CIA 1A-Word

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Tweets can be made up of text, images, and video.

True

Along with the price, a major concern associated with genealogical DNA testing is ______

privacy

WPA stands for Wi-Fi ______ access

protected

Your ______ provides firewall protection for your home network. It connects your home network to your ISP's network

router

Your internet signal is carried on a ______

transmission media

Of the following, ______ has the most bandwidth

CAT 7 Cable

In a server-based network the individual computers and devices (or software) that make requests are called ______

Clients

The ______ protocol allows documents to be sent over computer networks

hypertext

Leading to the creation of the World Wide Web, the ______ allowed users to send documents and images across networks

hypertext transfer protocol (HTTP)

Fiber-optic cable is ______ to install than coaxial (TV) cable

more expensive

Router

Connects two networks

The cable that is most commonly used within a network is called ______ cable and is sold by category (CAT-7, for example)

ethernet

The transmission media with the largest bandwidth is ______

fiber-optic cable

A router's signal gets ______ as it travels further from the router

weaker

The standard code of respectful behavior in society or among members of a particular profession or group is called ______

etiquette

which of the following should be considered when choosing an ISP?

1. how many users will be logged on my network at the same time? 2. will users be streaming data? 3. what ISP choices are available in my area?

Electronic etiquette covers the use of:

1. social media 2. text messages 3. e-mail

Which two of the following sites offer internet speed test services?

1. speedtest.net 2. testmy.net

The redundancy of internet connectivity is based on a technology called ___

Packet switching

Passports issued by the United States and many other countries include ______ chips.

RFID

Put your router near the ______ of your house or apartment, because the router broadcasts signals in equal strength in all directions

center

Used by the public switched telephone network (PSTN), ______ switching creates a dedicated physical path to send and receive information

circuit

The technology that uses electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to identify a variety of objects including objects, animals, and people is called Radio ______ Identification.

frequency

Aabidah wants to find social media postings regarding base jumping over the Snake River. She should use a ______ in her search

hashtag

The ______ portion of an IP address is indicated by the remaining bits that are present after the network identifier and identify the host of the network

host

An IP address is determined by the network on which it is

hosted

The World Wide Web refers to the billion of ______

hypertext files accessible through the internet

Jacklyn types specific terms (words) into a search engine (Google, Bling, Yahoo, etc.) when she wants to find an article on the World Wide Web. This is called a ______ search.

keyword

The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.

netiquette

A ______ is a group of two or more devices/computers connected together to allow for the exchange and information and for the sharing of resources such as printers

network

Telephones were connected using circuit switching while the internet uses ______ switching

packet

By ensuring that transmissions can be sent even when several sites are not working, ______ technology made the internet possible

packet switching

The process used by individuals to make them stand out from others by identifying and expressing their unique traits and values (both professional and personal) is called ______ branding

personal

A request for an electronic "echo" or response from another computer or server is called a(n) ______

ping

In order to prevent your data and identification from being stolen, it is a good idea to protect your radio frequency identification (RFID) enabled items with an RFID data protection _____ or wallet.

sleve

Select all that apply. Which of the following are search engines that are used to find information?

Bing Yahoo Google

Of the following, the internet service that tends to provide the most consistent speeds is ______.

Digital subscriber line (DSL)

Free openly licensed learning resources that are available online for instructors and students to use are called open ______ resources

Educational

Which technology allows the electronic communication of business-oriented transactions and information between people and organizations?

Electronic data interchange (EDI)

Boolean operators are the words ______, "OR" and "NOT". The use of Boolean operators can make a sreach more precise and return better results

"AND"

Jerome wants to search for articles about banana pudding but his web search results also show results for chocolate pudding as well as articles about bananas. What should Jerome enter into the search window so that he only finds articles with the word banana pudding in them?

"banana pudding"

If typed into a search window, which of the following would show only the results of social media postings about pepperoni pizza?

#pepperonipizza

Shocking! A study conducted by the National University of Singapore found that consumers worldwide spend ______ per year as a result of pirated software.

$25 billion

If your debit card has been compromised, the U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within 2 business days of learning about it.

$50.00

If your debit card has been compromised and you wait more than 2 days, but fewer than 2 months after you learn about the loss, you can be liable for up to ______.

$500.00

Check the document for writing errors, and make the following changes: fix the grammar error that is found, change all instances of the world nead to need using a single command, and accept the writing suggestion to change are able to to can

1. Click the review tab 2. In the proofing group, click the spelling and grammar button 3. For the grammar error, click the grammar suggestion in the task pane 4. In the task pane, click the arrow next to need and select change all 5. For the last error, click the suggestion in the task pane 6. Click OK in the message box

Using the editor, check the document writing style issue and accept the suggestion to change are able to to can

1. Click the review tab 2. In the proofing group, click the spelling and grammar button 3. In the editor, click the suggestion 4. Click ok in the message box

Hide the ruler

1. Click the view tab 2. In the show group, click the check box next to ruler

Which three of the following statements are true regarding switches?

1. Connect computers and other devices within a network 2. Usually integrated in the routers of home networks 3. Ensure correct data are transferred to and from the correct computers in networks

Select the characteristics of a router. Please select three

1. Connects network 2. Provides hardware firewall protection 3. Usually incorporates a switch

Which three of the following are characteristics of a router?

1. Connects networks 2. Provides hardware firewall protection 3. Usually incorporates switches

Which of the statements below are things to pay attention to when building an awesome personal brand?

1. Create a personal website 2. Make sure you know about your online presence

Cut the selected text and paste it below the text call for a free medical evaluation

1. Cut selected text 2. Paste selected text

After you tell your financial institution about the fraudulent charges it has _____ business day/days to investigate.

10

ARPA stands for ______

Advanced Research Projects Agency

Although it provides the fastest home internet service

Fiber-optic Internet service is limited in its availability

Web 3.0

Known as semantic web. Made searching for information easier

Web 2.0

Known as the interactive web. Made cloud computing and interactive content feasible

When discussing HTML objects a ______ displays web pages about the search topic

Link

A switch tracks which device within a network sent a request based on the devices ______ address

MAC

Use the Boolean operator "______" if you want to exclude certain results from your search

NOT

The internet service providers (ISPs) cannot throttle (slow) data, or charge fees, from specific content providers (such as Netflix) is a concept known as _____

Net Neutrality

______ are free openly licensed learning resources that are available online from instructors and students. There are a variety of these resources available including textbooks, assignments, games and digital media

OER (Open Educational Resources)

Use the Boolean operator "______" when you are searching for documents including one or another of your search words

OR

Search engine ______(SEO) is a set of strategies, techniques, and practices used to increase the amount of visitors to a specific website by getting a high ranking placement in the search engine.

Optimization

The device that divides and connects two networks is a ______

Router

The first social media site to allow users to create profiles, organize groups, and invite friends was called _____

SixDegrees.com

With over 6 billion image and video views per day _______ is the world's most popular picture- and video-sharing app. The app allows users to limit the visibility length of the image.

Snapchat

Domain names and IP addresses on the internet are managed by ______

The Internet Corporation of Assigned Names and Numbers (ICANN)

Which of the following group determines the standard for the Web?

The World Wide Web Consortium (W3C)

When referring to the World Wide Web, TLD stands for ______

Top Level Domain

A popular protocol (procedure) for sharing large files such as movies, TV shows, and music via the Internet is Bit ______.

Torrent

The main governmental organization that oversees Internet privacy in the US is the Federal ______ Commission

Trade

The original protocol (standard) for Wi-Fi security that was widely introduced in 1999 but replaced in 2003 was known as ______

WEP

The wireless network privacy standard that was introduced in 2003 but was quickly replaced due to vulnerabilities was ______

WPA

The standard for wireless network privacy and protection is known as ______

WPA2

Xi wants to determine the owner of a website. He will conduct a ______ search.

Whols

Many cellular ISPs offer modem/router combination devices that can create a(an) ______

Wi-Fi hotspot

Hypertext made the ______

World Wide Web possible

Insert a hard page breaker

`1. On the insert tab go to the page and click on the page breaker

A written document that provides a framework of rules to be followed by users of computers, networks, websites, and computer resources such as printers and scanners is called an ______ use policy.

acceptable

An internet connection that has enough bandwidth to allow multiple computers to be connected to the same router is called a ______ connection

broadband

A Wi-Fi connection is often referred to as a ______

hotspot

By having your smartphone send and receive Wi-Fi signals you are creating a mobile ______

hotspot

Select the domain name

mheducation.com

Capable of sending internet signals tens of thousands of miles in a straight line, ______ are used with satelites

microwaves

The device in a network that coverts analog (wave) signals into binary (digital) signals and vice-versa is a ______

modem

When copyrighted software is illegally copied, distributed, modified, or sold, and is considered direct copyright infringement, software ______ has occurred.

theft

Select all that apply Which three of the following are the characteristics of networks?

1 Provide the ability to share files and information 2. Allow users to share resources which saves money and time 3. Allow users to access other networks and the internet

Which three of the following statements are true about LANs

1. A collection of computers that are connected in a small geographic area such as an office, college campus or in your home 2. A home network LAN can consist of two computers, your TV, video game system, and a shared printer 3. Ethernet is the most popular networking standard from LANs

Change the text so it is justified

1. On the Home tab, in paragraph group, click the Justified button

Copy the selected text and paste it below the next www.mdsclinic.com

1. On the Home tab, in the Clipboard group, click the Copy button 2. Click below the text www.mdsclinic.com 3. Click the Paste button

Text has been copied to the Clipboard. Without opening the clipboard task pane, paste the text using the paste option that will match style of the pasted text with the surrounding text

1. On the Home tab, in the clipboard group, click the Paste button arrow 2. Click the Merge Formatting option

Clear the formatting from the selected text

1. On the Home tab, in the font group, click the clear formatting button (A with eraser)

select the common internet transmission media:

1. coaxial cable 2. telephone wire 3. cell phone radio waves

Select the statements that are true regarding DSL Internet service.

1. uses telephone wires as transmission wires 2. Internet signals tend to be very consistent

select the statements that are true regarding cable internet service

1. uses the same coaxial cable that brings the cable television signal 2. usually has more bandwidth than DSL lines 3. internet service can often be bundled with television service

Select all that apply Which three of the following statements are true regarding an IP address?

1.IP stands for Internet Protocol 2. In most home networks IP addresses are assigned by the Internet service provider 3. If two laptops are connected to the same home network, they connect to the internet through the same IP address

Which three of the following are true regarding Wi-Fi?

1.Multiple devices can be connected to one signal 2. Transmit internet signals via radio waves 3. Transmission connections are known as hotspot

If the investigation determines the transaction was indeed fraudulent, your financial institution must replace the funds within ____ business day/days.

1

A global nonprofit organization that empowers people to create open resource materials including images and videos that can be shared or reused is ______ Commons

Creative

NeXT's ______ capitalized on the graphical user interface. Though it was a technological marvel, it was not a commercial success.

Cube

The technology that allows the electronic communication of business-oriented transactions and information between people and organizations is called electronic ______ interchange

Customer

Which of the following statement is true about Facebook?

Cyberstalking and online predators are a real problem on Facebook

Often IP addresses are structured and assigned by a service called a(an) ______ or by a network administrator

DHCP

Signed into law by President Clinton in 1998, The ______ Millennium Copyright Act (DMCA) implements two World Intellectual property organization (WIPO) treaties

Digital

Emoticon and emoji are essentially considered to be the same by today's computer users.

True

If possible, it is often a good idea to ask your neighbors what ISP works best in your area when purchasing internet service

True

Many 4G and 5G cellular Internet Service Providers offer a device that serves as a hotspot for your home and includes an integrated modem and router

True

Some cell phone carriers that promise "unlimited data" will actually limit your high speed 4G LTE data to a couple of gigabytes per month

True

Twitter is an information network made up of 280-character messages called _______.

Tweets

Switch

Connects devices within a network

A transceiver can both send and receive information.

True

Telephone wire is also called ______ pair wire

Twisted

TV cable is also known as ______ cable

coaxial

The fastest growing internet service provider media is ______

cellular internet service

Copy the selected text to the clipboard

1. Click copy button

Display the ruler

1. Click the View tab 2. In the show group, click the check box next to ruler

Select all that apply. There are risks associated with downloading content from the Internet. Which of the following are to consider when downloading from the Internet?

1. Files downloaded from unknown sites and file-sharing sites often contain a variety of malware including spyware and viruses. 2. The source of the content. It is important to consider if the content came from a legitimate source. 3. When downloading or sharing files via the Internet via file-sharing programs you can unknowingly give outside users access to your computer.

Change the font for the selected text to Cumbria

1. On home tab, in font group, select Cumbria text

select the statements that are true regarding switches

1. switches connect computers and other devices within a network 2. switches are usually integrated in the routers of home networks 3. switches ensure that correct data is transferred to and from the appropriate devices in networks

Select the statements that are true regarding Cellular Internet service.

1. uses cell phone radio waves to transmit and receive Internet signals 2. Many providers offer data packages that may place limits on uploading and downloading. 3. Many smartphones can send and receive WiFi signal, allowing them to become hotspots.

select the statements that are true regarding satellite internet service

1. uses microwaves to deliver service 2. provides broadband service virtually anywhere 3. customers usually purchase a date plan that limits uploading and downloading

You should use LinkedIn to connect with other professionals including:

All of the above

Experts suggest making connections with the three Cs: Company, _____, and Colleagues.

College

Protocols for the World Wide Web are maintained and updated by the World Wide Web

Consortium

The European Union's (EU) European Commission ______ Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions

Data

Most search engines use similar technology to execute an internet search. The search engine uses a ______ of internet URLs. Each record in the database contains information including the site URL, description and title, and keywords included in the site.

Database

SAGE was developed by the US Department of ______

Defense

The technical term for electronic or online banking. ______ uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another

EFT (Electronic funds transfer)

Select the browser that comes included with Windows Operating systems

Edge

______ software is designed to track and record the use of network and hardware resources in the workplace by employees.

Employee-monitoring

It is common practice for the website owner to submit their URL and associated information the the search ______ company (SEC)

Engine

The most popular network transmission media standard (the cable used) for LANs is

Ethernet

International laws on ______ privacy vary greatly. It is very difficult to get nations across the glove to agree on standardized internet privacy laws. Due to the lack of normalized laws it is important to use discretion on the internet when traveling or living abroad

Internet

The largest WAN on the earth is the

Internet

The right to personal privacy regarding the storing, distribution, and displaying information concerning oneself via the Internet is called ______ privacy. It is a wide-ranging term that refers to a variety of considerations including :

Internet

ISP stands for

Internet Service Provider

Every computer connected to a network has a network interface card that contains a unique ______ address, allowing the switch to identify it

MAC

There are a variety of selections in the online gaming environment. One popular genre is called Massive Multiplayer Online Role Playing Games (MMORPG), which are also known as _____.

MMO

Search engines send out web spiders to find content, browsers allow access the World Wide Web. Which of the following is a search engine and not a browser

Microsoft Bing

The word modem stands for

Modulator-Demodulator

Paul Baran developed a technology called:

Packet switching that made the internet reliable (and possible !)

IT professionals spend a lot of time protecting networks from unauthorized connections from outside a LAN. However, there are times when it is necessary to allow outside connections to a LAN. This is referred to as ______ access

Remote

There are many internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the internet. These laws are created by both ______ and federal government. The main federal governmental organization that oversees internet privacy is the Federal Trade Commission (FTC)

State

Because they are both Apple products, the browser that works smoothest with Macintosh OS X is:

Safari

The six degrees of ______ concept states that you can connect with anyone through a chain of no more than six introductions or personal links.

Separation

Paul Baran developed packet ______ in hoes of making semi-automatic ground environment (SAGE) less vulnerable

Switching

Web 1.0

The web before blogs, wikis, and interactive media

The BitTorrent protocol allows users to share large files over the Internet.

True

The standard for home network security is ______. Be sure yours is active and that you have a strong password

WPA2

Social media was made possible by ______ and started with applications that were designed for individuals to communicate with each other via the Internet.

Web 2.0

An acceptable use policy (AUP) is a written document that provides a framework of rules to be followed by users of:

all of the above

A radio frequency identification (RFID) systems consists of three components: ______. transponder, and transceiver

antenna

Rather than purchasing separate cable or DSL internet service for a home network, many individuals find it less expensive to add to their cellular _______ plan and only access the internet through their smartphones or tablets

data

The amount of videos and music you're permitted to stream through your cellphone network is determined by your ______ plan

data

The technology that allows the electronic communication of business-oriented transactions and information between people and organizations is called electronic ______ interchange.

data

The technology that allows for the electronic communication of business-oriented transactions and information between people and organizations is called electronic:

data interchange

A digital presence created online by an individual or organization using a digital device is called a ______ identity

digital

Every action you make online leaves a cyber or ______ footprint

digital

Routers that can send internet signals over two distinct frequencies are called ______ routers

dual-band

Pictures or graphics that are used in text and e-mail messages are called ______

emoji

Emoticon is a blending of the words emotion and ______ and refers to keyboard characters that are used to represent facial expressions and objects.

emojis

Derived from the Greek word ergon (work) and nomoi (natural laws), ______ is an important element of workplace safety.

ergonomics

A URL identifies a particular ______ address on the World Wide Web

file

To limit the data or images that appear on your computer screen, add ______ to your search engine and browsers

filters

A security system separating two networks or even computers on the same network is a ______

firewall

To find a picture of an airplane's flight deck, simply type "airplane flight deck" into your search window then click the ______ button

image

For ______ it may be less expensive to add to an existing cell phone data plan and to use the phone as a hotspot than to add wired internet service

individual users

Human knowledge and ideas that the law protects against authorized use by others is considered ______ property

intellectual

A virtual ______ network (VPN) creates a secure connection between two computers

private

If your internet download or upload speeds are lower than advertised, contact your internet service ______

provider

Checking how current the information is on a website helps to ensure ______. Out of data information can be an indicator that the site may not be the best resource

relevance

When evaluating a website look for errors in facts, spelling, or language use. If many errors are present you should question the ______ of a site

reliability

The formal term for a greeting to the recipient of an e-mail message is called a

salutation

Using microwaves to transmit signals, ______ Internet service can provide broadband connectivity virtually anywhere

satellite

Two of the main concerns that surround digital identity are privacy and ______

security

A computer (or software) that provides resources and services to client computers is a ______

server

Client/server networks are also referred to as ______ based networks

server

Data on the internet is usually stored on specialized computers called

servers

Your home network's wifi name is its ______, and is transmitted by your wireless router every few seconds unless you turn it off

service set identifier (SSID)

The device in a network that keeps track of connected devices MAC addresses and is usally incorporated in a router is the

switch

The specific means by which your internet signal is carried is called its ______ media

transmission

WEP stands for ______ equivalent protocol. WEP has been replaced by the far more secure WPA2 protocol

wired

Broadband is usually measured in ______

Mbps

Select which of the following are true about personal websites.

1. A personal website is one of the most critical elements to building an awesome personal brand. 2. Personal websites are created as a means to showcase your skills and differentiate yourself from the competition. 3. Personal websites include information about schools attended, jobs, and extracurricular activities.

Which of the following statements are true about ergonomics?

1. A very important element of an effective workplace safety plan. 2. The study of human interaction with the objects they use. In the computer world, this refers to the interaction humans have with computer hardware devices and computer workstations. 3. Derived from the Greek words ergon (work) and nomoi (natural laws).

Select all that apply Which three of the following statements are true about VPNs?

1. A virtual private network (VPN) creates a secure connection between two computers. 2. VPNs allow for encrypted communications using the Internet as the pathway for data transmission and communication. 3. People within the organization use VPN software to login to the VPN.

Which three of the following statements are true regarding a Wi-Fi's service set identifier (SSID)

1. An SSID is the Wi-Fi name 2. Most routers transmit the SSID every few seconds so roaming devices can find the signal 3. In home networks, after all legitimate devices have connected t SSID once, transmitting the SSID is unnecessary

Which three of the following items are needed to install a home WiFi network?

1. An internet signal 2. A modem 3. A router

Which of the following statements are true about Facebook?

1. Anything posted on Facebook is not private once it is shared with others. Any posts or shared items can be easily sent to others. 2. Every time you post something on any social media site, you are impacting your online identity. 3. Unless you specify differently, photo tagging creates a link to your Facebook timeline.

Which three of the following statements are true regarding internet protocol (IP) addresses?

1. Assigned to your home network by your ISP 2. Means by which your network is identified by other servers and computers on the internet 3. ISPs usually have blocks of IP addresses that they assign as demanded

Which of the following are e-mail etiquette considerations?

1. Avoid ambiguity 2. Keep your messages brief yet specific to the subject of the message 3. Use proper spelling and grammar in your messages

Which of the following are email etiquette considerations?

1. Be cautious so you do not hit "reply all" if you do not intend to do so. 2. Sent messages are for the most part permanent and are saved for a very long time on e-mail servers. 3. Write your messages carefully. Once you send a message you cannot rescind it.

Which of the following statements are true about best practices for the use of an employee-monitoring program?

1. Be honest with the people in your organization about the presence of monitoring software and the processes and procedures that surround it. 2. Preventing employee access to time-wasting or inappropriate sites can help to stop trouble before it begins.

Select all that apply Which of the following are considered e-commerce transactions?

1. C2C 2. B2C 3. B2B

Select all that apply Which of the following are among a few US Internet privacy laws/rules of importance according to the Federal Trade Commission (FTC)?

1. COPPA 2. The Red Flags Rule

Select all that apply Which of the following statements are true regarding RFID

1. Can be used to identify or track a variety of objects including poker chips, products and even animals 2. RFID does not require line-of-sight scanning

Select all that apply Which three of the following statements are true regarding dual-band routers?

1. Can transmit Wi-Fi signals in the 2.4 GHz frequency range 2. Can transmit Wi-Fi signals in the 5.0 GHz frequency range 3. Can minimize the Wi-Fi signal's interference from microwave ovens and car alarms

Select all that apply Which three of the following are characteristics of microwaves?

1. Capable of transmitting internet signals over long distances 2. Used to transmit internet signals to and from satellites 3. Used to transmit internet signals where wires may be impractical

Select all that apply Which three of the following statements are true about troubleshooting a home network?

1. Check to make sure that cables are not damaged and that all cables are properly connected 2. A poor signal can be an indicator that the hardware is outdated or improperly positioned 3. A device that is not positioned properly can cause weak signals and system issues

Which three of the following are web browsers?

1. Chrome 2. Edge 3. Firefox

Text has been copied tot he clipboard. Without opening the Clipboard task pane, paste the text above the text electric nerve stimulation

1. Click paste button on Home tab

Check the document for writing errors. Fix the grammar error that is found

1. Click review tab and select spelling and grammar

Open the borders and shading dialog with the page border tab displayed. Add a shadow border to the document. The border should be 1 1/2 pt wide and use the Green, Accent 6, Darker 50% color

1. Click the Design tab 2. Click the page borders button 3. In the setting section, click shadow 4. Click the color drop-down arrow and select the green accent 6, darker 50% option 5. Click the width drop-down arrow and select 1 1/2

Add a footer to the document using the Facet (Even Page) format. Add the author Sue Chur to the footer. When you are finished, close the footer

1. Click the Insert tab 2. In the header and footer group, click the footer button and select facet (Even Page) 3. Click the [Author Name] text and type Sue Chur 4. On the Header and footer tools design tab, click the close header and footer button

Create an AutoCorrect entry to change ligamant to ligament when typed

1. Click the file tab 2. Click options in the word options dialog, click the proofing button 3. Click the corrector options button 4. Type ligamant in the replace box 5. Type ligament in the with box 6. Click OK 7. Click OK

Change the text so it is left aligned

1. On the Home tab, in paragraph group click the left aligned button

Add a company property control to the document that reads medisport clinic

1. Click the file tab 2. On the info page, click the show all properties link and type MediSport Clinic in the box to company 3. Click the back button 4. Click the insert tab 5. In the text group, click the explore quick parts button, point to document property and select company

Add a header to the document using the viewMaster format. Add the text MediSport Clinic business plan. when you are finished, close the header

1. Click the insert tab 2. Click the header button and select ViewMaster 3. Click the [Document Title] property in the header and type MediSport clinic business plan 4. Click the Close header and footer button

Add a page number to the margin of the page using the Accent Bar, Left building block

1. Click the insert tab 2. Click the page number button, point to page margins 3. Select accent bar, left

Open the insert hyperlink dialog to add a hyperlink that reads see the appendix to the document. The link should take the reader to the appendix section in the same document

1. Click the insert tab 2. In the Links group, click the link button and select insert link 3. Under link to : click place in this document 4. Click appendix in the select a place in this document: box 5. In the text to display: box, type see the appendix

Insert a hard page break that will insert a new section ont he next page

1. Click the layout tab 2. In the page setup group click the breaks button and select next page

Use the Redo command to redo the last action taken

1. Click the redo command

Using the thesaurus, replace the selected word (founded) with the synonym created

1. Click the review tab 2. In the proofing group, click the Thesaurus button 3. Point to the related word created, click the arrow that appears, and select insert

Open the dialog where you can review the number of words in the document

1. Click the review tab and on the proofing section select word count

Add a right tab stop at the 6in mark on the ruler

1. Click the tab selector twice to select a right tab stop 2. Click the ruler at 6"

Use the Undo command to undo the last action taken

1. Click undo button

Which three of the following are commonly used internet transmission media?

1. Coaxial (TV) cable 2. Telephone wire 3. Wi-Fi radio waves

Which three of the following are commonly used Internet transmission media?

1. Coaxial Cable 2. Ethernet Cable 3. Fiber Optic Cable

Which of the following have been cited as social risks associated with playing computer games online?

1. Computer/game addiction 2. Identity theft 3. Virtual mugging, cyber prostitution, and protection schemes

Which of the following are examples of downloading a file?

1. Copying a driver from a company's website and saving it to your computer 2. Buying a song on iTunes and storing it on your phone so that you can listen to it on a airplane flight (without Wi-Fi) 3. Copying a photo from Facebook and saving it to your desktop

Change the document so the first page has a different header from the rest of the documents

1. Double click the header 2. On the header and footer tools design tab 3. In the options group, click the different first page 4. Check box to select it

Using the Date and Time dialogue box, add an automatic date stamp to the header of the document. Use the July 5, 2019 format

1. Double click the white area at the top of the page 2. Click the date and time button in the insert group on the header and footer tools design tab 3. Click the date format in the available formats: box 4. Click the update automatically check box and click okay

There are risks associated with downloading content from the Internet. Which of the following are to consider when downloading from the Internet?

1. Downloading software that is pirated or is not from the original manufacturer, which can constitute copyright infringement. 2. Accidentally downloading pornography that is labeled as a different file.

Which of the following statements are true about emoticons?

1. Emoticons attempt to convey feelings without the use of words. 2. Emoji and emoticon are synonyms. 3. Keyboard shortcuts like :) can insert emoji in some programs.

Which of the following statements are true about employee-monitoring software?

1. Employee-monitoring software is designed to track and record the use of network and hardware resources in the workplace by employees. 2. Why is this software used? A current study identified that 21 to 31 percent of employees sent e-mails with sensitive information outside the company network. 3. Employee-monitoring software can be used to track e-mail, monitor network and Internet usage, and set Web filters.

Select all that apply Which three of the following statements are true regarding fiber-optic Internet service?

1. Fastest home network option (if available) 2. Not available in all areas 3. Signal is carried by light waves so it is less subject to electromagnetic interference

Select all that apply Which three of the following are the characteristics of cellular service?

1. Fastest-growing means of accessing the internet 2. Allows mobile devices to access the internet 3. Many smartphones can convert cellular signals into Wi-Fi signals

Which of the following three are internet service options?

1. Fiber Optic 2. Cable 3. Satelite

Which three of the following statements are true regarding filters?

1. Filters limit the material browsers fetch 2. Parents often use search engine filters to restrict offensive images from being displayed on a computer's monitor 3. Filter settings are often accessed through a browser's preferences

Apply the Ion theme to the document

1. Go to the design tab and select Themes 2. Select Ion

Change the document's top and bottom margins to 1" and the right and left margins to 0.7"

1. Go to the layout tab on the page setup and click margins 2. Select the top and bottom margins to 1" and the right and left margins to 0.7"

Use one of Word's preset margins settings to change the document's margins so that the top and bottom orders are 1" and the left and right margins are 2"

1. Go to the layout tab on the page setup click margins 2. Select the margin option that states the 1" for the top and bottom and 2" for left and right margins

Change the scrolling of the document to side to side

1. Go to the view tab and in the page movement section select side to side

Change the scrolling of the document to Vertical

1. Go to the view tab and on the page movement select vertical

Select all that apply The internet is a global network of interconnected networks that uses which three of the following?

1. Hardware such as servers and routers 2. Software, specifically the transmission control protocol/internet protocol (TCP/IP) suite of internet protocols

Add shading to the first paragraph under executive summary (starts with "The MediSport Clinic ...") using the Light Gray background 2 color (the third color int he first row under theme colors)

1. Home tab under paragraph group

Select all that apply When determining how much cell phone data you need it is important to consider which two of the following

1. How much data you currently use? 2. Do you use your phone to stream movies or TV?

Which of the following are true regarding IP addresses?

1. IP stands for Internet Protocol 2. If two laptops are connected to the same home network and surfing the web simultaneously, they share the same IP address. 3. In most home networks IP addresses are assigned by the Internet Service Provider.

Which of the following should be considered when using Twitter?

1. If you have a situation where a Twitter user has been blocked, but the situation escalates you can file a formal report through Twitter. 2. Most of the communication taking place on Twitter is viewable by everyone 3. Twitter accounts contain personal information

Which three of the following statements are true regarding troubleshooting network hardware issues?

1. If your network is not working it is a good idea to check the status of the indicator lights 2. Sometimes firmware updates can occur that can cause a network outage. If you experience trouble you may need to reboot the hardware device 3. A device that is not positioned properly can cause weak signals and system issues

Software theft occurs when someone engages in which three of the following?

1. Illegally copying a program (called piracy) 2. Stealing software programs 3. Illegally activating or registering a program

Open the tabs dialog and add a dashed tab leader to the text (option 3 in the Leader section of the Tab dialog)

1. In Home tab on click the paragraph launcher 2. Click the tab button and selection option 3

Which of the following statements are true about Instagram?

1. Instagram is a subsidiary of (is owned by) Facebook. 2. According to Instagram it is a "fun and quirky way to share your life with friends through a series of pictures." 3. It is a photo-sharing app that is available for download to a variety of devices including iPhones and Android.

Which three of the following are considerations for choosing fiber optic internet service?

1. Is it available? 2. Is the bandwidth necessary? 3. Is it affordable?

Which of the following statements are true about best practices when using LinkedIn?

1. It is important to use job/career specific keywords in your profile. This will help to attract recruiters to your page. 2. Use up-to-date information and images on LinkedIn.

Which three of the following statements are true about WANs?

1. Large organizations with many offices located across the globe often have individual LANs in each location that need to be connected in order to share data and information. 2. When two or more LANs have been connected using a public network a WAN or Wide Area Network is created. 3. The largest WAN on earth is the Internet.

Which of the following statements are true about LinkedIn?

1. LinkedIn is used for the exchange of contact information, knowledge/ideas, and for employment opportunities. 2. LinkedIn should be used as an integrated component of creating your professional brand identity.

Which two of the following are characteristics of fiber-optic lines?

1. Made of one or thousands of fibers 2. High-speed transmission

Change the right indent to be 0.3"

1. On home page click the paragraph dialogue launcher 2. select 0.3" on the right indent

Change the line spacing to be 1.5 spacing

1. On home tab in paragraph group click the line and paragraph spacing arrow 2. Select 1.5 spacing

Change the spacing before the paragraph to 12 pt. and the spacing after the paragraph to 12 pt

1. On home tab in paragraph group, click the line and paragraph spacing arrow 2. Click line spacing options 3. Go to spacing and put 12 pt before and 12 pt after paragraph 4. Click OK

Selecting the format painter, copy the formatting from the phrase no elevator access and apply the formatting to the word unable (it is in the last sentence of the second paragraph of the letter)

1. On home tab, in Clipboard 2. Click the format painter button 3. Click the word unable

Use the change case command to change the text from lowercase to all capital letters

1. On home tab, in font group click "Aa" 2. Select UPPERCASE

Change the font color of the selected text to the Red Standard color (the second option under Standard colors)

1. On home tab, in font group select font color picker 2. Go to Standard color 3. Select the Red Standard color (the second one)

Apply the italic character effect to the selected text

1. On home tab, in font group, select italics

Change the font size for the selected text to 11 pt

1. On home tab, in font group, select size text

Apply the bold character effect to the selected text

1. On home tab, in font group, select the bold

Apply the single underline character effect to the selected text

1. On home tab, in font group, select the single underline character

Open the Tabs dialog and set a left tab stop at .2"

1. On the Home tab, in the paragraph group click the dialog launcher 2. In the paragraph dialog box, click the tabs button 3. In the tab stop position box, type .2"

Remove the page numbers from the document

1. On the header and footer tools design tab, click the page number button and select remove page numbers

Change the selected text to the open circle bullet style

1. On the home page in the paragraph tab, select the bullet drop down arrow 2. Select the open circle bullet style

Display the task pane where you can view copied items and then paste them into a document

1. On the home tab, in the clipboard group, click the dialog launcher

Use the office Clipboard to paste the MediSport Clinic text to the document

1. On the home tab, in the clipboard group, click the dialog launcher 2. look for the MediSport Clinic text 3. Click on the arrow 4. Click paste

Use the navigation task pane to find all instances of the word flight in the document

1. On the home tab, in the editing group, click the find button 2. Type flight in the search document box

Apply a top border and bottom border to the first paragraph under executive summary (starts with "The MediSport clinic..."

1. On the home tab, in the paragraph group, click the borders button 2. Click bottom border 3. Click the borders button again 4. Click top border

Decrease the indent for the text by one level

1. On the home tab, in the paragraph group, click the decrease indent button

Which two of the following statements are true about development of the internet?

1. One of ARPAnet's challenges was to ensure that if individual computers or networks failed, the overall network would continue to operate 2. Paul Baran developed packet switching

Digital Identity

1. Online search activity 2. Purchasing behavior 3. Social media postings

Which three of the following statements are true regarding the history of the internet?

1. Packet switching allows a message to be divided into many packets rather than traveling on one phone circuit 2. ARPA hired MIT Professor J.C.R. Licklider to connect computer networks of four universities 3. ARPAnet was built to ensure that if individual networks or computers fail, ARPAnet would still be functional

Select which of the following are true about personal websites.

1. Personal websites include information about schools attended, jobs, and extracurricular activities. 2. A personal website is one of the most critical elements to building an awesome personal brand. 3. Personal websites are created as a means to showcase your skills and differentiate yourself from the competition.

Select all that apply According to the US Copyright Office, a copyright is a form of protection provided by the laws of the US for "original works of authorship" including which of the following?

1. Pictures 2. Music 3. Literary work

Genealogical DNA testing allows users to check their genetic backgrounds. Which of the following two are disadvantages associated with this testing?

1. Potential that your personal DNA data may be misused. 2. There is the potential for insurance companies to one day use this information to your disadvantage.

Select the characteristics of PayPal

1. Provides buyer protection against fraud 2. Free for the buyer to use

You should evaluate websites using which of the following criteria?

1. Reliability 2. Relevance 3. Validity

Use the right click method to correct the misspelling of the word control with the correction control. Do not open the spelling and grammar task pane

1. Right click and select spelling 2. Select the correct word

Select all that apply. Select three true statements about SEO

1. SEO helps to ensure that a website is known and reachable by search engines thus increasing the likelihood of more site hits 2. SEO is a set of strategies, techniques, and practices used to increase the amount of visitors to a specific website by getting a high ranking placement in the search engine 3 Studies show that 87% of web searches end at the first page of results, so a higher ranking page helps to get more website visitors

Select all that apply. An Internet search engine can perform which three of the following basic tasks?

1. Search the internet for information based on the search criteria entered by the user 2. Display the location of the information stored in the indexes 3. Create an indexing keywords that are found

Cut the selected text

1. Select the text 2. Press center on laptop pad 3. Select but button

Select all that apply Which three of the following statements are true about client/server networks?

1. Server-based models are popular because they provide more security than a peer-to-peer network 2. In this type of network when a client requests information or access to the internet that request is controlled by the server 3. Server-based networks are designed to have individuals computers and devices connected to the network interact through a central server computer

Select all that apply Copyright protection extends to things like images, music, and literary works. Copyright protection does not extend to which of the following?

1. Systems 2. Procedures 3. Processes

Select all that apply. Which of the following statements are true about search engine companies?

1. The information contained in a search engine database is determined by how each specific company records URL information 2. SEC stands for Search Engine Company 3. It is common practice for the website owner to submit their URL and associated information the the search engine company (SEC)

Which three of the following statements are true regarding packet switching?

1. The internet uses packet switching to transfer data and information between hosts 2. All packets are routed through a network based on the associated address information 3. Addressing information and data are included in each packet

Select all that apply Which of the following are considered intellectual property

1. Trade secrets 2. Patents 3. Trademarks

Select all that apply. If you are reading an article and are concerned that it may be biased in one way or another, which of the following are steps you can take to judge the author's objectivity

1. Try to be aware of all sides of any issue 2. Remember that bias is introduced into everything, even though it may be unintentional 3. When viewing a website, investigate the background and other writings of the author and the site

Select all that apply. Which two of the following statements are true using the Boolean operators?

1. Use "OR" when you are searching for documents including one or another of your search words 2. Use "NOT" if you want to exclude certain results from your search

Select what's true about using the Boolean operators "OR" and "NOT".

1. Use "OR" when you are searching for documents including one or another of your search words) 2. You can use /^ to execute an OR search 3. Use "NOT" if you want to exclude certain results from your search

Cable

1. Uses coaxial cable 2. Usually higher top speeds though often inconsistent 3. Often bundled with television

DSL

1. Uses existing phone lines as transmission medium 2. Speeds and bandwidths tend to be consistent 3. Often bundled with telephone service

Select all that apply Which three of the following statements are true regarding satellite internet service?

1. Uses microwaves to deliver service 2. Provides broadband service virtually anywhere 3. Customers usually purchase a data plan that limits uploading and downloading

Which two of the following statements are true regarding digital subscriber line (DSL) internet service

1. Uses telephone wires as transmission wires 2. Internet signal tends to be very consistent

Select all that apply Which three of the following statements are true regarding cable internet service?

1. Uses the same coaxial cable that brings the cable television signal 2. Usually has more bandwidth than DSL lines 3. Internet service can often be bundled with television service

Which three of the following is true regarding cable internet service?

1. Uses the same coaxial cable that brings the cable television signal 2. Usually has more bandwidth than DSL lines 3. Internet service can often be bundled with television service

Which of the following are examples of EFT transactions?

1. Using your debit card to purchase gas 2. Automated teller machine (ATM) withdrawal of cash to use to buy a concert ticket 3. Direct deposit of your papercheck

Select the characteristics of a modem.

1. Usually provided by the ISP 2. Converts analog signals into digital signals 3. Converts digital signals into analog signals

Which of the following have been cited as technological risk associated with playing computer games online?

1. Viruses, worms, and malware 2. Insecure or compromised game servers

Three common servers include:

1. Web server 2. File Servers 3. E-mail Servers

Which of the following statements are true about WhatsApp Messenger?

1. WhatsApp is a popular way to make phone calls and send text messages via mobile app. 2. WhatsApp has over 2 billion users worldwide.

Which two of the following are true regarding IP addresses

1. When You purchase your internet service from an ISP you receive the right to use their block of assigned addresses 2. IP Addresses are assigned by the Internet Corporation fro Assigned Names and Numbers (ICANN)

Select all that apply Which three of the following statements are true regarding how circuit switching works when you make a traditional land line based phone call?

1. When you pick up the receiver it creates an open connection to the local telephone switch 2. When you dial a number, then the switch connects to other switches along the public switched telephone network (PSTN). This forms a physical path between your phone and the person you are calling 3. When the call is received a circuit is established and will remain open for the entire length of your call. As long as the circuit remains open, no one else can use the telephone line

Internet Privacy

1. Who has access to data and information 2. How data and information is used 3. Techniques and technologies used to protect sensitive data and information

What is a business' brand identity derived from?

1. Who they want to be 2. Who people perceive them to be 3. Who they are

Which three of the following should be considered when choosing an internet service provider (ISP)

1. Will users be streaming data? 2. What ISP choices are available in my area? 3. How many users will be logged on my network at the same time?

Select all that apply. Which of the following should you consider when evaluating a website for research proposes?

1. You can find most of the information about a publisher by visiting the About Us, Corporate Profile, and Background sections of the site 2. If you are using a website for research purposes you should research the publisher's qualifications 3. Check to see the author's background, who published the authors work, and what is the relationship between the author and publisher

Select all that apply Which three of the following are the common reasons for purchasing broadband internet service?

1. You have several devices online at the same time 2. You want to stream music or video 3. You need relatively high-speed internet service

Select all that apply. If you wish to cite your sources, which of the following should you consider when evaluating a website for research use?

1. You should check to see what references are included on the site. Extensively documented references are a good sign that the site is using viable information 2. Check to see the author's background , who published the authors work, and what is the relationship between the author and publisher 3. If you are using blogs or wikis be aware that the author does not need to meet any qualification to post content

Select the statements that are true regarding IP addresses.

1. assigned to your home network by your ISP 2. means by which your network is identified by other servers and computers on the Internet 3. ISPs often have blocks of IP addresses that they assign as demanded

The Internet era use of emoticons can be traced to September _____, when computer scientist Scott Fahlman suggested to the Carnegie Mellon University message board that emoticons could be used to distinguish jokes from serious statements online.

1982

In an ergonomically correct workstation, your keyboard should be positioned to keep your wrists as straight as possible. Arms should be positioned at a __-degree angle.

45

BSA The Software alliance is headquartered in Washington, DC and operates in more than _____ countries.

60

The internet evolved from a Department of Defense funded project called ______ that attempted to link computers from four separate university networks

ARPAnet

The internet was based on a Department of Defense computer network called

ARPAnet

Which of the following HTML objects will find web pages with hyperlinks?

Anchor

Remote access connections must be secured using authentication and encryption software. ______ software confirms the identity of the user or computer system

Authentication

Select all that apply. You should evaluate websites based on which three of the following criteria?

Authenticity Bias Objectivity

A leading advocate against software piracy for the global software industry is ______ The Software Alliance.

BSA (Business Software Alliance)

Because it uses the same wire that carries television signals, you usually do not have a choice regarding the ______ internet service rovider uses in your neighborhood

Coaxial

SAGE was developed during the ______ war

Cold

Modem

Converts analog signals into digital signals, and digital signals into analog signals

What was the major questions that ARPAnet wanted to solve?

Could a network be built that would continue to work even if multiple parts of it collapsed?

Installing the printer is the third step in setting up a Wi-Fi network at home

False

International laws on internet privacy are very similar

False

Positioning both of your router's antennas horizontally will give you the best chance of a parallel match thus increasing your signal strength

False

Radio frequency identification (RFID) is a relatively inexpensive technology that requires direct line of sight scanning.

False

Some authors can write articles without introducing any personal bias

False

A ______ is a security system separating two networks or even computers on the same network

Firewall

The ______ lets computer users drag images and documents across their computer's monitor

Graphical user interface (GUI)

When you request information from a website such as Wikipedia, the way its server knows which router to send the requested information to is because your router is identified by its ______ address

IP

Do you understand the Digital Millennium Copyrights Act? The DMCA protects ______ from liability for copyright violations of its users

ISPs

MAC address

Identifies a device within a network

Initially used in e-mail, chat, and text messages as a form of informal correspondence, ______ acronyms are widely used today.

Internet

A virtual private ______ (VPN) creates a secure connection between two computers. VPNs allow for encrypted communications using the Internet as the pathway for data transmission and communication

Network

Information is transferred over the internet in small data groupings called ______

Packets

A particular file or server address on the World Wide Web is identified by its uniform ______ locator

Resource

For a network to connect to the internet, it must use the ______ suite of protocols

Transmission control protocol/internet protocol (TCP/IP)

The central controlling agency of the internet is :

Trick question--The internet has no central controlling agency

The capacity of a particular transmission medium is called its ______

bandwidth

The volume of data that can be carried on an internet transmission media in an amount of time is called ______

bandwidth

Software applications that allow users to access the surf the World Wide Web are called:

browsers

A computer that request resources such as a web page, spreadsheet, image file, or services from another computer on a network is called a ______

client

A ______ name, such as reddit.com, specifies the server or servers supporting a website

domain

TLD refers to the highest level in the ______ name hierarchy

domain

Transferring a file from the Internet to your digital device is called _____.

downloading

Although it sounds ironic, searching the

internet is usually an efficient way to find an ISP in your area

A group of two or more devices/computers connected together to allow for the exchange and information and for the sharing of resources such as printers is called a ______

network

The network portion of an IP address which is also called ______ identifier is indicated by a certain number of bits, starting with the left-most bit

network

The concept that Internet Service Providers (ISPs) permit data to be transmitted and accessed without regard to the data's content or amount of bandwidth required to transmit the data is known as net ______

neutrality

Instagram is generally considered a ______-sharing ap

photo

Software, such as Java Runtime or JavaScript, adds functionality to your browser. These types of software are called ______-ins.

plug-ins

To adjust your privacy settings in Facebook, make sure you are logged in, then click on your ______ to access the security settings.

settings

The practice of using social media to expand the number of business and contacts people have is called ______ networking.

social

US-CERT classifies the risks of online computer gaming into two categories: Technological risks and ______ risks

social

Gaming and ______ (watching videos or listening to music) take more bandwidth and require higher downloading speeds

streaming

To transmit large files from one server to another over the internet, many use the File _______ protocol

transfer


Kaugnay na mga set ng pag-aaral

Pharmacology ATI Study questions part 1

View Set

Acute Respiratory Distress Syndrome

View Set

Lesson 1-2 What is Computer Hardware

View Set

Driver Errors in Oregon Traffic Crashes

View Set

Final Exam Review ECONS 320 Money and Banking

View Set

ch.4: linux file system mangement

View Set