IST 101 Final Review
Which of the following is a restricted TLD? .biz .com .net .edu
.edu
ARPANET, the original Internet, had only ________ nodes. 2 10 4 6
4
Which of the following is NOT true about a P2P network? The connected computers belong to a workgroup. A network operating system (NOS) is required. They are easy to set up. They allow file sharing.
A network operating system (NOS) is required.
Which of the following is NOT a Boolean operator that can be used to search the web? AND OR BUT NOT
BUT
You would use FTP to ________. surf the web log in to a secure webpage verify an email address transfer files
transfer files
The original Internet ________. was invented by Tim Berners-Lee had only two nodes was called ARPANET came into existence in 1990
was called ARPANET
On a Windows PC, you will have to set up a ________ in order to share resources with a computer running Mac OS X. mapped drive homegroup workgroup library
workgroup
To resolve the domain name amazon.com to an IP address would require the use of the ________ protocol. DNS SMTP DHCP FTP
DNS
If you use satellite Internet access, you can expect the speed to be comparable to those of a ________ connection. DSL dial-up cable Internet access FTTH
DSL
Google's free online storage is called Google ________. Chrome Drive Play Earth
Drive
________ is an example of asynchronous communication. Email Chat Skype VoIP
________ is a service that allows Apple users to place video phone calls to other users. iMessage Google Voice FaceTime iChat
FaceTime
Which of the following is NOT a common LAN topology? Star Hierarchical Bus Ring
Hierarchical
Which organization is responsible for coordinating the Internet naming system? WWW FCC W3C ICANN
ICANN
198.168.0.1 is an example of a(n) ________. IP address domain name DNS protocol
IP address
Which of the following is a method of synchronous online communication? Email Instant Messaging Newsgroup Forum
Instant Messaging
________ is the most commonly used web browser. Firefox Thunderbird Chrome Internet Explorer
Internet Explorer
Which of the following is NOT an IM service? Skype iMessage LinkedIn AIM
Which of the following protocols is used for receiving email? POP HTTP SMTP DNS
POP
Which of the following statements about P2P networks is FALSE? The services and security are centralized. They can share a printer. They can only support a small number of devices. All computers are considered equals.
The services and security are centralized.
Which of the following is NOT a web browser? Chrome Opera Safari Thunderbird
Thunderbird
________ is the father of the hypertext system known as the World Wide Web. Marc Andreessen Tim Berners-Lee Bill Gates Steve Jobs
Tim Berners-Lee
Which of the following is NOT used to transmit signals on a network? Twisted-pair Topology Wi-Fi Fiber-optic
Topology
Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established. WLAN LAN PAN VPN
VPN
A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices. WAN MAN WLAN PAN
WAN
In a WLAN, devices are connected by ________. RFID Bluetooth Wi-Fi ultraviolet
Wi-Fi
Which of the following statements about cable Internet access is TRUE? It is universally available. It is slower than dial-up. Speeds range from 1 Kbps to 100 Kbps. You share the bandwidth with your neighbors.
You share the bandwidth with your neighbors.
________ is an example of a social sharing site where anyone can share video that they create. Skype Flickr MySpace YouTube
YouTube
You would install a(n) ________ if you wanted to block ads from appearing in your web browser. add-on taskbar toolbar plug-in
add-on
A moderated chat room ensures that ________. all content is screened parental controls are in effect no one under the age of 18 is online only subscribers participate
all content is screened
Network speeds are measured in ________ per second. bits hertz nanos bytes
bits
When you set up a new email account, you may have to enter a distorted series of letters and numbers, called a ________, to ensure that you are a human and not a computer. verification signature password captcha
captcha
Which of the following is the search term to find information about Chevrolet vehicles excluding the Corvette model? chevrolet NOT corvette chevrolet OR corvette chevrolet AND corvette chevrolet BUT corvette
chevrolet NOT corvette
A ________ network is one that has at least one computer at its center that provides centralized management, resources, and security. peer-to-peer client-server workgroup homegroup
client-server
The least expensive form of Internet connection is usually ________. dial-up cable FTTH DSL
dial-up
All of the information that someone can find out about you by searching the web is called your ________. folksonomy tagged information digital footprint avatar
digital footprint
A ________ is a network composed of a group of clients and servers under the control of one central security database. protocol workgroup homegroup domain
domain
In the URL http://www.irs.gov, irs is the ________. TLD subdomain domain name protocol
domain name
One of the most popular C2C websites is ________. PayPal Amazon eBay Google Checkout
eBay
A ________ can be set by an employer to prevent you from accessing eBay. wireless access point router firewall switch
firewall
A ________ can be used to block unauthorized access to a network. switch firewall hub filter
firewall
You would most likely find a P2P network in a(n) ________. university home library corporation
home
The tools that enable users to create user-generated content, connect, network, and share are called social ________. channels media methods connections
media
If you would like to get a security report about a website, you can click on the ________ icon when it is available. padlock star gear question mark
padlock
In a ________ network, each computer is considered equal. wide area virtual private client-server peer-to-peer
peer-to-peer
You are ________ when you decide to use your neighbor's open wireless network without their permission. wardriving trolling hacking piggybacking
piggybacking
A third-party program, such as Adobe Flash Player, is considered to be a(n) ________. toolbar tab plug-in add-on
plug-in
In the URL http://www.irs.gov, http is the ________. subdomain protocol domain name TLD
protocol
The rules for communication between devices are called ________. protocols stacks packets queues
protocols
Podcasts allow time ________, which means that you can listen on your own schedule. delay shifting warping lagging
shifting
An email ________ is a block of text that is automatically put at the end of your messages. salutation signature identifier closing
signature
________ communication allows you to send a message to someone who is not online at the same time. Dynamic Synchronous Static Asynchronous
Asynchronous
Services that one business provides for another are called ________. B2C B2B C2C C2B
B2B
When you buy a textbook online from Amazon.com, you are participating in ________ e-commerce. B2B A2C C2A B2C
B2C
When you are sending one email to all of your friends in your address book, you should use the ________ field to keep their addresses private. Cc: Bcc: Pcc: To:
Bcc:
In a PAN, devices are connected by ________. ultraviolet infrared Bluetooth RFID
Bluetooth
For which of the following uses was the Internet2 NOT designed? Research Collaboration Education Business
Business
Which of the following is an example of a social bookmarking site? Delicious Wikipedia Facebook Twitter
Delicious
The Internet was originally created as a communication system for the ________. Department of Defense University System U.S. Congress Department of Education
Department of Defense
Wi-Fi networks used in homes and public hotspots use the ________. W3C standards POP protocols IEEE 802.11 standards SMTP protocols
IEEE 802.11 standards
Which of the following statements about email is FALSE? It cannot be accessed by hackers. Email can be used for targeted marketing. Your employer may read your email at your work. Copies of your email may exist on several servers even after the recipient deletes it.
It cannot be accessed by hackers.
For a company that uses only two floors of an office building, all of the company's computers and printers will be connected by a ________. PAN MAN WAN LAN
LAN
Which of the following could become a member of the Internet2? Amazon Facebook CNN Library of Congress
Library of Congress
________ is a business-centered social network that is designed for business connections. Facebook Yahoo! LinkedIn Twitter
The first point-and-click graphical web browser was ________, which later became Netscape. Mosaic Internet Explorer Safari Chrome
Mosaic
________ recommends music to you based on your listening preferences. Pandora Picasa Flickr SnapDragon
Pandora
Which of the following was NOT one of the nodes on the original Internet system? Stanford Research Institute (SRI) Princeton University of Utah in Salt Lake City University of California, Santa Barbara (UCSB)
Princeton
A(n) ________ feed keeps you updated on podcasts and news feeds to which you have subscribed. DNS RSS NSS PSS
RSS
The practice of using social media to sell services is called ________. RSS SSL SMM SMS
SMM
Which of the following protocols is used for sending email? SMTP HTTP FTP POP
SMTP
________ is the most popular browser for Macs. Firefox Chrome Opera Safari
Safari
If you have a summer cabin in the mountains, which broadband service are you likely to use? DSL Satellite Fiber Cable
Satellite
________ is an example of a microblogging site that allows a limited number of characters in a post. Tumblr Flickr The Blogosphere Blogger
Tumblr
A ________ is similar to an online journal, in which you can write about anything you want to share. bulletin chronicle log blog
blog
A corporation would want to utilize a ________ network. workgroup peer-to-peer client-server homegroup
client-server
Wikis are designed for ________, allowing people to contribute more than just posting a response. collaboration expert opinions asynchronous communication synchronous communication
collaboration
When you trust the collective opinion of a crowd of people rather than an expert, it is known as ________. crowdsourcing crowdreferencing crowdsampling crowdresourcing
crowdsourcing
A ________ is a device that connects two or more networks together. hub switch router modem
router
If you want to connect your home network to the Internet, you will need a ________ in addition to a modem. router switch terminator repeater
router
Email sends electronic messages using ________ technology. store-and-forward get-and-put push-and-pull forward-and-push
store-and-forward
When data packets travel within a network, a ________ is used to get the data packets to the correct port. bus repeater switch router
switch
One benefit of using a fiber optic backbone for the Internet2 is that ________. all computers have the wiring to accept fiber optic signals the data is less prone to corruption it is easier to install it is less expensive to install
the data is less prone to corruption
A conversation that takes place on a discussion board is called a ________. dialog post thread debate
thread
Moving through a neighborhood trying to locate open wireless access points is called ________. wardriving trolling hacking surfing
wardriving
Programs that interpret HTML to display a webpage are called ________. web browsers interpreters compilers translators
web browsers
________ e-commerce allows anyone to sell or trade your items online. C2C C2B B2B B2C
C2C
________-based chats require you to install specific software in order to access them. Server User Web Client
Client
One of the most important reasons for Ethernet standards is they ________. assure equipment from different manufacturers is compatible prevent overburdening your computer can prevent unauthorized users from accessing the Internet allow the government to keep tabs on what you are doing
assure equipment from different manufacturers is compatible
In a virtual community, you can communicate with other people by using a(n) ________. captcha alias profile avatar
avatar