TestOut Chapter 5 DIT

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research. Which of the following is the MOST likely cause of this problem?

A proxy server is filtering access to websites.

What should you do to protect your identity when creating a social media profile?

Always review and set privacy settings

files you send along with an email message are called _______?

Attachments

A software application that accesses web applications and websites

Browser

Web browsers save information on their ______, which helps the site load faster on future visits.

Cache

Martin just purchased a new computer and wants to surf the web. He is afraid his new computer may get infected by automatically installing viruses. What should he do to protect his computer?

Change browser settings to notify before downloading.

____________ computing refers to services and applications that run remotely over the internet.

Cloud

A service that lets you store data in a remote location over the internet is called ___________

Cloud storage

Microsoft OneDrive is a cloud solution that is designed to provide what?

Cloud storage

Frank, a technician, has finished installing a wireless router. Jessica is connected to the WiFi. However, she can only see the company intranet pages. What should Frank do to troubleshoot the problem?

Configure the browser proxy settings

Small files that a website saves on your computer to remember your preferences are called ___________?

Cookies

Crowdsourcing is reaching out to a group (crowd) as a way to solve a problem. What provides a way to raise funds without web development expenses?

Crowdsourcing platform

what are 2 advantages of cloud computing?

Data security and easier collaboration

Samantha is being cyber-bullied by someone who is spreading lies about her involvement in a failed business. Which of the following are recommended actions that Samantha should take to help diffuse the situation? (Select two.) Post the bully's physical address on social media. Like, share, and comment on the bullying posts. Encourage friends and relatives to ignore the bullying. Create a public group on social media (such a Facebook group) to confront the bully. Respond to the bully in a calm, clear, and constructive manner.

Encourage friends and relatives to ignore the bully ; Respond to the bully in a calm, clear, and constructive manner.

What do cloud services provide to help with privacy and security concerns?

Encryption

What social media website provides live streaming?

Facebook

what is the largest social media platform in the world?

Facebook

What service charges for resources used such as bandwidth and processing power, by second?

Google Cloud

Which of the following runs exclusively from the cloud, relying on cloud technologies? (Select 2)

Google Drive and Dropbox

What are clickable text or images that take you to different websites on the World Wide Web called?

Hyperlinks

What app is a messaging platform that includes built-in photo editing tools?

Instagram

What social media is specifically focused on images?

Instagram

What are 2 private technologies?

Instant messaging and video conferencing

An interconnected global public computer network

Internet

Which of the following terms describes an enormous public network that connects billions of devices and networks around the world?

Internet

A company that provides access to the internet

Internet Service Provider (ISP)

What describes an organization that connects users to the internet?

Internet service provider

A _________ is a private network that utilizes the same technologies as the internet.

Intranet

What are 2 asynchronous technologies?

Message boards and email

Which of the following is a category of SaaS applications?

Office tools

which of the following typically does not save a conversation after it takes place?

Online chat

What are 2 common risks of using social media?

Online information that you post is difficult to remove and anonymity can lead some people to post harmful comments

After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem?

Proxy settings

what medium does Wi-Fi use to send data between networks and devices?

Radio waves

which of the following is a disadvantage of a VoIP system?

Relies fully on a table internet connection

What should you use when you want to respond to the sender of an email but not all of the recipients?

Reply

what should you use to reply to every single person included on an email?

Reply all

What is the term for delivering an application over the internet called?

SaaS

web services that help people meet, interact, and share contact with other people online are called ____________

Social media

Kickstarter and Indiegogo are crowdsourcing platforms primarily started for what type of crowdsourcing?

Startup

What are the 2 ways social media platforms generate revenue?

Targeted ads and selling user-generated data to other companies

when you stream video, the server doesn't verify that your computer received the files correctly. It just sends a continuous stream of data. This type of transmission has advantages and disadvantages. What issue can this potentially cause?

The video may become glitchy

What is the most common microblogging platform?

Twitter

what is used to identify specific hypertext resources on the world wide web?

Uniform resource locator

What technology can be used to make a phone call over internet connection?

VoIP

What is 1 disadvantage of web applications?

Web applications can carry a monthly or yearly fee

when might it be most helpful to clear your browser's cache of temporary Internet files?

When a website is not functioning as it should

On what format should you be most careful about trusting the information you come across as it may seem academically reviewed but it in fact is not?

Wikis

An information system that connects documents to each other by hypertext links

World Wide Web

What describes a global system of interconnected hypertext documents and files that can be accessed through a browser?

World wide web

Which of the following lines will initiate an Internet search from the address bar of a web browser? a. testout.com b. microsoft gov c. microsoft.com d. microsoft.org

b. microsoft gov

A service or software application that relies on shared resources over the internet.

cloud computing

Which digital communication medium consists of top-level posts with threads of response posts?

discussion board

what should you use when you want to send an email you have received to a new person?

forward

when protecting your online identity, what is an internet security threat you need to be informed of?

phishing attempts

A pop-up blocker is a web feature that _________.

prevents unwanted advertisements

What describes the strategy that defines a business social media goals and objectives?

social media optimization (SMO)

What is an example of a valid email address?

[email protected]


Ensembles d'études connexes

intro to public speaking mid term

View Set

An Update on Demineralization/Remineralization CE

View Set

Chapter 19: Documenting and Reporting

View Set

Families and Children (Chapter 9)

View Set