ITE Unit 3
5) Software that enables you to display and interact with text and other media on the web is a web ________. A) client B) server C) agent D) browser
Browser
19) All of the following are types of e-commerce business EXCEPT ________. A) B2C B) B2B C) C2C D) C2B
C2B
7) A computer connected to the Internet that asks for data is a(n) ________. A) server B) client C) surrogate D) aggregator
Client
45) Wikipedia is a good reference for a research paper.
False
65. All 13 root servers use the same IP address
False
E-mails are completely private.
False
Websites selling a product are often the most accurate and appropriate for research.
False
58) Match each of the following browsers to a defining feature of it: I. Firefox II. Safari III. Mosaic IV. Microsoft Edge V. Chrome A. Apple's web browser B. the first browser to display graphics as well as text C. available only for Windows 10 D. runs on any platform E. open source
Firefox E Safari A Mosaic B Microsoft Edge C Chrome D
9) ________ is a professional, business-oriented social networking site. A) Flickr B) Pinterest C) Twitter D) LinkedIn
Linkedln
8) The unique identification number assigned to your computer when you connect to the Internet is known as all of the following EXCEPT a(n) ________. A) dotted quad B) path C) dotted decimal D) IP address
Path
42) A browser's bookmark feature makes it easy to return to a specific web page.
True
44) The semantic web uses metadata with text data to make it more easily processed by computers.
True
51) A metasearch engine searches other search engines instead of individual websites.
True
66. There are no root servers physically located in North Korea
True
All popular social networking sites have privacy policies, but you still need to follow certain precautions when using their sites.
True
Current search engines function by recognizing keywords.
True
There are federal laws against cyberstalking.
True
26) The unique address for a particular website is the ________. A) protocol B) domain section C) client D) URL
URL
URL stands for ________.
Uniform Resource Locator
12) Which of the following are personal video journal entries posted on the web? A) Podcasts B) Newsgroups C) Vlogs D) Blogs
Vlogs
32) AND, OR, and NOT are examples of ________ operators. A) Boolean B) Jacobean C) relational D) keyword
boolean
31) A(n) ________ is a navigation aid that shows the path you have taken to get to a web page or where the page is located within the website. A) index B) navigation bar C) breadcrumb trail D) cookie trail
breadcrumb trail
jp, .ca, .de, and .uk are examples of ________.
country codes
18) ________ is installed on your computer, and when the program is opened, your e-mail downloads to your computer. A) Web-based e-mail program B) E-mail client software C) E-mail host package D) E-mail server
email client software
20) Microsoft ________ is a cloud storage and file sharing service. A) iCloud B) Dropbox C) OneDrive D) Drive
onedrive
22) Which of the following is NOT a precaution to take when shopping online? A) Pay with a debit card, not a credit card. B) Shop at well-known, reputable sites. C) Avoid making online transactions on a public computer. D) When placing an order, make sure you receive a confirmation number.
pay with debit card, not a credit card
23) The "s" in "https" stands for ________ socket layer. A) semantic B) secure C) server D) social
secure
An Internet connected computer that receives a request and returns data is a(n) ________.
server
21) A subset of e-commerce that uses social networks to assist in marketing and purchasing products is known as ________ commerce. A) crowd B) source C) friend D) social
social
28) In the URL: http://www.microsoft.com/surface, the portion labeled "surface" is the ________. A) protocol B) domain name C) subdirectory D) top-level domain
subdirectory
24) Which of the following is NOT a feature of the most popular web browsers? A) Pinned tabs B) Session restore C) Tacked browsing D) Thumbnail preview
tacked browsing
I 27) In the URL: http://www.microsoft.com/surface, the portion labeled ".com" is the ________. A) subdirectory B) host C) top-level domain D) protocol
top-level domain
15) Podcasts enable you to ________. A) deliver audio/video files via RSS B) post journal entries on the web C) communicate with friends in real time D) edit video files over the web
use abbreviations such as u r and brb to keep the email message shorter
11) A ________ allows users to add, remove, or edit its content. A) wiki B) podcast C) blog D) chat .
wiki
56) Match each of the following terms to its meaning: I. browser II. Internet III. search engine IV. host V. e-mail A. large network of networks B. tool used to locate information on the web C. location that maintains the computers that store the website files D. application program used to view the web E. asynchronous electronic communication
browser D Internet A search engine B host C e-mail E
14) A ________ is a personal journal posted on the web. A) blog B) podcast C) wiki D) webcast
blog
2) The concept of the Internet was developed by the U.S. Department of Defense as a network that ________ in event of an attack. A) provides point to point connections B) allows commerce to continue C) would not be disrupted easily D) would not be easily hacked
Would not be disrupted easily
1) The Internet is ________. A) an internal communication system for businesses B) a communication system for the U.S. navy C) the same as the web D) a large network of networks
a large network of networks
48) Geolocation is a GPS enabled feature on a smartphone that provides your location to apps like Uber.
True
50) One method of cyberbullying involves spreading rumors about another person.
True
13) A(n) ________ is usually a live broadcast of audio or video content. A) podcast B) wiki C) instant message D) webcast
Webcast
3) The World Wide Web was based on a protocol developed by ________. A) CERN B) Ray Tomlinson C) Tim Berners-Lee D) Vinton Cerf
Tim Berners Lee
47) A criticism of hashtag activism is that it fosters a false sense of involvement.
True
33) Which of the following is a supporting argument for geolocation devices posing a threat to privacy? A) Businesses are responsible to educate consumers about how they use geolocation data. B) The social norm has shifted and people have become comfortable with sharing more information, including their location. C) Many businesses incorporate geolocation as a primary marketing strategy; the loss of privacy is outweighed by the benefit to consumers. D) Society may need to reevaluate its expectations as to the amount of privacy in people's digital lives.
the social norm has shifted and people have become comfortable with sharing more information, including location.
17) Which of the following is a universal instant messaging service? A) Skype B) WhatsApp C) Google Hangouts D) Yahoo! Messenger
57) Match each of the following domains to the site that would use it: I. .com II. .gov III. .edu IV. .ca V. .org A. White House B. Red Cross C. Stanford University D. Apple E. Ontario Government
.com D .gov A .edu C .ca E .org B
30) Which of the following top-level domains identifies a degree-granting institution? A) .gov B) .net C) .edu D) .info
.edu
63. What is the top level domain in the following URL nvcc.my.vccs.edu
.edu
61) Match each of the following social networking sites to its specialty: I. Facebook II. Pinterest III. LinkedIn IV. Uber V. PayPal A. Social Commerce B. Social Travel C. Social Communication D. Business Networking E. Media Sharing
Facebook C Pinterest E LinkedIn D Uber B PayPal A
41) When shopping on the web, it is better to pay for your purchase with a debit card rather than a credit card.
False
43) Using the browser feature called tab isolation, you can drag an open tab away from its current window and open it in a new window.
False
46) When evaluating the relevance of a website, it is important to evaluate the date of publication.
False
52) Cyberbullying is essentially the same thing as cyberstalking, but the parties involved in cyber bullying are children or adolescents.
False
59) Match each of the following terms to a definition of it: I. HTTP II. C2C III. FTP IV. B2C V. URL A. protocol that allows files to be transferred from a web server B. transactions between two individuals C. transactions between a company and its customers D. website address E. protocol that allows files to be transferred over the Internet
HTTP A C2C B FTP E B2C C URL D
6) The web is based on the ________ Protocol. A) Hypertext Transfer B) Hypertext Trade C) Hypertext Transmit D) Hypertext Translate
Hypertext Transfer
60) Match each of the following terms to its meaning: I. IM II. podcast III. blog IV. webcast V. wiki A. personal journal posted on the web B. program that enables you to communicate in real time with others online C. uses RSS to deliver an audio or video file D. live streamed broadcast E. website that allows site visitors to change its content
IM B podcast C blog A webcast D wiki E
4) The "fathers of the Internet" are Vinton Cerf and ________. A) Robert Cailliau B) Tim Berners-Lee C) Bill Gates D) Robert Kahn
Robert Kahn
34) Catfishing is ________. A) creating fake profiles on a dating site and developing a fabricated online and phone relationship B) posting inflammatory remarks to solicit angry and negative responses C) bombarding someone with harassing messages D) posting embarrassing pictures, rumors, or videos via social media
creating fake profiles on a dating site and developing a fabricated online and phone relationship
15) Podcasts enable you to ________. A) deliver audio/video files via RSS B) post journal entries on the web C) communicate with friends in real time D) edit video files over the web
deliver audio/video files via RSS
The ________ list shows all of the websites and pages you have visited over a certain period of time.
history
62. Using a Command Prompt the ping command will return the ________Associated with a valid URL
iP ADDRESS
10) Which of the following is NOT a social networking site? A) Facebook B) YouTube C) LinkedIn D) iTunes
iTunes
29) In the URL: http://www.microsoft.com/surface, the portion labeled "http" is the ________. A) protocol B) domain name C) path D) top-level domain
protocal
64. top-level names permit two different naming hierarchies: _______________ and _______________
second level domain, lowest level domain
25) The browser feature which enables tabs to work independently from one another so if one crashes, the others may continue to work is known as ________. A) pinned tabs B) tab isolation C) free tabs D) privacy browsing
tab isolation