IST 101 Final Review

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is a restricted TLD? .biz .com .net .edu

.edu

ARPANET, the original Internet, had only ________ nodes. 2 10 4 6

4

Which of the following is NOT true about a P2P network? The connected computers belong to a workgroup. A network operating system (NOS) is required. They are easy to set up. They allow file sharing.

A network operating system (NOS) is required.

Which of the following is NOT a Boolean operator that can be used to search the web? AND OR BUT NOT

BUT

You would use FTP to ________. surf the web log in to a secure webpage verify an email address transfer files

transfer files

The original Internet ________. was invented by Tim Berners-Lee had only two nodes was called ARPANET came into existence in 1990

was called ARPANET

On a Windows PC, you will have to set up a ________ in order to share resources with a computer running Mac OS X. mapped drive homegroup workgroup library

workgroup

To resolve the domain name amazon.com to an IP address would require the use of the ________ protocol. DNS SMTP DHCP FTP

DNS

If you use satellite Internet access, you can expect the speed to be comparable to those of a ________ connection. DSL dial-up cable Internet access FTTH

DSL

Google's free online storage is called Google ________. Chrome Drive Play Earth

Drive

________ is an example of asynchronous communication. Email Chat Skype VoIP

Email

________ is a service that allows Apple users to place video phone calls to other users. iMessage Google Voice FaceTime iChat

FaceTime

Which of the following is NOT a common LAN topology? Star Hierarchical Bus Ring

Hierarchical

Which organization is responsible for coordinating the Internet naming system? WWW FCC W3C ICANN

ICANN

198.168.0.1 is an example of a(n) ________. IP address domain name DNS protocol

IP address

Which of the following is a method of synchronous online communication? Email Instant Messaging Newsgroup Forum

Instant Messaging

________ is the most commonly used web browser. Firefox Thunderbird Chrome Internet Explorer

Internet Explorer

Which of the following is NOT an IM service? Skype iMessage LinkedIn AIM

LinkedIn

Which of the following protocols is used for receiving email? POP HTTP SMTP DNS

POP

Which of the following statements about P2P networks is FALSE? The services and security are centralized. They can share a printer. They can only support a small number of devices. All computers are considered equals.

The services and security are centralized.

Which of the following is NOT a web browser? Chrome Opera Safari Thunderbird

Thunderbird

________ is the father of the hypertext system known as the World Wide Web. Marc Andreessen Tim Berners-Lee Bill Gates Steve Jobs

Tim Berners-Lee

Which of the following is NOT used to transmit signals on a network? Twisted-pair Topology Wi-Fi Fiber-optic

Topology

Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established. WLAN LAN PAN VPN

VPN

A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices. WAN MAN WLAN PAN

WAN

In a WLAN, devices are connected by ________. RFID Bluetooth Wi-Fi ultraviolet

Wi-Fi

Which of the following statements about cable Internet access is TRUE? It is universally available. It is slower than dial-up. Speeds range from 1 Kbps to 100 Kbps. You share the bandwidth with your neighbors.

You share the bandwidth with your neighbors.

________ is an example of a social sharing site where anyone can share video that they create. Skype Flickr MySpace YouTube

YouTube

You would install a(n) ________ if you wanted to block ads from appearing in your web browser. add-on taskbar toolbar plug-in

add-on

A moderated chat room ensures that ________. all content is screened parental controls are in effect no one under the age of 18 is online only subscribers participate

all content is screened

Network speeds are measured in ________ per second. bits hertz nanos bytes

bits

When you set up a new email account, you may have to enter a distorted series of letters and numbers, called a ________, to ensure that you are a human and not a computer. verification signature password captcha

captcha

Which of the following is the search term to find information about Chevrolet vehicles excluding the Corvette model? chevrolet NOT corvette chevrolet OR corvette chevrolet AND corvette chevrolet BUT corvette

chevrolet NOT corvette

A ________ network is one that has at least one computer at its center that provides centralized management, resources, and security. peer-to-peer client-server workgroup homegroup

client-server

The least expensive form of Internet connection is usually ________. dial-up cable FTTH DSL

dial-up

All of the information that someone can find out about you by searching the web is called your ________. folksonomy tagged information digital footprint avatar

digital footprint

A ________ is a network composed of a group of clients and servers under the control of one central security database. protocol workgroup homegroup domain

domain

In the URL http://www.irs.gov, irs is the ________. TLD subdomain domain name protocol

domain name

One of the most popular C2C websites is ________. PayPal Amazon eBay Google Checkout

eBay

A ________ can be set by an employer to prevent you from accessing eBay. wireless access point router firewall switch

firewall

A ________ can be used to block unauthorized access to a network. switch firewall hub filter

firewall

You would most likely find a P2P network in a(n) ________. university home library corporation

home

The tools that enable users to create user-generated content, connect, network, and share are called social ________. channels media methods connections

media

If you would like to get a security report about a website, you can click on the ________ icon when it is available. padlock star gear question mark

padlock

In a ________ network, each computer is considered equal. wide area virtual private client-server peer-to-peer

peer-to-peer

You are ________ when you decide to use your neighbor's open wireless network without their permission. wardriving trolling hacking piggybacking

piggybacking

A third-party program, such as Adobe Flash Player, is considered to be a(n) ________. toolbar tab plug-in add-on

plug-in

In the URL http://www.irs.gov, http is the ________. subdomain protocol domain name TLD

protocol

The rules for communication between devices are called ________. protocols stacks packets queues

protocols

Podcasts allow time ________, which means that you can listen on your own schedule. delay shifting warping lagging

shifting

An email ________ is a block of text that is automatically put at the end of your messages. salutation signature identifier closing

signature

________ communication allows you to send a message to someone who is not online at the same time. Dynamic Synchronous Static Asynchronous

Asynchronous

Services that one business provides for another are called ________. B2C B2B C2C C2B

B2B

When you buy a textbook online from Amazon.com, you are participating in ________ e-commerce. B2B A2C C2A B2C

B2C

When you are sending one email to all of your friends in your address book, you should use the ________ field to keep their addresses private. Cc: Bcc: Pcc: To:

Bcc:

In a PAN, devices are connected by ________. ultraviolet infrared Bluetooth RFID

Bluetooth

For which of the following uses was the Internet2 NOT designed? Research Collaboration Education Business

Business

Which of the following is an example of a social bookmarking site? Delicious Wikipedia Facebook Twitter

Delicious

The Internet was originally created as a communication system for the ________. Department of Defense University System U.S. Congress Department of Education

Department of Defense

Wi-Fi networks used in homes and public hotspots use the ________. W3C standards POP protocols IEEE 802.11 standards SMTP protocols

IEEE 802.11 standards

Which of the following statements about email is FALSE? It cannot be accessed by hackers. Email can be used for targeted marketing. Your employer may read your email at your work. Copies of your email may exist on several servers even after the recipient deletes it.

It cannot be accessed by hackers.

For a company that uses only two floors of an office building, all of the company's computers and printers will be connected by a ________. PAN MAN WAN LAN

LAN

Which of the following could become a member of the Internet2? Amazon Facebook CNN Library of Congress

Library of Congress

________ is a business-centered social network that is designed for business connections. Facebook Yahoo! LinkedIn Twitter

LinkedIn

The first point-and-click graphical web browser was ________, which later became Netscape. Mosaic Internet Explorer Safari Chrome

Mosaic

________ recommends music to you based on your listening preferences. Pandora Picasa Flickr SnapDragon

Pandora

Which of the following was NOT one of the nodes on the original Internet system? Stanford Research Institute (SRI) Princeton University of Utah in Salt Lake City University of California, Santa Barbara (UCSB)

Princeton

A(n) ________ feed keeps you updated on podcasts and news feeds to which you have subscribed. DNS RSS NSS PSS

RSS

The practice of using social media to sell services is called ________. RSS SSL SMM SMS

SMM

Which of the following protocols is used for sending email? SMTP HTTP FTP POP

SMTP

________ is the most popular browser for Macs. Firefox Chrome Opera Safari

Safari

If you have a summer cabin in the mountains, which broadband service are you likely to use? DSL Satellite Fiber Cable

Satellite

________ is an example of a microblogging site that allows a limited number of characters in a post. Tumblr Flickr The Blogosphere Blogger

Tumblr

A ________ is similar to an online journal, in which you can write about anything you want to share. bulletin chronicle log blog

blog

A corporation would want to utilize a ________ network. workgroup peer-to-peer client-server homegroup

client-server

Wikis are designed for ________, allowing people to contribute more than just posting a response. collaboration expert opinions asynchronous communication synchronous communication

collaboration

When you trust the collective opinion of a crowd of people rather than an expert, it is known as ________. crowdsourcing crowdreferencing crowdsampling crowdresourcing

crowdsourcing

A ________ is a device that connects two or more networks together. hub switch router modem

router

If you want to connect your home network to the Internet, you will need a ________ in addition to a modem. router switch terminator repeater

router

Email sends electronic messages using ________ technology. store-and-forward get-and-put push-and-pull forward-and-push

store-and-forward

When data packets travel within a network, a ________ is used to get the data packets to the correct port. bus repeater switch router

switch

One benefit of using a fiber optic backbone for the Internet2 is that ________. all computers have the wiring to accept fiber optic signals the data is less prone to corruption it is easier to install it is less expensive to install

the data is less prone to corruption

A conversation that takes place on a discussion board is called a ________. dialog post thread debate

thread

Moving through a neighborhood trying to locate open wireless access points is called ________. wardriving trolling hacking surfing

wardriving

Programs that interpret HTML to display a webpage are called ________. web browsers interpreters compilers translators

web browsers

________ e-commerce allows anyone to sell or trade your items online. C2C C2B B2B B2C

C2C

________-based chats require you to install specific software in order to access them. Server User Web Client

Client

One of the most important reasons for Ethernet standards is they ________. assure equipment from different manufacturers is compatible prevent overburdening your computer can prevent unauthorized users from accessing the Internet allow the government to keep tabs on what you are doing

assure equipment from different manufacturers is compatible

In a virtual community, you can communicate with other people by using a(n) ________. captcha alias profile avatar

avatar


संबंधित स्टडी सेट्स

ch.24 Asepsis and Infection Control

View Set

CIN 2103 - Chapter 8 (Subnetting)

View Set

Government Exam 1 Study Questions Chapter 1

View Set

(Book 3) Ch. 4 - Ownership Rights and Limitations

View Set

Biochem Chapter 2 Learning Objectives

View Set