CS103

¡Supera tus tareas y exámenes ahora con Quizwiz!

A not-for-profit organization will usually -- though not necessarily -- use the _____ domain.​

.org

3G wireless offers data transfer rates of up to ____ Mbps.

2

Text messages were first made available to cell phone users with the advent of ____ technology

2G

The hotspot created by MiFi is password protected and can be used to connect Wi-Fi devices located within ____ feet of the MiFi device to the Internet.

30

An SSID may contain up to ____ alphanumeric characters

32

Some mail servers will reject messages with too many recipients (usually ____ or more).​

50

All of the following are 802.11 standards EXCEPT_____.

802.11ad

When you do online banking, you are participating in _____.

B2C

If you make homemade knitted garments and you sell them to individuals online, you are participating in _____ e-commerce.

C2C

The MiFi device is produced by the company ____.

Novatel

​____ is a term for finding and using somebody else's wireless network, usually illicitly.

Piggybacking

All devices that connect to the wireless network must use the _____

SSID

Windows Live Messenger has been replaced with _____.

Skype

​____ is a standard that was developed by the Wi-Fi Alliance to address some of the inherent weaknesses in WEP.

WPA

​____ is the term for driving through a neighborhood with a wireless-enabled notebook looking for unsecured wireless networks.

Wardriving

​____ is probably the most famous wiki in the world.

Wikipedia

​The HTML ____ tag enables web designers to link HTML documents to each other.

anchor

​With WEP encryption, the key being used to encrypt the data is sent over the network ____ the actual data is encrypted.

before

​The Bluetooth security concern posing the lowest threat is that of ____.

bluejacking

​A(n) ____ is a small file that a web server writes to the disk drive of the client computer, containing information about the user.

cookie

​A(n) ____ comes into existence as soon as a work is placed into a tangible form.

copyright

​If you change the default name of the wireless router or access point, you also prevent unknown users from detecting your network by attempting to randomly connect to a wireless network using a manufacturer name or the word "____" as an SSID.

default

A MAC address contains ____

digits and letters

Bloggers often used code ______ to create hyperlinks and embed photos in postings.

hackers

In the beginning of wireless technology, some devices used _____ technology to "beam" information from one source to another source without the use of wired connections.

infrared

​Disabling the SSID broadcast of a network makes that network ____ to roaming devices.

invisible

In addition to storing a contact's email address in Google Contacts, you can store all of the following EXCEPT _____.

labels

​All of the following are important to the quality of a well-designed website EXCEPT _____.

lack of captions

A ____ attack occurs when transmissions, such as messages between users, logins, and normal connections with Web servers, that are being sent between two devices are intercepted by a third party

man-in-the-middle

​Firefox allows for easy drag-and-drop modifications to its _____.

menu

​A(n) ____ is a form of blogging in which users send short messages on a very frequent schedule.

microblog

A wireless router broadcasts its SSID as a means of identifying the network's ____

name

A ____ is a user-entered key that encrypts data sent over a network.​

passphrase

A collection of devices connected via Bluetooth technology is called a(n) ____

piconet

​The Internet of Things (IoT) uses _____ to collect and transmit data using wireless connections so that data can be acted upon by a person or another machine.

sensors

A basic search page includes a _____ box for entering a search expression and a command button to begin the search.​

text

The webpage ____ will usually appear directly above the main content of the page.​

title

The addition of a Web camera (also called a ____) enables users to participate in a video chat, in which participants can see and speak to each other.

webcam​

A(n) ____ local area network is a network in which devices use high-frequency radio waves to communicate with a base station, which is connected to the Internet.

wireless

All of the following are email acronyms noted in the text EXCEPT ____.​

wth

The correct format for a hashtag is ____.

​#professor

Second-generation (2G) wireless networks transfer data at a rate of ____.

​14.4 Kbps

The ICQ, which extended the capabilities of the original Tal program, started in ____, and is still used world-wide today.

​1996

Web ____ caters to user-generated content.

​2.0

YouTube was started in ____ as a private venture.

​2005

​In the U.S., a work that was created in 2000 by an individual author who died in 2005 will be protected by copyright until ____.

​2075

​Currently, WWANs provide wireless connections to the Internet using ____ networks created by cellular phone carriers.

​3G and 4G

​Encryption keys are generally ____ or ____ bits long.

​64, 128

Facebook has a large number of active users, and more than ____ of its users check their Facebook pages daily.​

​65%

____ was the first to make APIs available to other developers.

​Amazon.com

​Edge uses the _____ search engine as its default.

​Bing

​Bluetooth standards and licensing for all Bluetooth products is officially overseen by ____.

​Bluetooth SIG

In January 2004, the U.S. ____ law went into effect.​

​CAN-SPAM

​The following is NOT on the security checklist for installing a wireless router: ____.

​Change the SSID frequently because SSIDs are not case sensitive

Jarkko Oikarinen wrote a multiuser communications program called Internet Relay ____ (IRC).

​Chat

Usenet was founded in 1979 at ____ and is a way of collecting information and storing it by topic category.

​Duke University

MIME stands for Multipurpose Internet Mail ____.​

​Extensions

Political candidates, grassroots campaigns, television programs, and millions of businesses have ____ that are an integral part of their marketing efforts.

​Facebook pages

____ is a photo-sharing site.

​Flickr

Facebook, which began in 2004 as a closed network for college students and later was expanded to include high school students, was founded by Mark Zuckerberg, then a student at ____ University.

​Harvard

​The ____ is useful when you know you visited a site recently but you did not create a favorite and you cannot recall the URL of the site.

​History feature

All of the following host popular websites offering weather information and forecasting EXCEPT ____.

​Hubble Climate

​Private browsing mode in Chrome is called _____ .

​Incognito

_____ is a photo-sharing site and a social network.

​Instagram

____ is a general term that includes all products of the human mind, including original ideas.

​Intellectual property

​The following are all major wire services EXCEPT ____.

​Interfax

Unlike ______, which is a social network open to business professionals, _____ is a social networking site restricted to credentialed physicians.

​LinkedIn/Sermo

​Each manufacturer of network interface cards adds a(n) ____ to identify the device.

​Media Access Control address

City-wide wireless networks are often called ____.

​Muni Wi-Fi

​In most browsers, the Back button and Forward button are located on the ____ bar

​Navigation

____ software manages the schedule for downloading podcast files to your device.

​Podcatcher

One website that offers full-text copies of works no longer protected by copyright is ____.​

​Project Gutenberg

VoIP is an acronym for Voice over Internet ____.

​Protocol

Sometimes the link to subscribe to feeds is a text link with the letters "____" to indicate the file format of the syndicated content.

​RSS

​Edge includes a _____, which is a streamlined and less cluttered view that allows readers to focus on the selected material

​Reading View

____ handles outgoing email messages, determining the paths an email message takes on the Internet.

​SMTP

Which of the following converts the user's search expression into a database-readable query?​

​Search expression processing software

The early networks that became the Internet included many computers that ran a program called ____ that allowed users to exchange short text messages.

​Talk

____ allows users to send very short messages to others who are connected to the network using smartphones or other Internet devices.

​Text messaging

Which of the following would provide the fastest transfer rate?

​The device is close to the access point.

When using the "Reply All" option, your message will automatically be sent to ____ recipients of the original message.

​To and Cc only

A file that has been attached to an email message will be received by those recipients in the ____ line(s) of the message header.​

​To, Cc, and Bcc

Many blogs are published using free blogging tools available from sites such as Blogger, WordPress, and _____.

​Tumblr

____ is a website that checks a submitted paper and then determines how much of the paper is unoriginal.

​Turnitin

​The following is an example of hacking: ____.

​Unauthorized access to information being sent over a wireless network

Which of the following is an example of a newsfeed using pull technology?

​Usenet

An example of VoIP is ____.

​Vonage

​If you have both WPA and WEP available to you, your system will be most secure if you use ____.

​WPA only

The content of a microblog differs from that of a traditional blog in that it answers the question, "____"​

​What are you doing now?

The ____ is a not-for-profit organization that certifies interoperability of Wi-Fi products and promotes Wi-Fi as a standard for wireless LANs.

​Wi-Fi Alliance

​Subscribing to a _____ requires payment for use but will provide a more reliable and secure connection.

​Wi-Fi service

​With the wide variety of information available on the web, it is important to be diligent in evaluating the information's _____.

​accuracy

​The Edge Note compose mode allows the user to do all of the following EXCEPT:

​add audio notes

Mashup developers usually include additional APIs on the mashup site that generate revenue by linking to customized ____.

​advertising

A news ____ website collects and displays content from a variety of online news sources, including wire services, print media, broadcast outlets, and even blogs, and displays it in one place.​

​aggregation

To receive feed content, you can install a program called a(n) ____ on your device.

​aggregator

A Bluetooth-enabled smartphone will also be compatible with a Bluetooth-enabled ____ ​car ​notebook computer all of the above ​printer

​all of the above

A blog often contains ____. photographs ​videos all of the above ​text and comments

​all of the above

A feed might include ____. all of the above ​news topics ​blog updates ​podcasts

​all of the above

Chats can be ____. ​text all of the above ​video ​voice

​all of the above

Most business professionals use ____ on their cell phones and other mobile devices to communicate with clients and customers. ​instant messaging ​chat ​all of the above ​email

​all of the above

Spam ____.​ ​consumes large amounts of network capacity ​may include content that is offensive or misleading ​distracts employees and wastes their time all of the above

​all of the above

The quality of information on a webpage can be inferred from the webpage's _____.​

​all of the above

Users of online business networks are typically ____. ​seeking jobs ​all of the above ​Recruiting workers ​searching for potential business partners

​all of the above

Using Twitter, you can ____. ​tweet an idea ​all of the above ​follow another person's Twitter feed ​retweet another user's comments

​all of the above

You can listen to or watch a podcast on a _____. ​smartphone all of the above ​tablet ​computer

​all of the above

_____ is an example of a Google filetype operator.​ all of the above ​text ​html ​pdf

​all of the above

​Security experts warn against ____ in public places. ​all of the above ​checking e-mail ​online banking ​online shopping

​all of the above

The following are generally accepted rules for email messages EXCEPT which of the following:​

​always forward new information about viruses and hoaxes

​To access the Internet using a WWAN, you need a USB modem for the device you want to use and ____.

​an account with the appropriate cellular carrier

Software that detects and eliminates malicious code is called a(n) ____ app.

​antivirus

Any Wi-Fi certified device can connect to any ____ certified access point.11. Any Wi-Fi certified device can connect to any ____ certified access point.

​any 802.11

A social network is a general term that refers to any community of people who use the Internet to share ____.​

​any of the above

​A collection of facts can be copyrighted, but only if the collection is ____ in a way that causes the resulting work to rise to the level of an original work. ​arranged any of the above ​selected ​coordinated

​any of the above

​You can use the address bar in Chrome to do all of the following EXCEPT:

​as a calendar

​If you receive an email message from a sender that you don't recognize and the message contains an attached file, you should ____.

​avoid opening the file until you are sure that it doesn't contain a virus

Chat participants might use common acronyms as a typing shortcut for common expressions, such as "bbl" for "____."

​be back later

​You should preview a webpage before printing it for all of the following reasons EXCEPT:

​be sure linked pages will print too

Some e-commerce sites also maintain a physical store, which is referred to as a _____ store.

​brick and mortar

In addition to text-only chats, people in the 1990s used their Web browsers to visit a virtual ____ room, where they could send text-only messages to other users in the room.

​chat

​You can use the Address bar to do all of the following EXCEPT:

​click the address book and select a link

At sites such as careerbuilder.com, you can do all of the following EXCEPT:

​contact a potential employer directly

Clicking a _____ takes you to a webpage that no longer exists or has been moved.​

​dead link

One of a spider's most important tasks is to _____ information in a search engine database when a website no longer exists.​

​delete

All of the following are roadblocks to properly citing webpages EXCEPT ____.

​differences between a web document and its print version

DRM stands for ____.

​digital rights management

A(n) ____ database is stored in multiple physical locations, with portions of the database replicated in different locations.

​distributed

A forwarded message ____.​

​does include the email addresses of previous recipients and senders

The advantage of a wireless mesh network is that ____.

​each new node automatically configures itself to work without the use of cables

When sending an email to multiple recipients, separate the addresses with a ____. ​neither a. nor b. ​comma ​semicolon either a. or b.

​either a. or b.

​Search engines can perform date-filtered searches because, when web servers send a webpage to a ____, they include a header that contains information about the webpage, such as the date it was last modified. ​either a. or b. ​search engine's web robot ​browser ​neither a. nor b.

​either a. or b.

"Email" is short for ____.​

​electronic mail

​In a(n) ____ attack, a hacker sets up a computer to act as a legitimate access point, and then steals personal information from users trying to connect to it.

​evil twin

​Small programs that can enhance and extend the functionality of Chrome are called ____.

​extensions

​One of the most serious mistakes that home users make when installing a wireless network is ____.

​failing to change the default login for the device

In the U.S., ____ laws allow people to use copyrighted works under some conditions.

​fair use

Some email programs let you use a ____ to move incoming mail to a specific folder or to delete it automatically based on the content of the message.​

​filter

​When the website you are visiting places a cookie on your computer, it is called a(n) _____ cookie

​first-party

​On the Favorites tab, you can add, delete, and organize favorites into ____ that best suit your needs and working style.

​folders

When you ____ a message, a copy of the original message is sent to the new recipient(s) without the original sender's knowledge.

​forward

Intellectual property rights offer protections afforded by ____.

​governments

A webpage indexed in a search engine's database containing text matching a query is called a(n) _____.​

​hit

In Wi-Fi terms, a(n) ____ is an area of network coverage.

​hotspot

Most browsers include help for all of the following EXCEPT:

​how to create your own webpages

​If you type nbc.com in the Address bar, your browser will convert it to ____ and load the home page at that URL.

​http://www.nbc.com

Web documents are built with _____.​

​hypertext markup language

The email acronym "iow" stands for "____."​

​in other words

A(n) ____ message is sent in real time between users who are chatting over a network.

​instant

​When computer networks are connected to each other, the system is called a(n) ____.

​internet

A search engine searches _____ to find a match for the query.​

​its own database

A podcast with educational content is sometimes referred to as a ____.

​learncast

​By default, most wireless networks are ____.

​left unsecured

Stemming refers to the ability of search engines to _____.​

​look for variations of words used in a search expression

If your email program does not provide filters, you can filter the messages ____ by reading them and moving them to the appropriate folders​

​manually

Which of the following is NOT an example of push technology?

​mashups

A ____ contains information about the message.​

​message header

A(n) _____ tag is HTML code that a webpage creator places in the page header for the specific purpose of informing web robots about the content of the page.​

​meta

3.5G wireless networks are also called ____.

​mobile broadband

In general, a webpage that has _____ inbound links is given a higher ranking than a page that has _____ inbound links.​

​more, fewer

The term ____ refers to a set of commonly accepted rules for proper behavior on a network.​

​netiquette

A ____ stores items on a server as articles or postings that are sorted by topic.

​newsgroup

A(n) ____ is a discussion group that occurs over a computer network with many users contributing to a specific topic.

​newsgroup

When the Usenet News Service began operating, the only way to read or post articles to newsgroups was to install and run a software program called a ____.

​newsreader

Which of the following is NOT an example of pull technology?

​online social networks

​Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.

​over-the-shoulder attack

​In the address http://www.nytimes.com/pages/sports/index.html, the folder containing the webpage is _____.

​pages

The procedure of converting a natural language question into a search expression is called _____.

​parsing

The connection of your smartphone to your wireless headset is an example of a(n) ____.

​personal area network

Failure to cite the source of research material that you use is called ____.

​plagiarism

If a play was written in the U.S. 200 years ago, but performed and videotaped by a stage troupe today, the tape of today's performance is ____.

​protectable under copyright laws

The original purpose of podcasting was to make it easy for people to create and broadcast their own ____, but many other uses soon followed.

​radio shows

A wireless device's ____ refers to the physical distance between the access point and the wireless device.

​range

A language operator is used to _____.​

​restrict search results to webpages coded using a specific language

To save an image from a webpage, first you ____.

​right-click the image you want to save

All of the following are typical parts of an email message EXCEPT ____.​

​salutation

In terms of using search engines, another word for "query" is _____.​

​search expressions

Regarding search engines, the term "stemming" means _____.​

​searching for variants of keywords

Search engines create a list of results by _____.​

​searching through its own database with information about webpages

All of the following are benefits of medical information being readily available on the web EXCEPT:

​self-diagnosis resulting in self-medication

The term Web ____ describe the process of organizations communicating through a network to share data without needing extensive knowledge of each other's systems.

​service

A ____ might appear at the bottom of an email message and contain standard information about the sender.​

​signature

If you are using email for a business communication, your ____ usually contains your name, title, and your company's name.​

​signature file

If a typical search engine robot encounters a webpage with the text "Test Data: Do Not Use," its response would be to _____.​

​simply include the content as is, since it would not recognize the text as a warning

Businesses and sometimes individuals use a _____ to assimilate all of their social media content on a specific topic to engage readers and generate interest.

​social hub

​The coverage area for wireless broadband service will ____ the area where you can get cell phone reception.

​sometimes differ from

A(n) _____ is a paid placement that appears in a search engine's results page at or near the top of the results.​

​sponsored link

​Using one browser window for all open pages is called ____.

​tabbed browsing

Originally the term "chat" referred to ____ chat.

​text

On Wikipedia, contributors may post and edit articles anonymously, in which case the author is only identified by _____.​

​the IP address of their connection to the Internet

Page rank is determined by _____.​

​the number of high-quality back links that the webpage provides

​The safest wireless network is one that is ____.

​turned off

Copyright protection exists when the work is ____.

​unpublished

​All of the following are ways to use Chrome efficiently EXCEPT:

​use the control key and the = key to zoom to the original page view

A ____ usually identifies one person's email account on a mail server.​

​username

Two of the most important issues in conducting research on the web is assessing not only the quality of the information but al​so the _____.

​validity

One way to access library information is through a ____ library, which is a website that provides online access to library information services.

​virtual

​The World Wide Web is a collection of files that reside on ____ located all over the world.

​web servers

Unambiguous criteria to determine whether or not an object belongs to a collection are called _____.​

​well-defined

​In the address http://www.nytimes.com/pages/sports/index.html, the domain name is ____.

​www.nytimes.com

​Unlike WLAN technology, Bluetooth requires ____ access point(s) for communication.

​​0


Conjuntos de estudio relacionados

Read & Interact: Baye & Prince: Chapter 8

View Set

Real Estate Appraisal: Chapter 8 Cost Approach to Value

View Set

Тема 7. Індивідуальна свідомість людини як вища форма психічного відображення

View Set

Money, banking and the Fed review

View Set

Bio Mindtap Review Questions (Exam 2)

View Set