Networks and the Internet unit test ******
Which of the following applies to a trademark?
belongs to just one company or organization
A _____ is a hacker who criminally breaches the security of a computer or network.
black hat
Which of the following accurately completes this sentence. (choose all that apply) Online predators ____.
can go to jail if caught try to befriend young people
In a network, servers receive requests from which of the following?
clients, which are the networked computers that request data.
lets people access their stored data from a device that can access the Internet.
cloud computing
Which of these improved the ability to send information over the network in the 1970s?
ethernet
What is the term for the exception to copyright that allows you to use copyrighted work without permission?
fair use
WANs are
networks that cover a large geographic area
Computer viruses are:
unwanted programs that may harm the computer.
The person responsible for the creation of the group known as ICANN is
vinton cerf
Select the problem-solving strategies a network administrator is likely to use. Check all of the boxes that apply.
try things that have worked before check the manuals ask others who might know what the problem is
How are computers connected to one another?
through networks
A hierarchical addressing scheme is used
to identify computers on the network.
Data is either sent one piece at a time over the wire (serial) or many different wires carry parts of the same transmission(parallel):
transmission types
What US agency originally started ARPANET?
Department of Advanced Research Projects Agency
LANs are
short ranged networks that increase speed of the network
Who came up with the idea for hypertex?
Tim Berners-Lee
WAN stands for
Wide Area Network.
A ______ connects many different Ethernet devices and forwards packets to all connected devices.
hub
Information or devices that can be accessed remotely from another computer:
shared resources
Which of the following statements describes patches?
They solve problems with software or security.
You would like to share information you found on a website. (select all that apply) You should:
give credit to the source of the information on the website. check to be sure this information is reliable and accurate.
The TCP/IP protocol was invented by
robert kahn and vinton cerf
Equipment that directs data to the right location:
router
The first network was called
ARPANET
Jeanne writes a song, and Raul wants to perform it. What should Raul do?
Ask Jeanne for permission to use her song in the show.
Which explanation best explains the importance of using encryption?
Encryption protects sensitive information.
Which of the following is the most reliable way to check the accuracy of a website?
Examine the sources cited by the website.
If you wanted to use information you found on a website, how could you do that in an ethical way? (select all that apply)
Give credit to the person or organization responsible for the site. Cite your sources.
One of the biggest changes to the usability of the Internet for people was the ability to use an easy way to remember site addresses. Which of the following was responsible for this?
ICANN
A unique location for a computer on the network:
IP address
Which outcome is one of the negative consequences of anonymous communication over the Internet?
It can lead to harassment and bullying.
Which of the following are disadvantages of networks? Check all of the boxes that apply.
Network intruders can access all computers on a network. Networks are costly to set up
Which of the following is a trend in Internet computing?
People are using a greater number and variety of apps to help them do everyday things.
What best describes the difference between plagiarism and fair use?
Plagiarism is copying material without crediting the source, while fair use is a limited, nonprofit use.
What was the original intention for the creation of ARPANET?
Scientists could share information and collaborate.
Which of the following statements are true of network packets? Check all of the boxes that apply.
They contain control information. They contain user data. They are sent over a network.
Which of the following statements describes the way networks are set up?
WANs are made up of LANs.
Which of the following statements is true of WANs?
WANs can be as big as the Internet.
The trademarked name of the accepted standard for configuring wireless networks is .
WiFi
What is the name of the type of connection standard used in wireless networking?
WiFi
What does WLAN stand for?
Wireless Local Area Network
What does the URL ending .com mean?
a business website
A client is
a computer that requests a service.
Which of the following does cloud computing allow users to do? Check all of the boxes that apply.
access data from anywhere with the Internet connection store pictures and music store data
Which of the following is an example of a payload?
an email message
A future trend of data storage is sure to be
an increase in cloud computing
How fast data travels on the network:
bandwith
The maximum data transfer rate, or capacity, of a network or Internet connection:
bandwith
A network technology with a higher bandwidth than older technologies is called
broadband
Troubleshooting is
the act of trying to fix what is wrong in a system.
Which is the best definition of a network?
computers and hardware connected so that they can share data
Telecommunications networks include _________ within an organization.
computers and telephones
The network backbone
connects routers to more efficiently route data.
Cloud computing helps to address
data storage problems
Routers know where to send a network packet because they read the _______ contained in the packet. The ________ is the information that a user wants to send. A(n) ________ is an example of a payload.
control information payload email message
A network packet contains two kinds of information. What are they?
control information and user data
Workplace ethics include
doing the work you have agreed to do while at work.
Ethics is a way of behaving so that you are
doing what is right
File sharing is a way for people to
download entire books
Check all of the improvements and inventions of the 1970s.
e-mail hardware improvements improved data transmissions
The ability of a network to recover after any type of failure:
fault tolerence
Part of the network that allows communication with other networks
gateway
Around the world, all the laws governing behavior on the Internet are
hard to enforce.
The physical equipment
hardware
What do network operating systems use? Check all of the boxes that apply.
hardware software
If someone gets on the network who is not authorized to have access,
he can steal people's information. He can do damage to the network. he can make the network crash.
Which two factors most influenced the growth of the Internet during the 1970s?
increase in the power of computer hardware and increased funding from the National Science Foundation
Local Area Networks (LANs) _________.
increase networking speed
DARPA was created to:
investigate technologies for the military in the US.
The letters LAN stand for ______ Area Network.
local
Which of the following is a current development in networking?
need for better data storage
The way the network is laid out, including all the interconnections:
network topology
Windows, Apple's Mac OS, and Unix/Linux are just some of the most common
operating systems that can network.
Which of the following activities have been made possible because of improvements in computer networks? Check all of the boxes that apply.
organizing the storage of data accessing the Internet at the same time as other users
Who did the IAB ask for ideas about how people should behave on the Internet?
other users
A type of network that does not use a router but shares data directly between computers:
peer to peer
P2P stands for
peer to peer
Cloud computing allows:
people to access information and applications from a web browser.
Trademark and copyright were first established so that
people's intellectual property would be protected
Which of the following uses of the Internet is unethical?
purchasing vacation flights online during work hours
A network that only people who have the right credentials can access
secured network
Wikis are
sites that allow for collaboration between many people
Mobile technologies access the network and are recent inventions. What are mobile technologies? (select all that apply)
smartphones laptops tablets netbooks
The programs used to run the network
software
Software as a Service (SaaS) allows users to remotely access which of the following? Check all of the boxes that apply.
software data applications
The program that allows jobs like printing to be saved until the printer is ready for the next job:
spooler
When all computers in a network are connected in a "star" formation:
star topology
What type of connection did networks use to communicate in the 1960s?
telephone
The first idea for a communications network was called:
the galactic network
What is an easy way to cut down on spam?
turn on the spam filter in your e-mail
A network that anyone can access
unsecured network
What is spam? (select all that apply)
unwanted communication can be inappropriate or harmful
Integrated Services Digital Network (ISDN) is the digital transmission that allows which of the following services? Check all of the boxes that apply.
voice television Internet mobile phones
You found something on the Internet about a topic for a paper. Which of the following are efficient ways to use the Internet? Check all of the boxes that apply.
Check to see if this information is reliable. Think critically about what you found to see if it makes sense based on your prior knowledge. Make sure that the Internet is the best place to be doing research of this type.
Which of the following are ways to avoid computer viruses? (choose all that apply)
Do not open e-mail attachments from strangers. Do not share personal information with people you do not know. Install security updates on a regular basis
Which of the following is used for security? Check all of the boxes that apply.
Firewall antivirus programs network backups
Which of the following statements describes antivirus software?
It identifies and removes viruses in computers.
Which of the following statements is true of a hierarchical addressing scheme? Check all of the boxes that apply.
It includes different parts that represent the location of a computer or device on a network. It is used for IP addresses.
Why is the access date important to include when citing a website? (select all that apply)
It indicates websites changes. It indicates website accessibility changes.
Identify the disadvantages with wireless. Check all of the boxes that apply.
It is easier for unwanted intruders to access the network. The network takes some expertise to set up Interference can change how well devices connect.
Use of the Internet for e-government has increased. Identify the benefits by checking all of the boxes that apply.
It keeps the public informed about events in the town. People can pay bills. The government can share important information about issues with the people in that town
Which of the following statements describe encryption? Check all of the boxes that apply.
It turns data into cipher text. It makes data unreadable without a decryption It helps secure data. key.
Which best describes the significance of ARPANET?
It was the first WAN.
Who first thought of the "galactic network?"
J. C. R. Licklider
Which of the following statements describe network backups? Check all of the boxes that apply.
Network backups help secure networks against failure. Network backups are usually done nightly.
Which of the following statements best describes network security?
Network security protects individuals' privacy.
How can people check whether information they found on the Internet is reliable?
People can determine if what they read agrees with other information they know is true.
Which of the following statements is true of hackers? Check all of the boxes that apply.
Some hackers are criminals. Some hackers do it as a form of protest. Some hackers are network security professionals who want to improve the security of a network by identifying flaws.
What helps you evaluate websites for reliable information? (select all that apply)
The information you found is repeated or agrees with what you already know to be true. The domain name ending indicates the website is reliable (.gov, for example).
The agency that started ARPANET was looking for technologies that could be used by
The military
Which of the following are security dangers to using the Internet at work? Check all of the boxes that apply.
There is greater potential for data loss. Security breaches can occur. Viruses can get into the network.
Which of the following statements describe cookies? Check all of the boxes that apply.
They can be removed from a computer. They are mostly harmless and useful.
Which of the following statements describe computer firewalls? Check all of the boxes that apply.
They check incoming packets to make sure that they have the right credentials. They check the behaviors of packets.
Which of the following are true of trademarks? Check all of the boxes that apply.
They protect logos. They show who the maker of the item is. They can be registered with the government.
Why has e-commerce expanded?
Users can trust the site with personal information.
Intellectual property issues cover many different types of creations. Which of the following are intellectual property? Check all of the boxes that apply.
a newspaper a student's diary the script of a play a painting hanging in a museum
Select the item in the drop-down menu that best describes social networking:
allows users to find others with similar interests
What are some current and future trends for network technology? Check all of the boxes that apply.
an increase in the number and types of devices an increase in the number and types of applications an increase in the use of the cloud
A wireless mobile device is set up so that it can receive a signal
anywhere its service broadcasts and it can receive a signal.
______ are programs that help people work and play online.
applications
What is missing in this list of information needed to cite a journal article? Title, journal title, edition, volume number, date, page numbers
author's name
What increases efficiency when using the Internet? Check all of the boxes that apply.
being prepared for a search looking to see that the information is reliable using the browser's "bookmark" tool
Which behaviors should be avoided because they are wrong or illegal?
changing other people's files without permission
What is missing in this list of information needed to cite a book? Author, title, date, publisher
city and state where it was published
Computer that uses the service provided by a server:
client
Which of the following is plagiarism?
copying a story from a book and then turning it in as your own creation
What is software piracy? Check all of the boxes that apply.
copying computer software or programs illegally making lots of copies and sharing with friends breaking the security on software so it can be used illegally
What does network administration normally include? Check all of the boxes that apply.
design of the network security for the network documentation identifying and fixing issues
What are some benefits of the Internet? (select all that apply)
ease of communication e-mail collaboration
Copyright protects the rights of the author of a book
for the life of the author plus seventy years
Which of the following is the most common cause of network failure?
human error
Two of the computers at work suddenly can't go online or print over the network. The computers may be trying to share the same IP address.
logging off one of the computers, and then logging back on
Everyone wants to avoid online predators. One good way to protect oneself is to
never give out personal information to people you have met online
Which of the following devices can be connected to a network? Check all of the boxes that apply.
printers smartphones laptops tablet computers
Identify the examples of ethical behavior. (select all that apply)
quoting a website's information and citing the source making sure that the information is accurate
Routes data where it is meant to go
router
The network backbone is not directly connected to computers. Instead, data goes through the______ first.
router
Creative Commons allows creators of intellectual property to
say how others can use their work.
Which of the following best describes the path of a network packet on the Internet?
sender, router 1, router 2, router 3, receiver
Creative Commons allows the creator of an artistic work to
share the work in the way she chooses to
Which of the following are items that are concerns for e-government? Check all of the boxes that apply.
sharing information with people sharing trustworthy information keeping personal information safe
Government agencies work to catch people who engage in software piracy, and_______ can also help to stop them by filing lawsuits.
software producers
Software piracy occurs when
someone steals software.
Which of the following is an unethical use of the Internet?
spreading rumors or gossip about people
A ______ connects network devices or different parts of a network and forwards messages to specific recipients.
switch
Select the best answer to the question: Which of the following best describes e-commerce?
the ability to do business online
Network administration is concerned with which tasks?
the installation and maintenance of network hardware and software
Which of the following are goals of e-government? Check all of the boxes that apply.
to have a secure website to be able to protect the personal information of the people who use the site to make information about the government available
A router sends data
to the correct computer. where it should go. based on the data's destination.
Which of the following is an example of intellectual property?
when you create a drawing based on something from your own imagination
When data is transmitted wirelessly, the computer needs_____ in order to receive it.
wireless access technology
What is the main benefit of a Wiki website?
collaborative content authoring
Which of the following protects intellectual property?
copyright
Intellectual property can be defined as
creations made from peoples imagination
Text within a document that is linked to other information available to the reader:
hypertext
The order in which certain jobs, such as print jobs, are received:
queue
Which device is used to direct the flow of data on a computer network?
router
Rules for how routers communicate with one another and send data:
router protocols
What was the original reason for the creation of ARPANET?
scientists and researchers could communicate and share information
The computer that responds to requests from the client computer:
server
What does e-commerce allow people to do? Check all of the boxes that apply.
shop online securely order items on the Internet set up an online store
Which of the following belongs in a website citation? (select all that apply)
the Internet address or web page address the person or organization responsible for the website the date when you got the information
Why is the .gov domain name so useful to know?
.gov sites have official authorization so they are usually reliable sites.
Which of the following statements describes spyware?
It tracks users' behavior online.
Why is network security important? Check all of the boxes that apply.
Network security allows organizations to continue to function. Network security keeps intruders out of the network. Network security prevents personal information from getting into the wrong hands.
What is the meaning of ethics? Check all of the boxes that apply.
behavior that is good for everyone following the rules behaving in a way that would be easy to defend
Select the correct description of adware.
advertisements used in programs