CS103
A not-for-profit organization will usually -- though not necessarily -- use the _____ domain.
.org
3G wireless offers data transfer rates of up to ____ Mbps.
2
Text messages were first made available to cell phone users with the advent of ____ technology
2G
The hotspot created by MiFi is password protected and can be used to connect Wi-Fi devices located within ____ feet of the MiFi device to the Internet.
30
An SSID may contain up to ____ alphanumeric characters
32
Some mail servers will reject messages with too many recipients (usually ____ or more).
50
All of the following are 802.11 standards EXCEPT_____.
802.11ad
When you do online banking, you are participating in _____.
B2C
If you make homemade knitted garments and you sell them to individuals online, you are participating in _____ e-commerce.
C2C
The MiFi device is produced by the company ____.
Novatel
____ is a term for finding and using somebody else's wireless network, usually illicitly.
Piggybacking
All devices that connect to the wireless network must use the _____
SSID
Windows Live Messenger has been replaced with _____.
Skype
____ is a standard that was developed by the Wi-Fi Alliance to address some of the inherent weaknesses in WEP.
WPA
____ is the term for driving through a neighborhood with a wireless-enabled notebook looking for unsecured wireless networks.
Wardriving
____ is probably the most famous wiki in the world.
Wikipedia
The HTML ____ tag enables web designers to link HTML documents to each other.
anchor
With WEP encryption, the key being used to encrypt the data is sent over the network ____ the actual data is encrypted.
before
The Bluetooth security concern posing the lowest threat is that of ____.
bluejacking
A(n) ____ is a small file that a web server writes to the disk drive of the client computer, containing information about the user.
cookie
A(n) ____ comes into existence as soon as a work is placed into a tangible form.
copyright
If you change the default name of the wireless router or access point, you also prevent unknown users from detecting your network by attempting to randomly connect to a wireless network using a manufacturer name or the word "____" as an SSID.
default
A MAC address contains ____
digits and letters
Bloggers often used code ______ to create hyperlinks and embed photos in postings.
hackers
In the beginning of wireless technology, some devices used _____ technology to "beam" information from one source to another source without the use of wired connections.
infrared
Disabling the SSID broadcast of a network makes that network ____ to roaming devices.
invisible
In addition to storing a contact's email address in Google Contacts, you can store all of the following EXCEPT _____.
labels
All of the following are important to the quality of a well-designed website EXCEPT _____.
lack of captions
A ____ attack occurs when transmissions, such as messages between users, logins, and normal connections with Web servers, that are being sent between two devices are intercepted by a third party
man-in-the-middle
Firefox allows for easy drag-and-drop modifications to its _____.
menu
A(n) ____ is a form of blogging in which users send short messages on a very frequent schedule.
microblog
A wireless router broadcasts its SSID as a means of identifying the network's ____
name
A ____ is a user-entered key that encrypts data sent over a network.
passphrase
A collection of devices connected via Bluetooth technology is called a(n) ____
piconet
The Internet of Things (IoT) uses _____ to collect and transmit data using wireless connections so that data can be acted upon by a person or another machine.
sensors
A basic search page includes a _____ box for entering a search expression and a command button to begin the search.
text
The webpage ____ will usually appear directly above the main content of the page.
title
The addition of a Web camera (also called a ____) enables users to participate in a video chat, in which participants can see and speak to each other.
webcam
A(n) ____ local area network is a network in which devices use high-frequency radio waves to communicate with a base station, which is connected to the Internet.
wireless
All of the following are email acronyms noted in the text EXCEPT ____.
wth
The correct format for a hashtag is ____.
#professor
Second-generation (2G) wireless networks transfer data at a rate of ____.
14.4 Kbps
The ICQ, which extended the capabilities of the original Tal program, started in ____, and is still used world-wide today.
1996
Web ____ caters to user-generated content.
2.0
YouTube was started in ____ as a private venture.
2005
In the U.S., a work that was created in 2000 by an individual author who died in 2005 will be protected by copyright until ____.
2075
Currently, WWANs provide wireless connections to the Internet using ____ networks created by cellular phone carriers.
3G and 4G
Encryption keys are generally ____ or ____ bits long.
64, 128
Facebook has a large number of active users, and more than ____ of its users check their Facebook pages daily.
65%
____ was the first to make APIs available to other developers.
Amazon.com
Edge uses the _____ search engine as its default.
Bing
Bluetooth standards and licensing for all Bluetooth products is officially overseen by ____.
Bluetooth SIG
In January 2004, the U.S. ____ law went into effect.
CAN-SPAM
The following is NOT on the security checklist for installing a wireless router: ____.
Change the SSID frequently because SSIDs are not case sensitive
Jarkko Oikarinen wrote a multiuser communications program called Internet Relay ____ (IRC).
Chat
Usenet was founded in 1979 at ____ and is a way of collecting information and storing it by topic category.
Duke University
MIME stands for Multipurpose Internet Mail ____.
Extensions
Political candidates, grassroots campaigns, television programs, and millions of businesses have ____ that are an integral part of their marketing efforts.
Facebook pages
____ is a photo-sharing site.
Flickr
Facebook, which began in 2004 as a closed network for college students and later was expanded to include high school students, was founded by Mark Zuckerberg, then a student at ____ University.
Harvard
The ____ is useful when you know you visited a site recently but you did not create a favorite and you cannot recall the URL of the site.
History feature
All of the following host popular websites offering weather information and forecasting EXCEPT ____.
Hubble Climate
Private browsing mode in Chrome is called _____ .
Incognito
_____ is a photo-sharing site and a social network.
____ is a general term that includes all products of the human mind, including original ideas.
Intellectual property
The following are all major wire services EXCEPT ____.
Interfax
Unlike ______, which is a social network open to business professionals, _____ is a social networking site restricted to credentialed physicians.
LinkedIn/Sermo
Each manufacturer of network interface cards adds a(n) ____ to identify the device.
Media Access Control address
City-wide wireless networks are often called ____.
Muni Wi-Fi
In most browsers, the Back button and Forward button are located on the ____ bar
Navigation
____ software manages the schedule for downloading podcast files to your device.
Podcatcher
One website that offers full-text copies of works no longer protected by copyright is ____.
Project Gutenberg
VoIP is an acronym for Voice over Internet ____.
Protocol
Sometimes the link to subscribe to feeds is a text link with the letters "____" to indicate the file format of the syndicated content.
RSS
Edge includes a _____, which is a streamlined and less cluttered view that allows readers to focus on the selected material
Reading View
____ handles outgoing email messages, determining the paths an email message takes on the Internet.
SMTP
Which of the following converts the user's search expression into a database-readable query?
Search expression processing software
The early networks that became the Internet included many computers that ran a program called ____ that allowed users to exchange short text messages.
Talk
____ allows users to send very short messages to others who are connected to the network using smartphones or other Internet devices.
Text messaging
Which of the following would provide the fastest transfer rate?
The device is close to the access point.
When using the "Reply All" option, your message will automatically be sent to ____ recipients of the original message.
To and Cc only
A file that has been attached to an email message will be received by those recipients in the ____ line(s) of the message header.
To, Cc, and Bcc
Many blogs are published using free blogging tools available from sites such as Blogger, WordPress, and _____.
Tumblr
____ is a website that checks a submitted paper and then determines how much of the paper is unoriginal.
Turnitin
The following is an example of hacking: ____.
Unauthorized access to information being sent over a wireless network
Which of the following is an example of a newsfeed using pull technology?
Usenet
An example of VoIP is ____.
Vonage
If you have both WPA and WEP available to you, your system will be most secure if you use ____.
WPA only
The content of a microblog differs from that of a traditional blog in that it answers the question, "____"
What are you doing now?
The ____ is a not-for-profit organization that certifies interoperability of Wi-Fi products and promotes Wi-Fi as a standard for wireless LANs.
Wi-Fi Alliance
Subscribing to a _____ requires payment for use but will provide a more reliable and secure connection.
Wi-Fi service
With the wide variety of information available on the web, it is important to be diligent in evaluating the information's _____.
accuracy
The Edge Note compose mode allows the user to do all of the following EXCEPT:
add audio notes
Mashup developers usually include additional APIs on the mashup site that generate revenue by linking to customized ____.
advertising
A news ____ website collects and displays content from a variety of online news sources, including wire services, print media, broadcast outlets, and even blogs, and displays it in one place.
aggregation
To receive feed content, you can install a program called a(n) ____ on your device.
aggregator
A Bluetooth-enabled smartphone will also be compatible with a Bluetooth-enabled ____ car notebook computer all of the above printer
all of the above
A blog often contains ____. photographs videos all of the above text and comments
all of the above
A feed might include ____. all of the above news topics blog updates podcasts
all of the above
Chats can be ____. text all of the above video voice
all of the above
Most business professionals use ____ on their cell phones and other mobile devices to communicate with clients and customers. instant messaging chat all of the above email
all of the above
Spam ____. consumes large amounts of network capacity may include content that is offensive or misleading distracts employees and wastes their time all of the above
all of the above
The quality of information on a webpage can be inferred from the webpage's _____.
all of the above
Users of online business networks are typically ____. seeking jobs all of the above Recruiting workers searching for potential business partners
all of the above
Using Twitter, you can ____. tweet an idea all of the above follow another person's Twitter feed retweet another user's comments
all of the above
You can listen to or watch a podcast on a _____. smartphone all of the above tablet computer
all of the above
_____ is an example of a Google filetype operator. all of the above text html pdf
all of the above
Security experts warn against ____ in public places. all of the above checking e-mail online banking online shopping
all of the above
The following are generally accepted rules for email messages EXCEPT which of the following:
always forward new information about viruses and hoaxes
To access the Internet using a WWAN, you need a USB modem for the device you want to use and ____.
an account with the appropriate cellular carrier
Software that detects and eliminates malicious code is called a(n) ____ app.
antivirus
Any Wi-Fi certified device can connect to any ____ certified access point.11. Any Wi-Fi certified device can connect to any ____ certified access point.
any 802.11
A social network is a general term that refers to any community of people who use the Internet to share ____.
any of the above
A collection of facts can be copyrighted, but only if the collection is ____ in a way that causes the resulting work to rise to the level of an original work. arranged any of the above selected coordinated
any of the above
You can use the address bar in Chrome to do all of the following EXCEPT:
as a calendar
If you receive an email message from a sender that you don't recognize and the message contains an attached file, you should ____.
avoid opening the file until you are sure that it doesn't contain a virus
Chat participants might use common acronyms as a typing shortcut for common expressions, such as "bbl" for "____."
be back later
You should preview a webpage before printing it for all of the following reasons EXCEPT:
be sure linked pages will print too
Some e-commerce sites also maintain a physical store, which is referred to as a _____ store.
brick and mortar
In addition to text-only chats, people in the 1990s used their Web browsers to visit a virtual ____ room, where they could send text-only messages to other users in the room.
chat
You can use the Address bar to do all of the following EXCEPT:
click the address book and select a link
At sites such as careerbuilder.com, you can do all of the following EXCEPT:
contact a potential employer directly
Clicking a _____ takes you to a webpage that no longer exists or has been moved.
dead link
One of a spider's most important tasks is to _____ information in a search engine database when a website no longer exists.
delete
All of the following are roadblocks to properly citing webpages EXCEPT ____.
differences between a web document and its print version
DRM stands for ____.
digital rights management
A(n) ____ database is stored in multiple physical locations, with portions of the database replicated in different locations.
distributed
A forwarded message ____.
does include the email addresses of previous recipients and senders
The advantage of a wireless mesh network is that ____.
each new node automatically configures itself to work without the use of cables
When sending an email to multiple recipients, separate the addresses with a ____. neither a. nor b. comma semicolon either a. or b.
either a. or b.
Search engines can perform date-filtered searches because, when web servers send a webpage to a ____, they include a header that contains information about the webpage, such as the date it was last modified. either a. or b. search engine's web robot browser neither a. nor b.
either a. or b.
"Email" is short for ____.
electronic mail
In a(n) ____ attack, a hacker sets up a computer to act as a legitimate access point, and then steals personal information from users trying to connect to it.
evil twin
Small programs that can enhance and extend the functionality of Chrome are called ____.
extensions
One of the most serious mistakes that home users make when installing a wireless network is ____.
failing to change the default login for the device
In the U.S., ____ laws allow people to use copyrighted works under some conditions.
fair use
Some email programs let you use a ____ to move incoming mail to a specific folder or to delete it automatically based on the content of the message.
filter
When the website you are visiting places a cookie on your computer, it is called a(n) _____ cookie
first-party
On the Favorites tab, you can add, delete, and organize favorites into ____ that best suit your needs and working style.
folders
When you ____ a message, a copy of the original message is sent to the new recipient(s) without the original sender's knowledge.
forward
Intellectual property rights offer protections afforded by ____.
governments
A webpage indexed in a search engine's database containing text matching a query is called a(n) _____.
hit
In Wi-Fi terms, a(n) ____ is an area of network coverage.
hotspot
Most browsers include help for all of the following EXCEPT:
how to create your own webpages
If you type nbc.com in the Address bar, your browser will convert it to ____ and load the home page at that URL.
http://www.nbc.com
Web documents are built with _____.
hypertext markup language
The email acronym "iow" stands for "____."
in other words
A(n) ____ message is sent in real time between users who are chatting over a network.
instant
When computer networks are connected to each other, the system is called a(n) ____.
internet
A search engine searches _____ to find a match for the query.
its own database
A podcast with educational content is sometimes referred to as a ____.
learncast
By default, most wireless networks are ____.
left unsecured
Stemming refers to the ability of search engines to _____.
look for variations of words used in a search expression
If your email program does not provide filters, you can filter the messages ____ by reading them and moving them to the appropriate folders
manually
Which of the following is NOT an example of push technology?
mashups
A ____ contains information about the message.
message header
A(n) _____ tag is HTML code that a webpage creator places in the page header for the specific purpose of informing web robots about the content of the page.
meta
3.5G wireless networks are also called ____.
mobile broadband
In general, a webpage that has _____ inbound links is given a higher ranking than a page that has _____ inbound links.
more, fewer
The term ____ refers to a set of commonly accepted rules for proper behavior on a network.
netiquette
A ____ stores items on a server as articles or postings that are sorted by topic.
newsgroup
A(n) ____ is a discussion group that occurs over a computer network with many users contributing to a specific topic.
newsgroup
When the Usenet News Service began operating, the only way to read or post articles to newsgroups was to install and run a software program called a ____.
newsreader
Which of the following is NOT an example of pull technology?
online social networks
Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.
over-the-shoulder attack
In the address http://www.nytimes.com/pages/sports/index.html, the folder containing the webpage is _____.
pages
The procedure of converting a natural language question into a search expression is called _____.
parsing
The connection of your smartphone to your wireless headset is an example of a(n) ____.
personal area network
Failure to cite the source of research material that you use is called ____.
plagiarism
If a play was written in the U.S. 200 years ago, but performed and videotaped by a stage troupe today, the tape of today's performance is ____.
protectable under copyright laws
The original purpose of podcasting was to make it easy for people to create and broadcast their own ____, but many other uses soon followed.
radio shows
A wireless device's ____ refers to the physical distance between the access point and the wireless device.
range
A language operator is used to _____.
restrict search results to webpages coded using a specific language
To save an image from a webpage, first you ____.
right-click the image you want to save
All of the following are typical parts of an email message EXCEPT ____.
salutation
In terms of using search engines, another word for "query" is _____.
search expressions
Regarding search engines, the term "stemming" means _____.
searching for variants of keywords
Search engines create a list of results by _____.
searching through its own database with information about webpages
All of the following are benefits of medical information being readily available on the web EXCEPT:
self-diagnosis resulting in self-medication
The term Web ____ describe the process of organizations communicating through a network to share data without needing extensive knowledge of each other's systems.
service
A ____ might appear at the bottom of an email message and contain standard information about the sender.
signature
If you are using email for a business communication, your ____ usually contains your name, title, and your company's name.
signature file
If a typical search engine robot encounters a webpage with the text "Test Data: Do Not Use," its response would be to _____.
simply include the content as is, since it would not recognize the text as a warning
Businesses and sometimes individuals use a _____ to assimilate all of their social media content on a specific topic to engage readers and generate interest.
social hub
The coverage area for wireless broadband service will ____ the area where you can get cell phone reception.
sometimes differ from
A(n) _____ is a paid placement that appears in a search engine's results page at or near the top of the results.
sponsored link
Using one browser window for all open pages is called ____.
tabbed browsing
Originally the term "chat" referred to ____ chat.
text
On Wikipedia, contributors may post and edit articles anonymously, in which case the author is only identified by _____.
the IP address of their connection to the Internet
Page rank is determined by _____.
the number of high-quality back links that the webpage provides
The safest wireless network is one that is ____.
turned off
Copyright protection exists when the work is ____.
unpublished
All of the following are ways to use Chrome efficiently EXCEPT:
use the control key and the = key to zoom to the original page view
A ____ usually identifies one person's email account on a mail server.
username
Two of the most important issues in conducting research on the web is assessing not only the quality of the information but also the _____.
validity
One way to access library information is through a ____ library, which is a website that provides online access to library information services.
virtual
The World Wide Web is a collection of files that reside on ____ located all over the world.
web servers
Unambiguous criteria to determine whether or not an object belongs to a collection are called _____.
well-defined
In the address http://www.nytimes.com/pages/sports/index.html, the domain name is ____.
www.nytimes.com
Unlike WLAN technology, Bluetooth requires ____ access point(s) for communication.
0