ODW 5e Study
True or false: The W3C is a US government agency.
False
True or false: Unpublished works are not protected by copyright.
False
Rather than entering a(n) _____ into our browser, we use a _____ address known as a URL.
IP address; text-based
_____ consists of raw facts that have been processed, organized, structured, or presented in a meaningful way.
Information
Web 3.0 is also called the
Semantic Web.
What reason do ISPs use to argue for less regulation (removal of net neutrality rules)?
The ISP can invest money received for faster service into improved infrastructure.
How does a robot assistant help a customer if the customer's question is not one that is part of the robot's programmed responses?
The robot begins a video conference with a human.
CE
The study of computer hardware and software systems, and programming how devices interface with each other.
CS
The study of how to design software, solve problems such as computer security threats, or come up with better ways of handling data storage.
IT
The study, design, development, or management of computer systems, software applications, and computer hardware.
DRAM
The type of memory most commonly found in computers, and works quickly, is compact, and affordable.
Who was one of the founders of the World Wide Web Consortium?
Tim Berners-Lee
Data integration allows search engines to cross reference data from different sources.
True
RAM
Volatile memory.
The Semantic Web is another name for
Web 3.0.
An IP address takes the form of
a number designating a destination on the Internet.
This type of equipment helps to keep your connection secure.
a router
1 Mbps down means that content is delivered (or downloaded) to you at about
1 megabit per second.
Because many individuals now contribute content to the web, people should
a. become better at identifying reliable sources of information.
The Semantic Web will
allow easy connections between data.
Asia has _____ of the world's internet users.
almost half
Which technology will retailers use in the future for payment processing?
automatic scan of items and payment charge as you leave the store
What are three kinds of broadband connections?
cable, DSL, and satellite
Search engines search for content. What do search directories also do?
catalog pages by topic
Chapter 2 calls the internet the world's largest
computer network.
Protecting against computer security threats and designing ways to handle data storage are jobs done by someone who has studied
computer science
Multihomed devices allow you to
connect to the internet in multiple ways.
In what year did Netflix pay Comcast for better streaming speeds for their customers?
2014
Some fashion designers use this type of technology to produce clothing.
3-D printing
IS
A computer profession that bridges the needs of an organization and the way their information is handled to solve business problems. Considers who needs what data to get work done and how it can be delivered most efficiently.
SE
A field involving writing software programs, which might be developed for a software manufacturer to sell to the public, or involve a custom program written for a large organization to use in-house
SRAM
A type of memory that is expensive and therefore is often used only in cache memory applications.
The mission of the W3C is to
Answer: All of these lead the web to its full potential. ensure long-term growth for the web. develop protocols and guidelines.
What is the fair use provision?
Answer: All of these limitation on copyright protection a specified exemption from copyright protection a doctrine defined in section 107 of the 1976 Copyright Act
What works are protected?
original works of authorship
Which of the following is not a storage medium?
processor
A computer is known as a(n)
programmable device that calculates, assembles, processes, and stores data.
A _____ can be scanned by your smartphone to take you directly to a website.
quick response (QR) code.
RAM stands for
random access memory
One of the goals of the W3C is to
reinforce design principles to help make the benefits of the web available to everyone.
Four common methods of connecting to the internet using broadband are DSL, cable, fiber-optic cable, and
satellite
Web 2.0 marks a change from people _____ to people _____.
simply reading information online; interacting by both reading and writing online content
A device that processes spoken commands and responds using artificial intelligence is called a
smart speaker.
There are many types of input devices. Some examples of input devices are keyboards, scanners, bar code readers, and
smartphone touchscreens
The four parts of the information cycle are input, processing, output, and
storage
The public can participate in the W3C via all of the following activities except
telephone interviews.
Who is the initial owner of a copyright?
the author or authors
What makes copyright infringement so easy online?
the ease with which you can copy and paste content
The deep web is another name for
the invisible web.
The last part of a URL, such as .com, .edu, or .biz is called the
top-level domain.
True or False: Under net neutrality rules, an internet service provider (ISP) could not favor web traffic from a company that paid the ISP a fee for faster service.
true
True or False: With net neutrality rules, a small company has the same access to the internet as any large company with respect to speed and quality of ISP service.
true
True or False: Without net neutrality rules, it is possible that consumers may have to pay more money to watch video or stream music during peak times.
true
True or false: In Web 3.0 machines can talk to machines.
true
True or false: Not all types of broadband connections are available in every location.
true
True or false: Online simulations can help professionals, such as airplane pilots and surgeons, train for unique situations.
true
True or false: Smartphones and smart appliances are connected by the internet.
true
Technological convergence is
when different technological systems evolve towards performing similar tasks.
The text after http in a URL indicates the
domain name.
Which of the following is not a technology profiled in the video on shopping in 2020?
drone delivery agents
Which technology are retailers using to identify shoppers as they enter a store to allow store staff to customize the shopper's buying experience?
facial recognition
The "three Ws" discussed in Chapter 2 are used in
gauging the accuracy of online content.
A smart mirror uses artificial intelligence, virtual reality, and __________ technology to superimpose clothing over your image to show you how you look in an outfit.
gesture recognition
Which of the following represents the part of a URL referred to as a protocol?
http
Text that is linked via a hyperlink is referred to as
hypertext
It is _____ to copy or distribute intellectual property without appropriate permission.
illegal
What does ISP stand for?
internet service provider
Which of the following device categories includes ultrabooks and netbooks?
laptop
Net neutrality is presented as creating a ________ that leads to __________.
level playing field; more innovation
_____ is raw facts or statistics.
Data
Crawlers that search engines use to search for data are capable of entering typed queries.
False
Why can't search engines find content on some sites?
Where search engines use hyperlinks to find content, some databases require typed queries.
While the internet is the infrastructure on which content is delivered, the web is
a body of content.
A byte is
a collection of 8 binary digits.
To purchase a domain name you should contact
a domain registrar.
Which device lets retailers push targeted content to you (such as an alert about a sale) via your smartphone when you are within range of the Bluetooth radio signal?
beacons
One way that individuals contribute content to the web is through
blogging