Semester Exam Study Guide



Semester Exam Study GuideFall2016This is the study guide for the Business Communications semester. This exam is an overview of all units studied (Career Clusters, Digital Literacy (Computer Basics, E-ethics, Computer Worms & Viruses, and Operating Systems & Networking) Business Communications, and Written Communications) This packet can be returned to me by December 8, 2016 for a grade) The exam is worth 10% of the semester grade average.BIM 1Student Name____________________________________________Part 1 - Career Exploration?right000Careers in Career ClustersThe U.S. Department of Education has established 16 Career Clusters that contain all entry-level through professional-level occupations in a broad industry area.?-472440-882650Part 1 – Career Clusters Give an example of a career in each of the clusters00Part 1 – Career Clusters Give an example of a career in each of the clusters? Clusters and Pathways?Agriculture, Food and Natural Resources?Producing, processing, marketing, distributing, financing and developing agricultural commodities and resources, including food, fiber, wood products, natural resources, horticulture and other plant and animal products and resources. ?Architecture and Construction?Designing, planning, managing, building, and maintaining the built environment. ??Arts, Audio-Video Technology and Communications?Designing, producing, exhibiting, performing, writing and publishing multimedia content, including visual and performing arts and design, journalism and entertainment services. ??Business, Management and Administration?Planning, organizing, directing and evaluating business functions essential to efficient and productive business operations. ??Education and Training?Planning, managing and providing education and training services, and related learning support services. ??Finance?Planning and providing services for financial and investment planning, banking, insurance and business financial management. ??Government and Public Administration?Executing governmental functions including governance, national security, foreign service, planning, revenue and taxation, regulation, and management and administration at the local, state and federal levels. ??Health Science?Planning, managing and providing therapeutic services, diagnostic services, health informatics, support services, and biotechnology research and development. ???Hospitality and Tourism?Managing, marketing and operating restaurants and other food services, lodgings, attractions, recreation events and travel-related services. ??Human Services?Preparing individuals for employment in career pathways that relate to families and human needs. ??Information Technology?Designing, developing, supporting and managing hardware, software, multimedia and system integration services. ??Law, Public Safety, Corrections and Security?Planning, managing and providing legal, public safety, protective and homeland security services, including professional and technical support services. ??Manufacturing?Planning, managing and performing the processing of materials into intermediate or final products, including related professional and technical support activities such as production planning and control, maintenance and manufacturing/process engineering. ??Marketing?Planning, managing and performing marketing activities to reach organizational objectives. ?Science, Technology, Engineering and Mathematics?Planning, managing and providing scientific research and professional and technical services (such as physical science, social science, engineering), including laboratory and testing services, and research and development services. ?Transportation, Distribution and Logistics?Planning, managing and moving people, materials and goods by road, pipeline, air, rail and water, including related professional and technical support services such as transportation infrastructure planning and management, logistics services, mobile equipment and facility maintenance. ?Part 2 – Digital LiteracyA computer is a machine that can store, retrieve and process information.Name three common parts of computer hardware.___________________________________________________________________________________________________The operating system is the master program on the computer that links the hardware, software, and the computer user.Name the five (5) types of computers.____________________________________________________________________________________________________________________________________________________________________Name the security device install on a network to inspect network traffic, shield networks from unauthorized visits, and restricts unwanted data from flowing outside the network.Name the four common types of networks.____________________________________________________________________________________________________________________________________Describe the purpose of the IP address and what does it look like?A bit is the smallest unit of data possible in a computer. A bit can either be a zero (0) or a one (1). Bits are usually grouped into sets of eight (8) which is called a byte.Binary code is the language of computers that uses zeros and ones to represent numbers and characters.When we are working on a file, it is stored as temporary volatile memory in RAM (Random Access Memory); but once it is saved it becomes permanent non-volatile memory and is stored on the hard disk drive as ROM (Read Only Memory).What is computer virus? Name the first one created?What is a computer worm? Name the two (2) types. Tell the name of the first of each type. What is a Trojan horse? Why is it so dangerous?What is another name for computer viruses, computer worms, and Trojan Horses?The punishment for distributing malware is up to 20 years imprisonment and/or a fine. The actual punishment would depend on the damages done, your intentions for creating the malware, and whether it was for commercial or financial gain.Sending racist or sexist email is a cybercrime called hate mail.Sending offensive, abusive, or threatening messages online is a cybercrime called Internet harassment.The following are all cybercrimes:piratingonline predatorscracking identity theftwire fraudphishingcounterfeiting goods onlinecreating malicious virusesstealing passwordsInternet harassmentCyberbullyinghate mailTo avoid becoming a victim of a cybercrime you should:Protect your personal informationUse anti-virus softwareBack up important filesBe careful who you communicate with onlineIf you are a victim of a cybercrime, you should first tell your parents/guardians and the local police. Then, you should report it to the Federal Bureau of Investigation (FBI), U.S. Secret Service Electronic Crimes Task Force, and Internet Crime Complaint Center (IC3). Only report crimes to US CERT when it is a major incident involving a large scale attack.Explain intellectual property.What is the difference between a copyright, a patent, and a trademark?Part 3 – Business CommunicationsExplain the difference between internal and external business communications.List the steps in the communication process.What is the difference between encoding and decoding a message?Explain one way to improve organizational communication.What is the difference between ethical and legal messages?Part 4 – Written CommunicationsDescribe the direct approach in writing. Which types of messages use this approach?Describe the indirect approach in writing. Which types of messages use this approach?Professional writing skills are demonstrated by:Sending messages promptlyUsing quality paperEnsuring accurate formatting of a documentUsing high printing qualityChecking for and removing all misspellings and grammatical errors.You should always be aware of your tone when writing a letter. Word choice is important to convey feelings of empathy.You should always know the purpose and the subject for who the document is created.Name the four steps in document creation.Part 5Parts of a Letter Study this letter. You will label the parts of a block-style letter and correct format and spacing.-6724659525Return Address 00Return Address 33 Glover Way-720090158115Dateline 00Dateline Chapel Hill, NC 27515 DATE \@ "MMMM d, yyyy" December 7, 2016Quad space here (4x) – 3 blank lines-59309097155Inside Address 00Inside Address Mr. Keith KoymOutdoor OutfittersDurham, NC 27006-734695124460Greeting 00Greeting Double space here (2x) – 1 blank lineDear Mr. Koym:-59309076835Body00BodyDouble space here (2x) – 1 blank lineI received your letter explaining the status of my recent order to Outdoor Outfitters. My order number is 201335.Double space between paragraphs (2x) – 1 blank lineAfter reading that I would not receive the rain suit for two weeks, I called and spoke to you on the phone asking you to cancel my order. You said you would, but the charge for the order has shown up on my credit card statement. This probably was caused by the two transactions happening simultaneously.Please check into this matter for me. I will call you in one week to make sure everything is ok. -672465153035Closing 00Closing Double space before closing – 1 blank lineSincerely,Quad space here (4x) – 3 blank lines **sign between here**-901065116205Signature Line00Signature LineMaggie MadisonWhat is mixed punctuation? What is open punctuation?Part 6You will create a short document in Word (mostly likely a letter)Part 7You will create a short publication in Publisher ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download