CSC Chapters 8-9
3G and 4G networks were developed by the computer industry as part of the fiber-optic Internet backbone.
FALSE
Because of its centralized design, the Internet can withstand most attacks.
FALSE
By definition, a computer network must be connected to the Internet.
FALSE
It's never a good idea to allow your browser to accept cookies from shopping sites because the security risks posed by cookies far outweigh any possible benefits.
FALSE
Most wireless computer networks today use infrared signals to transmit data.
FALSE
Net neutrality is pretty much guaranteed in the future because of the way the Internet was designed.
FALSE
Streaming video is distinguished from downloadable video by the fact that it is always real time—that is, it presents events as they happen.
FALSE
The TCP/IP protocols at the heart of the Internet were developed by IBM, but the company freely licenses the technology to many other companies.
FALSE
The term Internet is derived from inner net, a phrase computer scientists coined to describe the highly centralized, hierarchical structure that defines the Internet.
FALSE
The words in a domain name, unlike the lines in a post office address, are arranged hierarchically from big to little.
FALSE
. When a digital music file is sent on the Internet, it is broken into packets that travel independently to the designated destination.
TRUE
A single fiber-optic cable has the bandwidth of thousands of copper telephone cables.
TRUE
Almost every Web address begins with http://, but many browsers don't require you to type that prefix.
TRUE
Because peer-to-peer networking software is built into the Windows and Macintosh operating systems, a modern desktop computer can act as both client and server on a network.
TRUE
Depending on your email client program and your preferences, your mail might be stored on a remote host or downloaded and stored on your local machine.
TRUE
Email and instant messaging can filter out many human components of communication, increasing the chance of misinterpreted messages.
TRUE
Simple technological solutions can reduce, but not eliminate, the spam problem for email users.
TRUE
The line that separates computer communication and telephone communication is being blurred by devices and technologies that operate in both realms.
TRUE
The most common types of networks today use a standard networking architecture known as Ethernet.
TRUE
Web 2.0 is the term commonly applied to Web sites that depend on content provided by visitors through wikis, forums, podcasts, blogs, and other types of media and information sharing.
TRUE
What is an important difference between Internet newsgroups and mailing lists? a. A mailing list message goes to only a specific group of people, whereas a newsgroup message is available for anyone to see. b. A mailing list message is posted via email, whereas a newsgroup message requires special posting software. c. A mailing list message is posted to a special Web mailbox, whereas a newsgroup message is delivered directly to group members' mailboxes. d. All of the above are true. e. There are no significant differences between the two.
a. A mailing list message goes to only a specific group of people, whereas a newsgroup message is available for anyone to see.
An online shopping catalog for a large outdoor outfitter is almost certainly a. a data-driven Web site that separates site content from design. b. carefully hand-coded in pure HTML to minimize errors. c. designed to work without cookies. d. limited to work with a single type of Web browser for consistency. e. All of the above
a. a data-driven Web site that separates site content from design.
Today's email system is built on protocols that a. don't ensure that each sender has a verifiable identity. b. automatically filter spam based on objectionable content. c. can be modified by anyone with systems administration clearance. d. apply directly to instant messaging systems. e. All of the above
a. don't ensure that each sender has a verifiable identity.
If you want to share a document with other people whose computers are connected to your LAN, you should upload the document to a(n) a. file server. b. client server. c. print server. d. document server. e. upload server.
a. file server.
The first Web pages were a. strictly hypertext with no multimedia content. b. designed to simulate printed pages using HTML's table tools. c. the first true multimedia documents to be published on the Internet. d. viewable only with proprietary Microsoft software. e. sent via email from Doug Engelbart's office on the Stanford campus.
a. strictly hypertext with no multimedia content.
Which of the following is a form of push technology? a. Writing and posting a Wikipedia article. b. Having Facebook notify you on your smart phone when you receive a new message from a friend. c. Watching a streaming video on Hulu or Netflix. d. Designing a Web page using Cascading Style Sheets. e. Searching YouTube for a political video.
b. Having Facebook notify you on your smart phone when you receive a new message from a friend.
Which of these is a generally accepted rule of netiquette? a. Sending a message to ten thousand members of a worldwide society of birdwatchers inviting them to your local club's weekly outing b. Lurking in a hang-glider enthusiasts newsgroup without posting any messages c. Quickly posting on a DJ newsgroup 15 "help me" beginner questions about the second-hand turntables you just bought without manuals d. Responding to an antiwar group email with a heated message that attacks the personal integrity of the sender e. Sending 36 unsolicited high-resolution family photos to everyone on your list of email friends
b. Lurking in a hang-glider enthusiasts newsgroup without posting any messages
The Internet will change drastically in the next decade, but what is the one thing that is likely to remain relatively unchanged? a. The dominance of HTML as a Web page creation language b. The metaphor of the page as the container of Internet information c. The TCP/IP protocol that's used to send and receive Internet messages d. The ownership of the Internet by IBM e. The percentage of non-U.S. Internet users
b. The metaphor of the page as the container of Internet information
Internet addiction a. is fiction. b. has been linked to suicides. c. is virtually unheard of outside the United States. d. is caused by a rare type of computer virus. e. was first diagnosed at the end of World War II.
b. has been linked to suicides.
Many experts say we're at the beginning of a revolution that is creating a vast grassroots network of public and private wireless hubs based on a. 3G technology. b. mesh network technology. c. Wi-Fi technology. d. Bluetooth technology. e. Ethernet technology.
c. Wi-Fi technology.
A modem a. allows a computer to communicate with its peripherals, such as printers and scanners. b. increases the speed with which a computer can communicate over a phone line. c. converts a digital signal into an analog signal and vice versa. d. allows a Windows PC to run Macintosh applications. e. performs the same functions as an Ethernet port, except faster.
c. converts a digital signal into an analog signal and vice versa.
A 4G network a. can transmit four gigabytes of data every second. b. is so named because it can support 4 Internet-ready gadgets at a time. c. is based on fourth-generation wireless phone network technology. d. only works with 4G or later laptops and smart phones. e. can transmit data in four directions simultaneously.
c. is based on fourth-generation wireless phone network technology.
Cookies are commonly used by Web sites a. to attract visitors from search engines. b. to prevent viruses from spreading. c. to personalize visitor experiences. d. for animation. e. as components in Cascading Style Sheets.
c. to personalize visitor experiences.
If you're trying to look at a popular Web video clip but your browser can't play that type of video, a. you'll have to switch to another type of browser that does recognize the clip. b. you'll need to try another Web site that shows an alternate version of the clip. c. your browser might be able to play the clip if you install a plug-in. d. the site was probably designed using the original version of HTML, which doesn't work with many browsers today. e. you are almost certainly trying to watch a video that has copyright protection encryption.
c. your browser might be able to play the clip if you install a plug-in.
Which of these domains is restricted to qualified organizations? a. .com b. .org c. .net d. .edu e. None are restricted; anyone can have a URL in any of these domains.
d. .edu
Computer networks a. allow people to share hardware resources. b. makes it easier for people to share data. c. support collaboration through tools, such as email and instant messaging. d. All of the above e. None of the above
d. All of the above
What is a service that connects computers and peripherals in the same building called? a. Connection area network (CAN) b. Room area network (RAN) c. Building area network (BAN) d. Local area network (LAN) e. Small area network (SAN)
d. Local area network (LAN)
What is the main difference between instant messaging (IM) and email? a. The use of moderated groups for IM. b. The ability of email to handle real-time communication. c. The GUI of the IM client software. d. The asynchronous nature of email communication. e. There are no significant differences between the two.
d. The asynchronous nature of email communication.
Which of the following does not affect bandwidth? a. The amount of network traffic b. The software protocols of the network c. The type of network connection d. The type of information being transmitted e. The physical media that make up the network
d. The type of information being transmitted
What is the most common reason for installing a Wi-Fi hub in a home? a. To enable a PC to connect to a cell phone b. To make client/server computing possible c. To make it possible to connect Bluetooth-enabled devices to a network d. To allow PCs to connect to a network without wires e. To create a wireless alterative to hi-fi home entertainment systems
d. To allow PCs to connect to a network without wires
The Internet was originally a. a LAN at MIT. b. a code-cracking network during World War II by the U.S. Defense Department. c. a few dozen Web sites with very few pictures and no video. d. a small experimental research network called ARPANET. e. an idea taken from an early episode of Star Trek.
d. a small experimental research network called ARPANET.
Which of these services would you probably not be able to get from a typical Internet service provider (ISP)? a. An email address b. Space on a Web server c. A connection to the Internet d. Technical help e. A unique top-level domain name
e. A unique top-level domain name
Specialized servers are used on the Internet to a. function like email post offices. b. accept FTP requests to upload and download files. c. store applications that are rented or leased by large corporations. d. store and send Web pages. e. All of the above
e. All of the above
The number of email messages delivered each day far exceeds the number of letters delivered by the U.S. Postal Service. Why? a. You can write and send an email faster than you can write and mail a letter. b. Email is delivered more rapidly c. Email facilitates group communication. d. Email can save money. e. All of the above
e. All of the above
Which country attempts to limit its residents' access to certain types of Web content? a. The U.S. b. Cuba c. The People's Republic of China d. Saudi Arabia e. All of the above
e. All of the above
What should people who use a public hotspot be aware of? a. There is no such thing as free access to the Internet. b. Wireless connections cannot be used to surf the Web. c. A notebook computer must be plugged into a power source in order to connect to the network. d. Exposure to radio waves is harmful to pregnant women. e. Data transmitted over networks without WEP key encryption can be viewed by malicious eavesdroppers.
e. Data transmitted over networks without WEP key encryption can be viewed by malicious eavesdroppers.
What percentage of email messages is junk email (spam)? a. Less than 10 percent b. About 20 percent c. About 30 percent d. About 40 percent e. More than 50 percent
e. More than 50 percent
According to U.S. law, information posted on a Web forum or blog by a child a. must self-destruct after one week. b. cannot be reproduced in any form without permission. c. cannot contain cookies. d. cannot be viewed outside of the U.S. e. None of the above
e. None of the above
Where is the Internet's central hub and control center located? a. Near Washington, D.C. b. Near the Microsoft campus in Redmond, Washington c. In a top-secret location d. In Silicon Valley e. Nowhere; the Internet has no central hub
e. Nowhere; the Internet has no central hub
Web 2.0 is a. the Web interface for Internet2. b. built using HTML 2.0. c. the version of the Web designed for phones and other portable devices. d. approximately twice as fast at loading pages as Web 1.0. e. the general concept of Web sites that are built out of user-contributed content.
e. the general concept of Web sites that are built out of user-contributed content.