CS202 Make-Up Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

Goes above the body section

The head section ___________. a. Goes above the body section b. Goes below the body section c. Goes inside the body section d. Contains the body section

Billion

The prefix Giga represents approximately one _____ units of information. a. thousand b. million c. billion d. trillion

src and alt

The required attributes for inserting an image into a web page are ________. a. src and alt b. scr and alt c. height and width d. size and src

li

Description lists make use of the <dt> and <dd> tags while ordered lists make use of the ______ tag to specify list items. a. dl b. il c. li d. it

Networks

Ecommerce technologies include software and systems that support safe and secure transactions over _____ and the Internet, and make ecommerce possible. a. networks b. Bluetooth c. DHTML d. GSM

Web empowerment

FBI reliance on citizen photographs to catch the Boston Marathon bombers is an example of ____. a. throttling b. web empowerment c. traffic shaping d. vlogging

developing software to analyze the massive amount of data

The biggest challenge posed by Big Data is ____. a. viruses and malware b. physical storage c. developing software to analyze the massive amount of data d. traffic shaping

False

True or False: A .jpg file format applies lossless compression.

True

True or False: A firewall is network hardware or software that examines data packets flowing into and sometimes out of a network or computer in order to filter out packets that are potentially dangerous.

False

True or False: A peer-to-peer network takes advantage of a central server to share information.

False

True or False: An electronic exchange offers a platform for multiple industries to sell retail goods to online consumers in a local area.

True

True or False: An identity thief could steal your credit card number by using a special device when processing your card.

False

True or False: BitTorrent is an example of a client/server relationship.

False

True or False: Code Division Multiple Access (CDMA) is the newest international mobile networking standard designed for high-speed 4G Internet access.

False

True or False: Competing with LTE is RFID, a similar technology used by cellular carriers such as Verizon.

True

True or False: Countries are working together to agree upon international laws that will monitor cybercrime.

False

True or False: GSM companies are sometimes referred to as inventory management services because they assist businesses in managing inventory.

True

True or False: Mcommerce is supported by a variety of mobile form factors such as dashtop computers embedded in your car's dashboard.

False

True or False: Mcommerce stands for marketing commerce, which is concerned with online advertising directly to etail consumers.

True

True or False: Media player software locates, sorts, and arranges music by a variety of criteria such as artist and genre.

False

True or False: Most cellular carriers provide a choice of a subscription plan without a contract, or a two-year prepaid plan with a contract.

True

True or False: Spotify and Pandora are both example of freemium music distribution services.

False

True or False: The Internet backbone refers to the Hypertext Transfer Protocol (HTTP) that makes up the very foundation of the Internet.

True

True or False: The business-to-consumer (B2C) model of ecommerce is also called etail.

False

True or False: Wi-Fi is a wireless technology that connects users to networks within a range of about 30 miles.

Network usage policy

When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources. a. network usage policy b. Internet notification policy c. password agreement d. request for proposal

Never

When using a public Wi-Fi network, when is it safe to send private information over the network? a. only if the access point requires a password b. never c. only when you autoconnect d. whenever you recognize the login screen

Department of Defense

Which of the following agencies played an important role in the birth of the Internet? a. FTC b. Federal Internetwork Agency c. Google d. Department of Defense

Put spaces in your file name

Which of the following is NOT a good suggestion when making a webpage? a. Use an extension of .html b. Put spaces in your file name c. Put all content between the open and close body tags d. Save your images and your html files in the same location.

Blu-ray Movies

Which of the following is an example of digital media? a. Blu-ray movies b. magnetic tape c. printed newspapers d. spreadsheets

​<img src="RealEstate.jpg" alt="awesome house">

Which of the following lines of code shows correct syntax? a. ​​<img>src="RealEstate.jpg" style="text-align: center"<img> b. ​​<img>RealEstate.jpg alt="awesome house"> c. ​​<img>RealEstate.jpg<img> d. ​<img src="RealEstate.jpg" alt="awesome house">

inline

Which type of CSS is coded in the body of the web page as an attribute of an HTML tag? a. external b. embedded c. imported d. inline

ARPANET

With the help of ____, four academic research institutions were connected to each other for the first time through ARPA's computer network. a. NASA b. SOPA c. ARPANET d. BBN

31-mile

A WiMAX access point has a ____ range. a. 33-foot b. 1000-foot c. 1-mile d. 31-mile

Password

A common form of authentication is a ____.

VeriSign

A company called ____ provides digital certifications for web transactions. a. GoDaddy b. US-CERT c. Microsoft d. VeriSign

Database

A computer that manages data and produces information often uses a _____ to organize and deliver it. a. stylus b. scanner c. server d. database

Firewall

A device or software that filters the information coming onto a network is called a ____. a. bridge b. firewall c. gateway d. repeater

WPA2

A popular encryption method used to protect data that travels over a wireless network is ____. a. HTTPS b. FTP c. FTPS d. WPA2

Spider

A search engine attempts to catalog every webpage by topic through the use of a ____. a. petabyte b. shield c. tracker d. spider

DSL

A type of connection that provides Internet service through a phone line that services both the Internet and your phone is ____. a. TCP b. IP c. directional d. DSL

RSS feed

A(n) ____ is a data format used to provide frequently updated web content delivered directly to your browser or e-mail software. a. podcast b. rss feed c. webinar d. web conference

Electronic exchange

A(n) _____ provides software and a network that connects businesses within an industry. a. etail site b. electronic exchange c. cybermall d. online community

Keyboard Characters

ASCII is the encoding standard used to represent _____ in digital form. a. audio b. keyboard characters c. signals d. video

Smart Phone

Airlines take advantage of ____ technology to inform users of flight delays and itinerary changes. a. tower b. DRM c. smart phone d. RAM

Updates

All of the following are examples of malware EXCEPT ____. a. spyware b. viruses c. worms d. updates

Phishing

An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam. a. decryption b. domain c. Trojan d. phishing

EDI

An online B2B transaction uses a(n) _____ network to exchange information on the web. a. EDI b. etail c. mcommerce d. NSF

Bullet

An unordered list displays a small graphic called a(n) _____ before each item of information.​ a. ​tag b. ​li c. ​ul d. ​bullet

2

How many attributes are used in the following line code? <a href="http://cs.ua.edu" style="text-decoration:none"> CS Department </a> a. 0 b. 2 c. 1 d. 3

2

How many of the 10 basic html tags are one-sided tags?

Developing nations

IT Access for Everyone is an initiative for increasing access to digital technology for ____. a. American school children b. senior citizens c. developing nations d. minorities in the United States

Clickable text

In a correctly coded hyperlink, what goes where the blank is in the following line? <a href="http://ua.edu">____________</a> a. The clickable text. b. The doctype. c. The address of the location to which you want the hyperlink to go. d. The target frame.

Internet Server

In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted. a. Internet server b. CPU c. hard drive d. email client

client/server

In a(n) ____ relationship, multiple users are provided with access to a server at the same time. a. NSP b. client/server c. protocol d. ISP

B2C

In the _____ form of ecommerce, the web is used to connect individual consumers directly with retailers to purchase products. a. 2BC b. C2C c. B2B d. B2C

Domain Names

It is much easier for people to remember ____ than IP addresses of websites. a. clients b. transmissions c. domain names d. servers

3G

LTE access promises faster speeds for mobile wireless users and is aimed to be the successor to slower ____ technologies. a. GSDA b. 3G c. geotagging d. RFID

Subscription

One music services that use a ____ model of distribution is Spotify. a. BitTorrent b. podcast c. subscription d. cloud storage

Length of the songs supported

Services using DRM technology usually include all of the following restrictions EXCEPT ____. a. what player software can be used b. the length of the songs supported c. the number of CD burns d. approved devices that can play it

Hertz

Signal frequency is measured in ____. a. nanobits b. bits per second c. gigabytes d. hertz

RSS feed

Signing up for a(n) ____ will automatically provide you with web content that is updated on a regular basis. a. RSS feed b. HTML feed c. push feed d. HTTP feed

Turnitin

Software such as ____ is used by both students and teachers to find plagiarism problems. a. Turnitin b. Norton Utilities c. Microsoft Word d. LimeWire

Geotaggubg

Tagging a photo with geographic data is known as ____. a. digital geography b. metacartography c. geotagging d. metatagging

Nested

Tags that are included within other tags are called ____ tags. a. looped b. nested c. cocooned d. enclosed

DRM

Technologies that include encryption to make digital content unreadable without a valid encryption key. a. EULA b. DRM c. copyright d. shrink wrap license

Level-one heading

The <h1> tag is a ____ tag. a. text height b. closing head c. half-size d. level-one heading

a specific industry

The B2B electronic exchange differs from global supply management in that it focuses on _____. a. consumer demand b. spending management c. consumer-to-consumer commerce d. a specific industry

RIAA

The ____ has been successful in promoting legislation that protects its own content. a. RIAA b. PIPA c. Creative Commons d. DMCA

US-CERT

The ____ was established to secure and monitor security risks to U.S. networks and the Internet. a. W3C b. NSF c. US-CERT d. NTSB

​<ol> and </ol>

The _____ tags must be at the start and end of an ordered list.​ a. ​<ul> and </ul> b. ​<li> and </li> c. ​<dl> and </dl> d. ​<ol> and </ol>

CMYK color model

The _____ works by using blended colors such as those applied by your printer's ink cartridges when printing. a. hexadecimal b. bit depth c. color angle d. CMYK color model

Accessibility

The ability of people with disabilities to interact with and make use of computer resources is known as ____. a. cross-compatibility b. ramping in c. accessibility d. capacity

Server

The job of the ____ computer is to support a large amount of user requests simultaneously. a. server b. notebook c. netbook d. personal

None of the above; a public wireless network is never safe for private information

The only time it is considered safe to send sensitive information over a public wireless network is if it has ____. a. HTTPS b. WPA c. WPA2 d. none of the above; a public wireless network is never safe for private information

color

The style property used to set the text color on a web page is: a. ​background-color b. ​bgcolor c. ​color d. ​text-color

Displayed in the title bar of the browser window

The text contained between title tags is: a. Not displayed by browsers at all b. Displayed in the title bar of the browser window c. Not used by search engines d. Never seen by your web page visitor.

Coaxial

Three types of physical cables that carry a signal are twisted pair, fiber optic, and ____. a. coaxial b. Ethernet c. satellite d. wave

Distance education

Through ____, nontraditional students can complete their coursework from the comfort of their own home. a. instant messaging b. horizontal portals c. blogging d. distance education

Satellite Imagery

Through the use of ____, governments can keep an eye on criminals and monitor regions in their own countries. a. traffic shaping b. satellite imagery c. throttling d. RFID

font-weight

To make a paragraph display in bold text using the style attribute, we use the _____________ property. a. font-family b. font-style c. font-bold d. font-weight

a

To make an image a hyperlink, the image tag needs to be nested inside of the open and close _______ tag. a. img b. a c. href d. title

WPA2

To protect your wireless devices and the information they hold, you should set up encryption such as ____. a. SkyDrive b. WPA2 c. MAC d. SSID

Hexadecimal

Today, the encoding scheme named ____ has arisen to take over for ASCII for many applications. a. pascal b. hexadecimal c. IBMCII d. unicode

Cloud Computing

Using the web as a primary user interface to access such applications as Google Docs is an example of ____. a. CERN b. virtual protocol c. cloud computing d. virtual computing

-->

What are the last three characters that must be at the end of an html comment? a. --> b. -!> c. l/> d. !->

<h1>

What tag pair is used to create the largest heading? a. ​<h9> </h9> b. ​<h1> </h1> c. ​<h type="smallest"> </h> d. ​<h6> </h6>

Encryption

You can protect yourself from identity theft by using ____ when transmitting information over network connections. a. encryption b. cookies c. port-scanning d. biometrics

Fiber Optic

____ is a popular cable type used as a network backbone by major telecommunications companies. a. Twisted pair b. Fiber optic c. Coaxial d. broadband

Java

____ is an object-oriented language that is sometimes used in web programming. a. RIA b. Apache c. Java d. Ajax

Tim Berners-Lee

____ is credited with the development of the web. a. Tim Berners-Lee b. Steve Jobs c. Jason Welch d. Bill Gates

Lack of funding and personnel

____ is currently dampening the ability of government surveillance to grow. a. The "tech ceiling" b. Lack of funding and personnel c. Data transmission speed d. The poor quality of satellite images

RSS

_____ is the technology used to distribute blogs and other regularly updated online content to which people can subscribe. a. HTML b. MIDI c. DAC d. RSS

Piracy

_______ involves the illegal copying, use, and distribution of digital intellectual property such as software, music, and movies. a. piracy b. plagiarism c. patent-infringement d. trademark-infringement

Wardriving

___________is a malicious activity that involves driving through a neighborhood with a wireless-enabled notebook computer with the goal of locating homes and businesses that have wireless networks in order to gain access to them. a. phishing b. cyber warfare c. wardriving d. encryption e. internet fraud

​text-decoration: none

​Which property do you use to remove the underline from a hyperlink? a. ​text-border: none b. ​text-decoration: none c. ​underline: none d. ​color: none


Conjuntos de estudio relacionados

Development: Abnormal Development Practice Questions

View Set

PN Mood Disorders and Suicide Assessment

View Set

Microeconomics Chapter 6, Micro Chapters 6-10 Test, MicroEconomics Chapter 10 Quiz, Microeconomics 110 Exam 1.2, Microeconomics Chapter 14 Quiz, Microeconomics Chapter 15 Quiz, Microeconomics Quiz Chapter 13, Microeconomics Ch. 1-5 Notes, Microeconom...

View Set