Testout Chapters 5&6
Intranet
A _________ is a private network that utilizes the same technologies as the Internet. Local Area Network Wide Area Network World Wide Web Intranet
Web Search
A search of the World Wide Web using a web browser, often done by visiting a web search engine site such as Google, Bing, or Yahoo.
Cloud computing
A service or software application that relies on shared resources over the Internet
Hyperlinks
Clickable text or images that take you to different sites on the World Wide Web are called __________. Hyperlinks Attachments Navigation buttons Shortcuts
Crowdsourcing platform
Crowdsourcing is reaching out to a group (crowd) as a way to solve a problem. Which of the following provides a way to raise funds without web development expenses? Crowdsourcing media Crowdsourcing website Crowdsourcing campaign Crowdsourcing platform
IMAP
IMAP, or Internet Message Access Protocol, is a much more common receiving protocol. With IMAP, email messages stay saved on the remote mail server. This way, people can access their emails from multiple devices, such as a home computer, a work laptop, and a smartphone.
OneDrive
Microsoft's cloud storage service, which is automatically installed on new versions of Windows, is called _____________. MicroCloud Dropbox Windows Store OneDrive
Email Filtering
Most email clients include a feature that automatically filters out junkmail. While email filtering can be implemented by each user, it can also be enabled in incoming mail services to reduce spam and other unwanted email by blocking email based on the sender address or by content.
Most popular microblogging platform
POP3
POP3, or Post Office Protocol 3, is one of two protocols used to receive email. When an email client uses POP3, it grabs messages from the remote server, downloads them to the local client, then deletes them from the server.
Provides live video streaming
SMTP
SMTP, or Simple Mail Transfer Protocol, is used to send email. When you send a message, SMTP routes it through the Internet to its destination mail server. SMTP is used by all email systems that use the Internet.
Search Engines
Search engines are tools that gather relevant websites from around the Internet and show them to you in a list. Every search engine has a text entry box where you can type the information you're looking for. A search engine can help you find what you're looking for even if you don't remember the web address. After clicking inside the text entry box, you can type words relevant to your search and press Enter to see the search engine results.
Social network focused on images
DNS
The Domain Name System (DNS) matches unique IP addresses with easy-to-read URLs. When you navigate to a website, your computer asks a DNS server which IP address corresponds to the URL you want to visit. DNS returns the correct IP address, which is then connected using the IP protocol.
HTTP and FTP
The Hypertext Transfer Protocol (HTTP) is used to identify resources and transfer content on the web. Some web pages use the HTTPS protocol, which adds an additional layer of encryption to make data transfers more secure. The File Transfer Protocol (FTP) can also be used to transfer data between computers on a network.
Targeted ads Selling user-generated data to other companies
There are many social media platforms available today. What are the top two primary ways that social media platforms generate revenue? (Select two.) Usage fees Targeted ads Selling user-generated data to other companies Content Membership fees
Browser Settings
To change the Chrome startup options and other settings, click the Chrome menu in the upper right-hand corner of the browser and select Settings. In Settings you can manage your Google account, change autofill settings, customize appearance configurations, manage the default search engine and browsers, and change the startup options.
Bookmarks
To find a specific website more quickly in the future, you can add a bookmark. In Chrome, go to the upper right corner of the window and click the star symbol. Add the bookmark to the bookmarks bar and click Done. To return to the bookmarked page, you can click the Chrome menu and select Bookmarks. If you open a new tab in the browser, you can see the bookmark conveniently below the address bar.
Use the Browser Address Bar
To perform an online search, you can visit the website for your preferred search engine, such as google.com or bing.com, and then begin entering search terms. However, for a quick online search, you can enter search terms directly into the address bar of your web browser, which will forward them to the default search engine. If you enter the URL for a website, such as testout.com, the browser will display the website. But if you enter one or more search terms separated by a space, the terms will be processed by the default search engine.
Internet Service Provider
Which of the following terms describes an organization that connects users to the Internet? Internet Service Provider Web Server Data Center Network Server
Proxy Server
A device that stands as an intermediary between an application such as a web browser and the Internet. A proxy server intercepts all requests and can use filter rules to allow or deny internet traffic.
Pop-up Blockers
A pop-up blocker is a feature of most web browsers that prevents pop-up windows such as advertisements from being displayed. The reason web browsers often block pop-up windows is to protect you from malware. However, since legitimate websites also use pop-up windows, you can disable the pop-up blocker for specific sites. To verify that pop-up windows from specific sites are allowed, go to the Chrome menu in the upper-right corner of the window and then Settings. From there, open the Advanced settings and go to Privacy and security, then Site settings. In the Pop-ups and redirects section, you'll see whether the domain is allowed to use pop-up windows. If you want to allow another site, click Add and then enter its domain name.
Proxy Servers
A proxy server is a device that stands as an intermediary between an application such as a web browser and the Internet. It intercepts all requests and uses filter rules to allow or deny Internet traffic. Proxy servers can improve performance on frequently-used websites. They can also be used to prevent access to specific websites. If you're using a school or public network and are able to access some websites but not others, the reason may be the network's proxy settings.
Cloud storage
A service that lets you store data in a remote location over the Internet is called _____________. Internet backup Database Online repository Cloud storage
Browser
A software application that accesses web applications and websites
Use Advanced Search Options
All of the popular search engines have some kind of advanced search option. Advanced searches provide several ways to refine and narrow your search, including fields for "exact words" and fields for words you do not want to be found in the source. You can also narrow the search by language, region, domain, and file type. One important thing to note about advanced searches is that the search filters are cumulative. This means you can apply as many of the filters as you want and they will all be applied at the same time. If your search ends up being too narrow, you can go back and remove some of the filters or try alternative phrases.
World Wide Web
An information system that connects documents to each other by hypertext links
Internet
An interconnected global public computer network
Narrow Your Search
At the top of the list of search results, most search engines include a few options for narrowing your search to specific result categories. For example, you can click "News" and see news articles related to your search terms. Or you can click "Images or Videos" to view media results. Another option for narrowing your search is to return to the Search box and add or clarify search terms. You can also put some or all of the terms in quotations, which tells the search engine to display results containing that exact phrase instead of results that include each of the individual words.
Private Browsing
If you share your computer with someone else and don't want Chrome to track your browsing activity, you can open a window in incognito mode. This is also called private browsing. Be aware that private browsing will only prevent the web browser from tracking your activity. If you're using a computer at school or work, your browsing will still be visible to network administrators.
ISP
Internet Service Providers, or ISPs, manage an access point to the Internet. They don't manage the entire Internet. If you think of the Internet as a big freeway, then ISPs manage the on-ramp to the freeway. They're responsible for building the on-ramp and keeping it maintained and open, but they're not responsible for the Internet itself.
Change browser settings to notify before downloading.
Martin just purchased a new computer and wants to surf the web. He is afraid his new computer may get infected by automatically installing viruses. What should he do to protect his computer? Change browser settings to block third-party cookies. Change browser settings to notify when downloads are complete. Change browser settings to notify before downloading. Change browser settings to prevent pop-up windows.
Hyperlinks
On a web page, if you hover your cursor over certain words or images, the white arrow turns into a pointed finger. This lets you know there's a hyperlink to another webpage or to more information. Sometimes hovering over a hyperlink opens a dropdown menu.
Browser Extensions
Plug-ins and other browser extensions such as the Adobe Flash Player can be installed to enhance the appearance and functionality of websites. Untrusted extensions can take advantage of security vulnerabilities. Extensions can be temporarily disabled on particular browsers, or they can be deleted from the system. If you need to install a plug-in to use a legitimate website, make sure it's up-to-date with the latest version. Some websites require that you install a browser extension to support new functionality. If the extension does not appear to be working, check to make sure it's enabled in the browser. In Chrome settings, open an Extensions tab and turn the extension on. In some cases, you may need to remove an extension that's incompatible with others.
HTTP
The Hypertext Transfer Protocol (HTTP) is used to identify resources and transfer hypertext pages on the World Wide Web.
IP
The Internet Protocol (IP) is used to route information over the Internet. When you send a file over the Internet, IP divides it into small pieces and adds a header to each one. The header contains the source address and the destination address. The piece of data combined with the header is called a packet.
UDP
The User Datagram Protocol (UDP) is generally used when speed in transmission is more important than accuracy, such as streaming audio or video. Like TCP, UDP adds a header to each packet. However, unlike TCP, the sending computer doesn't verify that the packets were correctly received. This makes transmissions happen much faster but leaves room for transmission errors.
Safe Browsers
Whatever web browser you decide to use, make sure you're using the latest version. Older browsers often have security holes that are easy entry points for attackers if they're not patched. Some older browser versions are no longer even supported by the company that created them. Since many web applications enable different functionalities on your browser that leave you vulnerable to attacks, the safest policy is to disable most functions that are not absolutely necessary for the application. Then, if you determine a website is trustworthy, you can temporarily enable the functionalities as needed.
Configuring Email Accounts
When configuring an email account on your computer or smartphone, you typically need to know the host names of both the incoming and outgoing mail servers. For example, if you want to check your Gmail messages using a different mail client like Microsoft Outlook, you would likely enter imap.gmail.com as the incoming mail server and smtp.gmail.com as the outgoing mail server.
When a website is not functioning as it should
When might it be most helpful to clear your browser's cache of temporary Internet files? When a website is not functioning as it should Immediately after opening a new Microsoft Office document After every Internet search When you switch to a different web browser
Discussion board
Which digital communication medium consists of top-level posts with threads of response posts? Social network Email client Chat room Discussion board
Radio waves
Which medium does Wi-Fi use to send data between networks and devices? Cellular signals Ultraviolet light Radio waves Bluetooth
Easier collaboration, Data security
Which of the following are advantages of cloud computing? (Select two.) Easier collaboration Lower speeds Greater costs Local software Data security
Message boards Email
Which of the following are considered asynchronous technologies? (Select two.) Video conferencing Voice over Internet Protocol (VoIP) Message boards Email Live streaming
Video conferencing Instant messaging
Which of the following are considered private technologies? (Select two.) Video conferencing Instant messaging Chat rooms Live streaming Social media posts
Google Cloud
Which of the following charges resources used, such as bandwidth and processing power, by the second? OneDrive Google Cloud Microsoft Azure Amazon Web Services (AWS)
Social Media Optimization (SMO)
Which of the following describes the strategy that defines a businesses social media goals and objectives? Social media marketing Social channels Search Engine Optimization (SEO) Social Media Optimization (SMO)
Microsoft Paint
Which of the following does NOT rely on cloud technologies? Facebook Google Drive Microsoft Paint TestOut Desktop Pro
Social media makes it difficult to keep in touch with friends and family
Which of the following is NOT a drawback of social media? Social media companies make money by selling personal information Social media makes it difficult to keep in touch with friends and family Social media exacerbates social divisions Stories shared on social media are often exaggerated or false
Post the bully's physical address on social media
Which of the following is NOT a good response to cyberbullying? Reach out to the person who was targeted Do not like, share, or comment on bullying posts Respond to the bully in a calm, clear, and constructive manner Post the bully's physical address on social media
Office tools
Which of the following is a category of SaaS applications? Virtual machines Office tools Web hosting Disaster recovery
Web applications can carry a monthly or yearly fee.
Which of the following is a disadvantage of web applications? Web applications can be limited by the hardware they run on. Web applications can carry a monthly or yearly fee. Web applications can require a significant amount of disk space. Web applications can connect people in different locations.
Uniform Resource Locator
Which of the following is used to identify specific hypertext resources on the World Wide Web? Internet Protocol Uniform Resource Locator Hyperlink Transmission Control Protocol
microsoft gov
Which of the following lines will initiate an Internet search from the address bar of a web browser? microsoft.com microsoft gov testout.com microsoft.org
World Wide Web
Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser? Internet Intranet World Wide Web Wide Area Network
Internet
Which of the following terms describes an enormous public network that connects billions of devices and networks around the world? Local Area Network Intranet Internet of Things Internet
A proxy server is filtering access to websites.
You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research. Which of the following is the MOST likely cause of this problem? Port triggering is redirecting traffic to the wrong IP address. A firewall is blocking ports 80 and 443. A proxy server is filtering access to websites. The router has not been configured to perform port forwarding.
Internet Service Provider
A company that provides access to the Internet
Pop-up Blocker
A feature of most web browsers that prevents pop-up windows such as advertisements from being displayed.
Computer Restart
A good tip for any computer problem you may run into is to restart your system, which will turn the computer off, then on again. To restart your Windows system, click the Start button at the bottom-left corner of the screen. Click the Power icon, then click Restart. This is a step you should always take before you call a technical support helpline, including TestOut's support team.
IP Address
A numerical label that is assigned to devices so they can connect and communicate on a network.
prevents unwanted advertisements
A pop-up blocker is a web browser feature that _________________. keeps the window in a minimized state prevents color images from being displayed prevents unwanted advertisements censors Internet searches
Cookie
A small piece of data sent from a website and stored on a user's computer by the web browser while the user is browsing. Cookies are designed to help websites remember information such as items in an online shopping cart and entries in a web form so that the website can customize a web page for the user.
Proxy settings
After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem? Browser cache Invalid certificate Private browsing Proxy settings
Wikis
All of the following formats may contain incorrect or misleading information. On which should you be MOST careful about trusting the information you come across as it may seem academically reviewed but in fact is not? RSS feeds Podcasts Wikis Blogs
Web Browser
An application for accessing information on the World Wide Web.
Cookies
Cookies are files that store data for specific websites. This data may contain information about your browsing habits and preferences, or even your email account and favorite sites. They can be saved on your computer for any length of time, sometimes for as long as the browser is open or even after you close it. If an attacker has access to these files, they can gather your personal information. It's important to review the security settings for cookie storage on your computer. A common practice is to block third-party cookies, which are placed on your computer by advertisers and other sites with a domain name other than the one you're currently visiting.
DNS
DNS, short for Domain Name System, is a protocol that associates domain names (such as web servers) with unique IP addresses. DNS servers translate URLs into machine-readable IP addresses.
Certificates
Ecommerce and other websites that handle sensitive information should be certified to indicate they're using a secure protocol with data encryption. To determine whether a website is using this safer protocol, you can look for the padlock symbol in the address bar. This will let you know that the site is using a valid digital certificate.
Configure the browser proxy settings.
Frank, a technician, has finished installing a wireless router. Jessica is connected to the WiFi. However, she can only see the company intranet pages. What should Frank do to troubleshoot the problem? Configure the browser proxy settings. Disable the pop-up blocker. Clear the browser cache. Apply a firmware update.
Investigate Author Biases
If you have any reason to doubt the reliability of an author's claim, find out more about his or her affiliations and investigate possible biases. What is the author's purpose? Is it simply to inform as objectively as possible, or is it to persuade you or sell you something? Does the author seem to be overly emotional or making outlandish claims?
Use Scholarly Sources for Academic Research
If you're working on academic or professional research, limit your searching to scholarly authors who have credentials in their field. Online academic databases such as Google Scholar are configured to limit search results to scholarly sources.
Navigation Buttons
If you've navigated to the wrong webpage, you can always click on the left arrow in the upper left corner of the browser, called the back button, to return to the previous page. From here, you can use the right button or forward button to return to go back to a website.
Compatible Browsers
If your web browser is not displaying website content properly, you might want to consider installing and using a different web browser. Sometimes a particular site might have been designed and programmed without taking into account different browser functionality. Popular web browsers include Google Chrome, Mozilla Firefox, Apple Safari, and Microsoft Edge. To take advantage of security and bug fixes, be sure that you're running the latest version of the browser.
Browser History
In Chrome, to see a list of all the web pages you've previously visited, you can click and hold down the Back button. Then select Show Full History. To return to one of these previously visited sites, simply click one of the links.
Startup
Kickstarter and Indiegogo are crowdsourcing platforms primarily started for which type of crowdsourcing? Financial hardship Brainstorming Idea Startup
Largest social media platform in the world
Messaging platform where messages disappear after being read
Address Bar
Near the top of browser windows is the address bar. This is where you can type the address for the website you want to visit. Another name for a web address is URL, or Uniform Resource Locator.
HTTPS
One of the biggest downsides of HTTP is that it transmits data as plain text. This is a problem, because an attacker could intercept the signal during transmission and read the sensitive information it contains. When they need to send or receive data securely, most websites use HTTPS, which combines HTTP with the Secure Sockets Layer (SSL) protocol. SSL encrypts data so unauthorized parties can't understand the data even if they manage to intercept it.
Client-Side Scripting
Scripting languages such as PHP and JavaScript are used to extend the functionality of web pages. The code for scripting languages can be executed either on the web server or on the client-side within the web browser itself. Since client-side scripting is a security risk on untrusted sites, it can be deactivated in some web browsers. However, since most modern websites rely on client-side scripting, it usually needs to be allowed. For greater control over which websites can run scripts, you could also choose to install a script blocker add-on for your browser.
Sift Through Search Results
Search engines use complex algorithms that rank websites according to their popularity, responsiveness, and overall "relevance." These rankings influence which sites are displayed near the top of your search results. Most search engines also highlight links to related content sponsored by advertisers. As you sift through search results, if you're looking for products or services related to your search terms, you might want to consider clicking on an advertised link. Otherwise, you'll want to ignore them and scan the list for more reliable, objective information. It's often a good idea to click through a few pages of results, since the most relevant pages might not be at the top of the list.
Verify Facts
Since information on the Internet is not regulated by a fact-checking body, it's important to verify claims by looking at multiple sources. Don't trust one or two sources of unverified pieces of information.
Cookies
Small files that a website saves on your computer to remember your preferences are called ______________. Malware Cookies Fingerprints Reminders
TCP/IP
TCP/IP stands for Transmission Control Protocol/Internet Protocol. It is the suite of protocols or rules that facilitate Internet communication.
TCP
The Transmission Control Protocol (TCP) adds a header to each IP packet. The TCP header helps the receiving computer to assemble the packets into the right configuration once the entire file is downloaded. The headers also allow the sending and receiving computers to verify with each other that each packet was received correctly.
Caching
The browser cache refers to the storage location for images, sounds, web pages, and other information associated with particular websites. In addition to taking up space on your computer, data in the cache could be retrieved by someone with access to your computer. To provide some level of protection, you should clear the Web browser cache after you use a public computer to access the Internet. In the Chrome menu, under More tools, you can see the option to clear browsing data. Sometimes, when a website is not functioning as it should, a good troubleshooting tip is to "clear the cache," or delete this stored information. In Chrome, when you click the Clear data button, you delete your browsing and download history, cookies, passwords, and other website data.
Client-Side Scripting
The process of transferring source code from a web server to a web browser and running that code directly in the browser.
Caching
The storing of images, sounds, web pages, and other information associated with particular websites that allows a browser to redisplay data without having to reload it from the website.
VoIP
Voice over IP (VoIP) sends voice phone calls using the TCP/IP protocol over digital data lines. With VoIP, phone calls are made through a network connection rather than through a standard phone line. When you make the phone call, it is converted into digital data and sent through the network or over the Internet.
Cache
Web browsers save website information in their _________, which helps the site load faster on future visits. Repository Cache Storage Memory
Social Media
Web services that help people meet, interact, and share content with other people online are called ____________. Social Media Internetworks Facebooks Web Servers
Encryption
What do cloud services provide to help with privacy and security concerns? Collaboration Backups Accessibility Encryption
SaaS
What is the term for delivering an application over the internet called? IaaS SaaS FaaS PaaS
Browser Restart
When a web browser becomes unresponsive or slow, the problem can often be fixed by closing the browser and then opening it up again. This clears the computer's memory and lets you start with fresh content.
Phishing attempts
When protecting your online identity, which of the following is an internet security threat you need to be aware of? Using a different password for each social media platform Using personal information USB keyloggers Phishing attempts
Always review and set privacy settings.
Which of the following should be done to protect your identity when creating a social media profile? Always use a fake name and fake personal information. Always review and set privacy settings. Use the default privacy settings for the account. Always include your physical address and set privacy to Friends of Friends.
VoIP
Which of the following technologies can be used to make a phone call over an Internet connection? VoIP IoT TCP UDP
Cloud
_____________ computing refers to services and applications that run remotely over the Internet. Cloud Virtual Global Remote