information technology chapter2
Kbps means how many bits per second? a. 1 billion b. 1 thousand c. 1 million d. 1 hundred e. 1 trillion
1 thousand
Which of the following is not a netiquette rule? a. Consult FAQs. b. Flame only when necessary. c. Don't shout. d. Avoid huge file attachments. e. Avoid sloppiness and errors.
Consult FAQs.
Which of the following is not a protocol? a. TCP/IP b. IE c. HTTP d. SMTP
IE
Each time you connect to your ISP, it will assign your computer a new address called a(n) a. domain. b. IP address. c. plug-in. d. POP. e. URL (Universal Resource Locator).
IP address
ISPs that don't run their own backbones connect to an Internet backbone through a(n) a. Internet Exchange Point. b. web portal. c. web browser. d. URL. e. TCP/IP.
Internet Exchange Point
Who owns the Internet? a. Microsoft. b. IBM. c. Apple. d. U.S. government. e. No one owns the Internet; the components that make up the Internet are owned and shared by thousands of public and private entities.
No one owns the Internet; the components that make up the Internet are owned and shared by thousands of public and private entities.
Which protocol is used to retrieve email messages from the server to your computer? a. HTTP (Hypertext Transfer Protocol) b. SMTP (Simple Mail Transfer Protocol) c. POP3 (Post Office Protocol version 3) d. POP (point of presence)
POP3 (Post Office Protocol version 3)
Which of the following is the fastest method of data transmission? a. ISDN b. DSL c. modem d. T1 line e. cable modem
T1 line
A location on the Internet is called a a. network. b. user ID. c. domain. d. browser. e. web.
domain.
A T1 line is the slowest but cheapest form of Internet connection. true false
false
A dial-up modem is an ISP (Internet service provider). true false
false
A dynamic IP address gives you faster Internet access than a static IP address does. true false
false
All computer communications use the same bandwidth. true false
false
Hypertext refers to text presented with very large letters. true false
false
POP3 is used for sending email, and SMTP is used for retrieving email. true false
false
Radio buttons are used for listening to radio stations on the Internet. true false
false
Replying to spam email messages with the statement "unsubscribe" will always get spammers to stop sending you unsolicited email. true false
false
In the email address [email protected], Kim_Lee is the a. domain. b. URL. c. site. d. user ID. e. location.
location.
Which of the following is not one of the four components of a URL? a. web protocol b. name of the web server c. name of the browser d. name of the directory on the web server e. name of the file within the directory
name of the browser
The sending of phony email that pretends to be from a credit-card company or bank, luring you to a website that attempts to obtain confidential information from you, is called a. spoofing. b. phishing. c. spamming. d. key logging. e. cookies.
phishing
A bookmark lets you return to a favorite website quickly. true false
true
A server is also called a host computer. true false
true
Spoofing means using fake email sender names. true false
true
The Internet Corporation for Assigned Names and Numbers (ICANN) was established to assign IP addresses. true false
true