CMPE 3 Final pt 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A ____________ is a configuration that allows every computer on the network to act as both a client and a server. A. client/server model B. host system C. server network D. peer-to-peer network

D. peer-to-peer network

A Broadband connection could be any of the following EXCEPT: A. cable modem. B. DSL. C. wireless connection. D. standard phone modem.

D. standard phone modem.

ARPANET was funded by: A. the U.S. government. B. IBM. C. Microsoft. D. a group of interested scientists

A. the U.S. government.

In the e-mail address [email protected], "bowles" is the: A. password. B. server name. C. user name. D. client computer.

C. user name.

The rules for how data is exchanged between network nodes is known as a(n): A. protocol. B. algorithm. C. procedure. D. code of ethics.

A. protocol.

The three basic categories of connection to the Internet include all EXCEPT: A. direct connection. B. dial-up. C. broadband. D. direct satellite.

D. direct satellite.

FTP stands for: A. first transfer preference. B. file transactions and procedures. C. folder transfer and protocol. D. file transfer protocol.

D. file transfer protocol.

A ____________ helps block unauthorized access to a computer. A. bridge B. VPN C. WEP D. firewall

D. firewall

The way in which information is transmitted to multiple Internet-connected devices is called: A. Internet connectivity. B. IP address. C. multitasking. D. multicasting.

D. multicasting.

MMORPGs are: A. protocols for the internet. B. software standards for wireless technology C. circuit boards for enhanced handling of multimedia D. online role-playing games involving hundreds of thousands of players

D. online role-playing games involving hundreds of thousands of players

Broadband connections include all of the following EXCEPT: A. cable modems. B. satellites. C. telephone modems. D. DSL.

C. telephone modems.

In what decade was ARPANET developed? A. 1950s B. 1960s C. 1970s D. 1980s

B. 1960s

A recently created additional top-level domain name is: A. .pro. B. .plan. C. .business. D. .school.

A. .pro.

When a business can legally copy software to all of the computers they own, the company has a(n)___________ license: A. site B. upload C. file server D. groupware

A. site

Open standards refers to: A. standards not owned by any company. B. standards used by all countries. C. standards that are free to all parties. D. software programs running on different types of operating systems.

A. standards not owned by any company.

The first users of the Internet were: A. a few dozen computers at universities and government research centers. B. the military. C. all U.S. universities and colleges. D. IBM and Microsoft.

A. a few dozen computers at universities and government research centers.

A(n) ____________ is code embedded as a one-pixel graphics file in a Web page or email message. A. Web dot B. Web bug C. cookie D. virus

B. Web bug

___________ software and hardware allows a PC to act like a speakerphone. A. Telephony B. Instant messaging C. Video conferencing D. Avatar

A. Telephony

TCP/IP stands for: A. Transmission Control Protocol/Internet Protocol. B. Transmission Control Procedures/Internet Procedures. C. Translation Computing Procedures/International Protocols. D. Transaction Computing Printing/Internet Processing.

A. Transmission Control Protocol/Internet Protocol.

In a client/server model, a client program: A. asks for information. B. provides information and files. C. serves software files to other computers. D. distributes data files to other computers.

A. asks for information.

In the Web address www.casamexicana.com.mx, "mx" is a(n): A. country code. B. domain name for multiplex facilities. C. area of the U.S. Internet. D. server on the Internet.

A. country code.

T1 and T3 connections are considered: A. direct connections. B. dial-up connections. C. broadband. D. direct satellite connections.

A. direct connections.

A university might have a(n) ____________ to manage the mail of students, faculty, and staff. A. email server B. client server C. email and URL address D. bridge

A. email server

The ____________ stores data and software that can to be shared by several users. A. file server B. mainframe C. print server D. client

A. file server

A ____________ is a computer connected to two networks. A. gateway B. link C. server D. bridgeway

A. gateway

A URL can specify the IP address of the Web ____________ that houses a Web page. A. server B. client C. page D. e-mail recipient

A. server

A ____________ is a high-speed, high-end computer that shares data and other resources with client computers. A. server B. super computer C. client D. PDA

A. server

This address doesn't change every day: A. static IP address. B. dynamic IP address. C. unique IP address. D. common name and number.

A. static IP address.

Wi-Fi technology refers to: A. wireless LAN connections. B. wires connecting a computer to the Internet. C. a drive on a laptop that connects to the Internet. D. the bandwidth of the server to which a laptop connects.

A. wireless LAN connections.

DSL stands for: A. digital server lines. B. digital subscriber line. C. digits serviced per line. D. damaged service line.

B. digital subscriber line.

The system that translates an IP address into an easier to remember name is the: A. packet-switching domain system. B. domain name system. C. domain. D. domain numbering system.

B. domain name system.

This address changes temporarily as the applications connect to the Internet: A. static IP address. B. dynamic IP address. C. unique IP address. D. common name and number.

B. dynamic IP address.

What was the department of the U.S. government that developed the initial stages of the Internet? A. Department of Commerce B. Department of Defense C. Department of the Military D. Judicial Department

B. Department of Defense

____________ is defined as millions of bits. A. Megabytes B. Megabits C. Kilobits D. Kilobytes

B. Megabits

Most web-based email systems use ____________ to retrieve mail and store the messages in a folder on a remote mail server. A. Listserv B. POP C. groupware D. P2P

B. POP

____________ is designed to capture sensitive financial information from the person visiting a Web site. A. IM B. Phishing C. VoIP D. MMORPG

B. Phishing

A worldwide public newsgroup available on the Internet is: A. TCP/IP B. USENET C. Listserv D. NIC

B. USENET

____________ is a secure electronic "tunnel" through the Internet that prevents unauthorized access or eavesdropping. A. NOS B. VPN C. Bluetooth D. MMORPG

B. VPN

In the e-mail address [email protected], "sou" is the: A. host computer in a business with the name "sou." B. host computer in an educational domain. C. client computer in a commercial business. D. client computer in an educational domain.

B. host computer in an educational domain.

IM stands for: A. internal messaging. B. instant messaging. C. international market. D. instantaneous messages.

B. instant messaging.

If you are at home and do not have a direct Internet connection, you will most likely connect through a: A. server. B. modem. C. black box processor. D. coaxial cable.

B. modem.

Much, or nearly all, of the cost of initially building and operating the Internet was supplied by: A. the largest computer companies. B. the U.S. government. C. U.S. research universities. D. personal users of the Internet.

B. the U.S. government.

All of the following are top-level domains EXCEPT: A. .com. B. .mil. C. .army. D. .org.

C. .army.

The World Wide Web was introduced in: A. the 1960s. B. the mid-1970s. C. 1991. D. 2000.

C. 1991.

____________ is new technology currently available in Japan, much of Europe, and some major US cities.It uses high-bandwidth connections to communicate multimedia over wireless networks. A. 4GL B. PDA C. 3G D. Wi-Fi

C. 3G

A personal area network is possible because of the wireless technology known as: A. USB. B. FireWire. C. Bluetooth. D. IEEE.

C. Bluetooth.

Hundreds of universities, government entities, and research labs have formed: A. Internet. B. WWW. C. Internet2. D. TCP/IP.

C. Internet2.

A(n) ____________ is an invisible piece of code that notifies the sender that an email was opened and may even record other information about the user's computer or email software. A. applet B. pop-up C. Web bug D. phish

C. Web bug

Graphical bodies used to represent a person in a virtual meeting place are known as: A. agents. B. emulators. C. avatars. D. Web bugs

C. avatars.

The term, ____________, refers to the amount of information transmitted through a communication medium in a given amount of time. A. dpi B. bit depth C. bandwidth D. broadband

C. bandwidth

Asynchronous communication is when the sender and recipient: A. must be online at the same time. B. do not use the same operating system. C. do not have to be online at the same time. D. use different software but are able to communicate through the Internet.

C. do not have to be online at the same time.

Using a PC to copy software or data from a server, it is known as: A. uploading. B. terminal emulating. C. downloading. D. server sharing.

C. downloading.

A(n) ____________ cable uses light waves to transmit multimedia and voice data. A. copper B. twisted-pair C. fiber-optic D. coaxial

C. fiber-optic

Telephone modem connections are also called ____________ connections, because they offer little bandwidth compared to other types of connections. A. narrow-width B. small-band C. narrowband D. skinnyband

C. narrowband

The Internet is controlled by: A. the U.S. government. B. IBM, Intel, and Microsoft. C. no one in particular. D. the U.S. taxpayers.

C. no one in particular.

Unwanted junk email is known as: A. IM. B. telephony. C. spam. D. avatar.

C. spam

Every host computer on the Internet has a(n): A. similar IP address. B. unique 15-digit number. C. unique IP address. D. common name and number.

C. unique IP address.

A(n) ____________ uses radio waves to carry information at high speed. A. cable modem B. fiber-optic cable C. wireless connection D. phone cable

C. wireless connection

Cable modems use the same media as: A. the educational facilities in your area. B. your local Internet access provider. C. the telephone lines in your house. D. coaxial cables for television signals.

D. coaxial cables for television signals.

All of the following are top-level domains EXCEPT: A. .coop. B. .net. C. .biz. D. .bus.

D. .bus.

Which model is used by Internet applications? A. Login B. Distributed server C. Digital server D. Client/server

D. Client/server

All of the following are disadvantages of a DSL connection EXCEPT: A. It is fairly expensive. B. It can be complicated to install. C. It is only offered in some areas. D. It cannot share signals with a telephone line of voice traffic.

D. It cannot share signals with a telephone line of voice traffic.

____________ software enables a computer to function as a simple input/output device for sending messages to a host computer. A. Multimedia B. Compression C. Data translation D. Terminal emulation

D. Terminal emulation

The ____________ encryption scheme improves the security of wireless networks. A. Ethernet B. phishing C. VPN D. WEP

D. WEP

In a large organization LANs may be connected through a: A. direct satellite connection. B. dial-up connection. C. Broadband connection. D. backbone network.

D. backbone network.


संबंधित स्टडी सेट्स

Bronfenbrenner's Ecological Theory

View Set

FINN 3120 Ch 15 Spring 2020 Bush

View Set

Maqueiras Network Module 1 unit 1

View Set

Islam section 1, 2, 3, 4, 5, 6 questions

View Set

GEC. Communication, World Englishes

View Set

Financial Analysis - USCA MBA - Ch9 SB

View Set

Chapter 7 - Thinking, Language and Intelligence

View Set

FORMULES SCIENCES SEC 4 (ST ET STE)

View Set

NA-C Chapter 19 Nursing Assistant CBC

View Set

Chapter 4 - Section 2: The Access Screen

View Set

Chapter 13: Palliative and End-of-Life Care

View Set

Exam 4 (Chapter 45) Digestive and GI Treatment Modalities

View Set

Sarbanes-Oxley Act of 2002 and the PCAOB

View Set