BCA Chapter 4. Internet Review Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which symbol, which is used to mark keywords or topics in a message, was popularized by Twitter?

# hashtag

Which of the following is NOT one of the specifications of Wi-Fi technology?

802.11z

It is common to use ___ when sending email to a large group of people, especially if you want to protect the privacy of the recipients' email address.

BCC- blind carbon copy

Which term refers to the large volumes of data that are constantly being generated by our devices and digital transactions?

Big Data

Which of the following refers to large networks of compromised computers that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks?

Botnets

A popular type of network attack, known as a(n) ___ attack, allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

DDoS

Which of the following connection types is generally the SLOWEST?

DIAL up

___ can clog cooling systems such as fans, which in turn may cause hardware to overheat.

Dust

___ is a standard for LANs that uses a star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

Ethernet

___ are discussion boards where individuals can ask questions and reply to each other.

Forums

192.168.1.101 is an example of a(n):

IP address

___ is a social network that is designed with a strictly business-oriented focus.

LinkedIn

A(n) ___ uniquely identifies every network-connected device in the world.

MAC address

A(n) ___ is a set of software tools that enables managers to gather, organize, and evaluate information.

MIS

A(n) ___ is a huge online course offered for free by a variety of universities, including prestigious ones such as Princeton, Harvard, and MIT.

Massive Open Online Course (MOOC)

Which streaming service often accounts for over 30 percent of all internet traffic in North America?

Netflix

Sling, a popular ___ service, allows users to watch many of their favorite cable channels live.

OTT- over the top

___ file sharing uses a distributed network of individual users instead of a central server to transfer files.

P2P ( peer 2 peer)

___ are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

Packets

___ is a model whereby advertisers pay for their ads only when a website visitor clicks on the ad.

Pay-per-click

___ is an example of an online payment service that allows you to pay for goods online and transfer money to other individuals.

PayPal

Which strategy involves luring individuals into entering personal information into a website that is controlled by a hacker?

Phishing

____ on Twitch often make millions of dollars a year by broadcasting themselves playing and discussing video games.

Professional Streamers

___ is a social news site that encourages users to share links to news and other interesting content they find on the web. It is also famous for hosting AMA sessions.

Reddit

___ systems can be incrementally expanded to provide increasing amounts of computing power, storage, and/or software when the need arises.

Scalable

One of its most powerful features of Google Maps is ___, which shows you almost any part of the map as if you were driving through that street.

Street View

Which network device provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it?

Switch.

Which browser feature allows you to have multiple web pages open in one browser window?

Tabbed Browsing

A(n) ___ contains a rechargeable battery, allowing it to run a computer system for a given amount of time if the power fails.

UPS

A(n) ___ is another name for the full address that is used to locate a web page on the internet.

URL

Bit.ly is a popular example of a(n):

URL shortener

A popular way for both individuals and businesses to increase the security of a network connection (via tunneling) is by using a(n):

VPN

___ translates analog voice signals into digital data and uses the internet to transport the data.

VoIP

A(n) ___ is the connection of two or more central computers or local area networks, generally across a wide geographical area.

WAN

Although many of the articles in ___ are written and edited by experts, you cannot be 100 percent certain that the specific information you need comes from a credible source.

Wikipedia

Which of the following is a global system of linked, hypertext documents?

World Wide Web WWW

Which of the following is NOT a web browser?

Yahoo

All nodes connect to a wireless ___ in order to communicate wirelessly.

access point

The ___ part of an email contains any file(s) included with the message.

attachments

Typically measured in Mbps or Gbps, ___ is the amount of data that can be transmitted over a given amount of time.

bandwidth

A page or website that contains chronological posts and comments from individuals or organizations is known as a(n):

blog

Communication speeds between you and your ISP are measured in:

bps

The small data files known as ___ are used by websites to remember users and their preferences.

cookies

A ___ is any step you take to ward off a threat.

countermeasures

___ websites, such as Kickstarter, allow any organization or individual to solicit funds from the general public in exchange for a future good or service.

crowdfunding

Bitcoin is an example of:

cryptocurrency

The internet is ___, meaning no single person or group controls it.

decentralized

Which part of a URL uniquely identifies a site and a brand on the web?

domain

A(n) ___ system is a type of information system that performs analytical tasks traditionally done by a human, typically by using information contained in a knowledge base.

expert

Systems known as ___ are able to continue their operation even when problems are present.

fault-tolerant

Many thieves use the temptation of free (illegal) software on ___ services to lure individuals into downloading malware.

file-sharing

Freelance workers, such as the drivers that deliver food that was ordered via an app, are part of the booming ____ economy.

gig

Today, the term ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

hacker

Your browser's ___ keeps the name and URL of every site you have visited, and allows browsers to autocomplete the URL when you type the first few characters.

history

If your smartphone is set up as a mobile ___, it can offer Wi-Fi access to devices near it.

hotspot

Unlike an email, which can be read by the recipient at any time, ___ engage individuals in a live conversation.

instant messengers IM

Machines that communicate over a network must follow certain rules, or ___, to ensure that the packets are sent, received, and interpreted properly.

protocols

The wireless access points that are used in homes contain integrated ___, as do the devices that ISPs typically provide for internet connectivity.

routers

When users type specific keywords into a ___, they will receive an organized list of matching sites, images, and news articles that contain those keywords.

search engine

Services such as ___ and Microsoft Teams include many real-time communication tools, along with a variety of apps and services, to make it easier for teams to wok on projects together.

slack

___ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

social engineering

Which type of malware is designed to report activity on your computer to another party?

spyware

Which device can guard connected equipment against large power spikes or surges that may infrequently occur?

surge protector

The ___ of a network is the logical layout of the cables and devices that connect the nodes of the network.

topology

Which microblogging service famously restricts posts to 280 characters?

twitter

___ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.

two factor authentication

Which type of malware is attached to a host file and has the ability to replicate, or copy, itself?

virus

There are three general strategies used to authenticate individuals. Which of the following is NOT one of them?

who you know

A(n) ___ is a collaboration information site that encourages people with subject knowledge to contribute at their convenience, adding to or fixing pages where information is missing or incorrect.

wiki

Many trace the internet's history to ___, a network connecting computers at four universities in 1969.

ARPANET

Data ___ is the discovery of new patterns or relationships between data.

mining

As the largest ___ in the world, the internet connects billions of people and organizations.

network

Networks use media to carry data from one ___, or connection point, to another.

node

A browser ___ is a separate program that allows your web browser to play several types of multimedia content.

plug in

Which type of malware consists of a fully-contained program that self-replicates and spreads through computers and networks?

worm


Set pelajaran terkait

6.3 Explain the core concepts of Public Key Infrastructure

View Set

ch. 18 & 19 arteries, veins & functions of vessels

View Set

MIST 5775 Quiz 1: Fundamental CTI Concepts

View Set

Complete IELTS Bands 6.5-7.5, Unit 1 Word List

View Set

Past Tests Questions: Final review

View Set

Macroeconomics exam 2 study guide

View Set

LSB 3213 Chapter 33: Agency Liability and Termination

View Set