COMP b2 Exam 3
When you perform a search for the term aquarium from a computer in Kansas City, your results will most likely be different than if you perform the same search while you are in Seattle. T or F
True
When you send an email to your professor, a server holds on to that email until the professor requests it.
True
You can change your browser's home page to any page you want. Tor F
True
You can use Bluetooth technology to connect a wireless keyboard to your computer. T or F
True
You should be wary about entering your credit card number into a website whose URL does not begin with https because they are not using any security.
True
When you buy a textbook online from Amazon.com, you are participating in ________ e-commerce.
B2C
Which of the following is NOT a Boolean operator that can be used to search the web?
BUT
When you are sending one email to all of your friends in your address book, you should use the ________ field to keep their addresses private.
Bcc:
________ raises money from multiple small investors rather than a few large investors.
Crowdfunding
The ________ enables users to enter a friendly name like whitehouse.gov instead of an address like 74.125.224.72.
DNS
A viral video is one that can infect your computer with malware.
False
A workgroup and a homegroup are the same thing.
False
Academic research projects are encouraged to use Wikipedia since the information available on any topic has been edited by professionals for accuracy. T or F
False
All WiFi hotspots are available free. T or F
False
All of the computers connected to the Internet are given a unique IP address.
False
All of the posts that you make to Twitter are public, meaning that you cannot restrict anyone from seeing them.
False
Any email that you send is private, and it cannot be read by anyone other than the person to whom it is addressed. T or F
False
Asynchronous online communication happens in real-time with two or more people online at the same time. T or F
False
Ethernet standards and equipment for your home LAN are different than those used in a business.
False
Ethernet standards and equipment for your home LAN are different than those used in a business. T or F
False
If you want to create a peer-to-peer network, you must first install a specific software program. T or F
False
In a ring topology, data travels in both directions.
False
PAN is another term for private area network. T or F
False
Pandora is the most popular web browser for people using Macs. T or F
False
The Internet and the World Wide Web are the same thing. T or F
False
The top-level domain used by the government is .net. T or F
False
WiMAX and LTE Internet access cannot be used by a personal computer since it is limited to mobile devices. T or F
False
Which organization is responsible for coordinating the Internet naming system?
ICANN
198.168.0.1 is an example of a(n) ________.
IP address
The collection of websites that enable users to create user-generated content, connect, network, and share are called social ________.
Media
All of the computers connected to the Internet are given a unique IP address. T or F
True
By using tabbed browsing, you can have multiple home pages. T or F
True
Dial-up Internet access is the slowest Internet connection. T or F
True
FTTH uses fiber-optic cables. T or F
True
Fiber networks use optical network terminals (ONTs) to connect to the Internet.
True
Google has a search tool called Google Scholar that you can use for research. T or F
True
In a network, resources can be software, hardware, or files. T or F
True
In a virtual world, you can select an avatar as a virtual body.
True
It is recommended that you have more than one web browser installed on your computer because some websites are viewed better on a specific browser. T or F
True
One of the advantages associated with using a wired network connection over a wireless network connection is speed.T or F
True
One way to access email is to read it online through a webmail interface. T or F
True
The physical layout of a LAN is called its topology. T or F
True
User-generated content refers to content that has been written by everyday users. T or F
True
When you log in to your bank's website, you are connecting to a server.
True
You would most likely find a P2P network in a(n) ________.
home
Which of the following is an example of a URL?
http://www.irs.gov
A centralized server provides access to file and print services as well as email.
True
A firewall can be implemented using hardware or software. T or F
True
ARPANET was the beginning of the Internet. Tor F
True
The nodes on the original Internet system were ________.
educational institutions
Tweets are limited to ________ characters each.
140
Services that one business provides for another are called ________.
B2B
For which of the following uses was the Internet2 NOT designed?
Business
________ e-commerce allows anyone to sell or trade your items online.
C2C
One of the most popular C2C websites is ________.
Ebay
________ is an example of asynchronous communication.
________ is the largest online image-sharing site in the world.
Flickr
________ is the authoring language that defines the structure of a webpage.
HTML
Which of the following is a method of synchronous online communication?
Instant Messaging
________ allows you to communicate with one person at a time.
Instant messaging
Which of the following statements about email is FALSE?
It cannot be accessed by hackers.
For a company that uses only two floors of an office building, all of the company's computers and printers will be connected by a ________.
LAN
Which of the following could become a member of the Internet2?
Library of Congress
________ is a business-centered social network that is designed for business connections.
When the Internet backbone was privatized in 1995, five large ________ made up the new backbone.
Network Access Points
A Facebook ________ is used to promote an organization, a product, or a service.
Page
In a ________ network, each computer is considered equal.
Peer-to-Peer
A ________ feed keeps you updated on podcasts and news feeds to which you have subscribed.
RSS
________ is used to make a website easier to find by both people and software and increases a webpage ranking in search engine results.
SEO
________ is the most popular browser for Macs.
Safari
A star topology allows nodes to be easily added, removed, or moved, without disrupting the network.
True
The practice of using social media to sell services is called ________.
Social media marketing (SMM)
________ sites let users review hotels, movies, games, books, and other products and services.
Social review
.com is an example of a ________.
TLD
Which of the following is NOT a web browser?
Thunderbird
A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices.
WAN
In a WLAN, devices are connected by ________.
Wi-Fi
A moderated chat room ensures that ________.
all content is screened
One of the most important reasons for Ethernet standards is they ________.
assure equipment from different manufacturers is compatible
________ communication allows you to send a message to someone who is not online at the same time.
asynchronous
In a virtual community, you can communicate with other people by using a(n) ________.
avatar
Network speeds are measured in ________ per second.
bits
A ________ is similar to an online journal, in which you can write about anything you want to share.
blog
You can use a social ________ site to save and share your favorites online.
bookmarking
When you set up a new email account, you may have to enter a distorted series of letters and numbers, called a ________, to ensure that you are a human and not a computer.
captcha
A ________ network is one that has at least one computer at its center that provides centralized management, resources, and security.
client-server
A corporation would want to utilize a ________ network.
client/server
In the URL http://www.irs.gov, http is the ________.
protocal
Which of the following is an example of a social news site?
A ________ is a device that connects two or more networks together.
router
An email ________ is a block of text that is automatically put at the end of your messages.
signature
Email sends electronic messages using ________ technology.
store-and-forward
A ________ is a device that connects multiple devices on a LAN
switch
Which of the following is NOT used to transmit signals on an Ethernet network?
topology