedicated line at full bandwidth between every two devices transmitting to each other. In the 1990s, switches were much more costly than hubs, and devices were carefully evaluated based on the traffic requirement. By the turn of the century, switches became much less expensive, and the popularity of hubs began to wane.

Source: PC Mag Online Dictionary

Page 24: ALA Tech Seminar

Electronic Security and Confidentiality

• Antivirus• Firewalls• Backup/Disaster Recovery• Encryption of Online Content

Page 25: ALA Tech Seminar

TRUE or FALSE?TRUE or FALSE?

Antivirus is absolutely essential at every level of computer and server management.

Page 26: ALA Tech Seminar

Examples of Antivirus Programs

In No Particular Order:

• Kaspersky• Norton• Bit Defender• Panda• McAfee• G Data• Microsoft (now free)

Page 27: ALA Tech Seminar

This allows or blocks traffic into and out of a private network or the user's computer.*

Firewall.*Source: PC Magazine online

dictionary.

Note that firewalls can refer to either hardware or software.

Page 28: ALA Tech Seminar

Match Term to Definition:

RAID

Certificate

WPA

WEP

Wired Equivalent Privacy

Using algorithms to conceal data

Redundant array of inexpensive disks

A digital signature used for security

Wi-Fi Protected Access

Encryption

Page 29: ALA Tech Seminar

Disaster Recovery and Backup

Definition:The ability to recover from the loss of a complete site, whether

due to natural disaster or malicious intent. Disaster recovery strategies include replication and backup/restore.

Source: Microsoft Online Dictionary

Types:Online (becoming more and more prevalent)Disk to TapeDisk to DiskDisk to Optical DeviceSolid State: flash memory, thumb drives, USB flash drives,

CompactFlash, SmartMedia, Memory Stick, Secure Digital cards, etc