CIS 110 Module 2 - Ch. 4-5-6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is a recorded audio or video file that can be downloaded via the Internet?

A podcast In addition to written online communication, there are some types of online communications that utilize audio or video. For example, a podcast is a recorded audio or video file that can be downloaded via the Internet. See 5-5: Beyond Browsing and Email

The first computer network, consisting of four computers, created by the U.S. Department of Defense

ARPANET

The roots of the Internet began with an experimental project called _____ created in 1969 by the U.S. Department of Defense Advanced Research Projects Agency (ARPA).

ARPANET The roots of the Internet began with an experimental project called the Advanced Research Projects Agency Network (ARPANET) created in 1969 by the U.S. Department of Defense Advanced Research Projects Agency (ARPA). As ARPANET grew during the next decade, networks at hundreds of colleges and universities were connected to it. See 5-1: Evolution of the Internet

A word or symbol that identifies the relationship between keywords, such as AND, OR, and NOT

Boolean operator

In the accompanying figure, box _____ denotes the area where the email sent by a user is stored until the recipient opens the email.

D Email (more formally called electronic mail) is the process of exchanging electronic messages (emails) over a network, typically the Internet. In the accompanying figure, box D denotes the area where the email sent by a user is stored until the recipient opens the email. See 5-4: Email and Messaging

Patented the first mouse in 1970

Douglas Englebart

Set up ____________ if you want to be notified when new online information about a topic becomes available.

Google Alerts

____ are the ruling bodies of countries that can pass laws that impact both the information available via the Web and the access their citizens have to the Internet.

Governments Governments are the ruling bodies of countries that can pass laws that impact both the information available via the Web and the access their citizens have to the Internet. For example, in France, it is illegal to sell items or post online content related to racist groups or activities. See 5-1: Evolution of the Internet

Company that offers Internet access to individuals and businesses.

ISP

The largest network in the world, consisting of millions of interconnected networks

Internet

The world's largest wide area network

Internet

_____ is a consortium of researchers, educators, and technology leaders from industry, government, and the international community who are dedicated to the development of revolutionary Internet technologies.

Internet2 Internet2 is a consortium of researchers, educators, and technology leaders from industry, government, and the international community who are dedicated to the development of revolutionary Internet technologies. Designed as a research and development tool to help create technologies that ensure the Internet can handle tomorrow's applications, Internet2 is working to deploy advanced applications and technologies that might not be possible otherwise with today's Internet. See 5-1: Evolution of the Internet

Which of the following statements are true of Internet2?

It is the first national network to use 100 Gigabit Ethernet over its entire footprint. ​It uses low-performance networks which can link only 200 member institutions to deploy and test new network applications and technologies. Answers: a. ​It supports only low bandwidth applications. Correctb. ​It is the first national network to use 100 Gigabit Ethernet over its entire footprint. c. ​It uses low-performance networks which can link only 200 member institutions to deploy and test new network applications and technologies. d. ​It initially connected four supercomputers. Answer Feedback: Internet2 is a consortium of researchers, educators, and technology leaders from industry, government, and the international community who are dedicated to the growth of revolutionary Internet technologies. See 5-1: Evolution of the Internet

_____ is an example of a professional networking site where you keep in touch with business contacts.

LinkedIn

Computers need this hardware to connect to a network.

NIC

Bluetooth is a technology often used in this type of network

PAN

____ is an example of an online payment service.

PayPal Answer Feedback: Correct. PayPal is an example of an online payment service. Online shopping is commonly used to purchase both physical products—such as clothing, shoes, and furniture—as well as downloadable products—such as software, movies, and e-books—via Web pages like the L.L.Bean Web page. See 5-5: Beyond Browsing and Email

A(n) _________ is a data format used to provide frequently updated Web content delivered directly to your browser or e-mail software.

RSS feed

Which of the following provides leadership in addressing issues that may impact the future of the Internet?

The Internet Society The Internet Society provides leadership in addressing issues that may impact the future of the Internet. It also oversees the groups responsible for Internet infrastructure standards, such as determining the protocols that can be used and how Internet addresses are constructed, as well as facilitating and coordinating Internet-related initiatives around the world. See 5-1: Evolution of the Internet

Identify a disadvantage of Web-based training and distance learning.

There is a possibility of technological problems. Answers: a. ​Each user cannot learn at his or her own pace. b. ​Employee training is impossible. Correctc. ​There is a possibility of technological problems. d. ​Content cannot be updated as needed. Answer Feedback: Correct. A disadvantage of Web-based training and distance learning is the possibility of technological problems. Because students need a working computer and Internet connection to access the material, they cannot participate if their computer, their Internet connection, or the Web server hosting the material goes down. See 5-5: Beyond Browsing and Email

Created the World Wide Web in 1989

Tim Berners-Lee

A private, secure path across a public network (usually the Internet).

VPN

Which of the following is a term used by individual providers for fiber-to-the-premises (FTTP)?

Verizon FOS In areas where fiber-optic cabling runs all the way to the building, a relatively new type of very fast direct Internet connection is available to homes and businesses. This type of Internet connection is generically called broadband over fiber (BoF) or fiber-to-the-premises (FTTP), with other names being used by individual providers, such as Verizon FOS and Google Fiber. See 5-2: Connecting to the Internet

Agency that sets standards and guidelines for the Web

W3C

____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online.

Web 2.0 A growing number of today's Web-based applications and services are referred to as Web 2.0 applications. It generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online. See 5-1: Evolution of the Internet

In a(n) _______, participants can use a chat window to send typed messages to each other.

Web conference

An automated program that uses hyperlinks to jump between Web pages and collect data

Web crawler

(n)___________ is a type of online conference where a presenter provides some type of instructional activity.

Webinar

A collection of millions of Web sites

World Wide Web

Identify how wireless networks differ from wired networks.

a. ​Unlike wired networks, wireless networks tend to be faster and more secure. b. ​Unlike wired networks, wireless networks can be accessed only when they are connected to the home network. c. ​Unlike wired networks, wireless networks allow easy connections in locations where physical wiring is impractical. d. ​Unlike wired networks, wireless networks physically connect the computers and other devices on the network. 6 5 out of 5 points Correct Identify how wireless networks differ from wired networks. Selected Answer: Correctc. ​Unlike wired networks, wireless networks allow easy connections in locations where physical wiring is impractical. Answers: a. ​Unlike wired networks, wireless networks tend to be faster and more secure. b. ​Unlike wired networks, wireless networks can be accessed only when they are connected to the home network. Correctc. ​Unlike wired networks, wireless networks allow easy connections in locations where physical wiring is impractical. d. ​Unlike wired networks, wireless networks physically connect the computers and other devices on the network. Answer Feedback: Correct. Unlike wired networks, wireless networks allow easy connections in locations where physical wiring is impractical or inconvenient as well as provide much more freedom about where you can use your computer. With wireless networking, for example, you can surf the Web on your notebook or tablet from anywhere in your house or backyard, access the Internet with your portable computer or smartphone while on the go, and create a home network without having to run wires among the rooms in your house. See 4-2: Network Characteristics Response Feedback: Correct. Unlike wired networks, wireless networks allow easy connections in locations where physical wiring is impractical or inconvenient as well as provide much more freedom about where you can use your computer. With wireless networking, for example, you can surf the Web on your notebook or tablet from anywhere in your house or backyard, access the Internet with your portable computer or smartphone while on the go, and create a home network without having to run wires among the rooms in your house. See 4-2: Network Characteristics Question 7

Which of the following statements is true of the global positioning system (GPS)?

a. ​It is used in determining exact geographic locations. a. ​It is used in determining exact geographic locations. b. ​It is used to avail work from home facilities. c. ​It uses satellite technology to schedule meetings with clients. d. ​It provides medical information and services worldwide

Which of the following statements is true of a network adapter?

a. ​It needs to support the type of cabling or signals being used. a. ​It needs to support the type of cabling or signals being used. b. ​It prevents the conversion of signals from digital to analog, and vice versa. c. ​It is independent of the type of Internet access being used. d. ​It is built into a device as a bridged card

In the context of networking hardware, which of the following is true of wired networks that have a central device called a hub?

a. ​The bandwidth of the network is shared. a. ​The bandwidth of the network is shared. b. ​The network breaks down the data at the sender's end and then reassembles it at the receiver's end. c. ​The network forwards the data only to the intended receiver. d. ​The network is extremely efficient.

Which of the following statements is true of Wi-Fi (802.11)?

a. ​Wi-Fi is designed for medium-range data transfers—typically between 100 and 300 feet indoors and 300 to 900 feet outdoors. a. ​Wi-Fi is designed for medium-range data transfers—typically between 100 and 300 feet indoors and 300 to 900 feet outdoors. b. ​The speed of a Wi-Fi network is independent of the Wi-Fi standard being used. c. ​Wi-Fi is designed for low-range data transfers—typically between 10 and 30 feet indoors and 30 to 90 feet outdoors. d. ​The speed of a Wi-Fi network is independent of the number of solid objects between the access point and the computer or other device being used.

Conventional television and radio networks, cellular telephone networks, and satellite TV networks are examples of _____.

a. ​wireless networks a. ​wireless networks b. ​wired networks c. ​reinforced networks d. ​bounded networks

Identify a method of data transmission used primarily with local area networks (LANs).

b. ​Broadcasting a. ​Clocking b. ​Broadcasting c. ​Packet switching d. ​Circuit switching

Which of the following is one of the key enhancements of Bluetooth 4.0?

b. ​Energy efficiency a. ​Need of cables between devices for data transfer b. ​Energy efficiency c. ​Use of Wi-Fi signals d. ​Large-range connectivity

A computer network is a collection of _____.

b. ​systems and other hardware devices that are connected so users can share hardware, software, and data as well as communicate with each other electronically a. ​programs that perform tasks that users are directly interested in, which includes operating systems and any program that supports application software b. ​systems and other hardware devices that are connected so users can share hardware, software, and data as well as communicate with each other electronically c. ​documents called Web pages available through the Internet d. ​related fields in a data organization that can be stored, sorted, and queried

The main disadvantage of fiber-optic cabling is _____.

b. ​the initial expense of both the cable and the installation a. ​its slow speed when used to connect networks housed in separate buildings b. ​the initial expense of both the cable and the installation c. ​the use of metallic fiber strands instead of glass or plastic fiber strands d. ​its susceptibility to interference

Fast Ethernet has a maximum speed of _____.

c. ​100 Mbps a. ​40 Mbps b. ​10 Gbps c. ​100 Mbps d. ​400 Gbps

In the context of network topologies, which of the following is true of a star network?

c. ​It is a network that uses a central device through which all network transmissions are sent. a. ​It is a network that uses a central cable to which all network devices connect. b. ​The network continues to function even if the central device fails. c. ​It is a network that uses a central device through which all network transmissions are sent. d. ​The network contains multiple devices so that data can take any of several possible paths from source to destination.

Which of the following ranges of the electromagnetic spectrum is sometimes referred to as the wireless spectrum?

c. ​Radio frequency (RF) a. ​Gamma ray b. ​Infrared (IR) transmission c. ​Radio frequency (RF) d. ​X-ray

Most networking media send data using _____ in which data is represented by only two discrete states: 0s and 1s.

c. ​digital signals a. ​exponential signals b. ​ramp signals c. ​digital signals d. ​contiguous signals

With fixed WiMAX, it is feasible to provide coverage to an entire city or other geographical area by using _____.

c. ​multiple WiMAX towers and overlapping hotzones a. ​a single WiMAX tower with a single hotspot b. ​multiple WiMAX towers and a single hotspot c. ​multiple WiMAX towers and overlapping hotzones d. ​a single WiMAX tower with overlapping hotzones

Instant messaging is commonly referred to as _____.

chat Answer Feedback: Correct. Instant messaging, also commonly referred to as chat, allows one to exchange real-time messages with others. They can be sent via computers and smartphones using installed messaging programs or apps such as Hangouts, Kik, and What's App. See 5-4: Email and Messaging

Network architecture in which one or more high-powered computers provide resources or services to other computers on the network.

client/server

Businesses participate in social networks to encourage _____ to post messages with questions, comments, and ratings.

consumers

The biggest advantage of Voice over Internet Protocol (VoIP) is _____.

cost savings Answer Feedback: Correct. The biggest advantage of Voice over Internet Protocol (VoIP) is cost savings, such as unlimited local and long-distance calls for as little as $25 per month, or basic cable and VoIP services bundled together for about $50 per month. One of the biggest disadvantages of VoIP is that it does not function during a power outage or if the Internet connection goes down, though some VoIP services are able to forward calls to a landline or mobile phone during outages. See 5-5: Beyond Browsing and Email

Which of the following is an advantage of Internet Protocol Version 6 (IPv6) and is not available in Internet Protocol Version 4 (IPv4)?

d. ​In IPv6, all devices in a home or business are accessible on the Internet directly by their own Internet Protocol (IP) address. a. ​IPv6 uses 32-bit addresses, which allows for 232 possible unique addresses. b. ​In IPv6, the router always recalculates a checksum when header fields are altered, such as time to live (TTL) or hop limit. c. ​IPv6 addresses can be used for television and radio broadcasting. d. ​In IPv6, all devices in a home or business are accessible on the Internet directly by their own Internet Protocol (IP) address.

Which of the following statements is true of the Transmission Control Protocol (TCP)?

d. ​It is responsible for the delivery of data. a. ​It is used in broadcast and multicast connections. b. ​It is faster than the User Data Protocol (UDP). c. ​It does not allow users to create block boundaries. d. ​It is responsible for the delivery of data.

Identify a protocol that is used to retrieve emails.

d. ​Post Office Protocol (POP3) a. ​Address Resolution Protocol (ARP) b. ​Simple Mail Transfer Protocol (SMTP) c. ​File Transfer Protocol (FTP) d. ​Post Office Protocol (POP3)

The amount of data that is actually transferred under real-life conditions is called _____.

d. ​throughput a. ​jitter b. ​interplay data c. ​latency d. ​throughput

With a _____ network connection, the computers and other devices on the network are physically connected via cabling to the network.

d. ​wired a. ​radionic b. ​cellular c. ​shortwave d. ​wired

Consumers read product descriptions and reviews and compare features and prices of similar

e-tail Web sites

Type of network that allows an organization to permit outsiders, like customers or suppliers, to access part of its network.

extranet

Search engines place the most relevant ___________ on the first few pages of search results.

hits

Readers develop and refine news reports by commenting on them and posting contributions.

hybrid web sites

A private corporate network for use by employees to coordinate e-mail and communications.

intranet

When preparing for a search, choose ________________ that make the search term unique and specific.

key words

The unethical practice of manipulating meta keywords to push a Web site to the top of a search result list

keyword stuffing

In _______________, blog members post eye-witness accounts of events.

live blogging

When you use wireless mobile devices to make retail purchases, you are engaging in ____________.

m-commerce

Facebook is an example of a(n) _____.

social networking site Facebook is an example of a social networking site. A social networking site can be loosely defined as any site that enables individuals to connect and interact with other individuals, such as by following each other's activities and posting messages. See 5-5: Beyond Browsing and Email

In ______________ online education, the instructor holds a class that students attend virtually and at the same time.

synchronous

A(n) ____________ allows people at two or more locations to meet electronically using a network to transmit video and audio data.

video conference

A collection of related Web pages connected by hyperlinks

web site

Type of network in which data travels from one device to another over cables

wired network

A communications device a laptop uses to connect to networks

wireless adapter

Type of network in which data travels through the air

wireless network

One way to refine a search term is to use a word base, or ____________ , to broaden the search.

word stem

Rihanna owns a publication in New Jersey. She uses a Web-based software, Open Journals, to manage her publication works. She often downloads many Web-based applications needed for her work. Here, _____ are the companies that distribute Web-based software facilities to Rihanna over the Internet.

​Application service providers Application service providers (ASPs) are the companies that manage and distribute Web-based software services to Rihanna over the Internet. Instead of providing access to the Internet like Internet service providers (ISPs) do, these companies provide access to software applications via the Internet. See 5-1: Evolution of the Internet

In the accompanying figure, boxes _____ denote the transfer of an email from a sender's mail server to a receiver's mail server.

​B-D Answer Feedback: Incorrect. Email messages can be sent from any Internet-enabled device, such as a personal computer or smartphone, to anyone who has an email address. See 5-4: Email and Messaging

____ is the largest and most well-known computer network, linking billions of computers all over the world.

​The Internet Answer Feedback: Correct. The Internet is the largest and most well-known computer network, linking billions of computers all over the world. As it has evolved over the past two decades or so, it has redefined how people think about computers, communications, and the availability of news and information. See 5-1: Evolution of the Internet

Internet2 is _____

​a research and development tool that is focused on speed Internet2 is a consortium of researchers, educators, and technology leaders from industry, government, and the international community who are dedicated to the growth of revolutionary Internet technologies. See 5-1: Evolution of the Internet

The term podcast is derived from the _____.

​iPod The term podcast is derived from the iPod (the first widely used device for playing digital audio files), although one can also listen to podcasts today using a computer or mobile phone. See 5-5: Beyond Browsing and Email

According to the online version of the Merriam-Webster Dictionary, the term _____ means "to steal and pass off the ideas or words of another as one's own."

​plagiarize Answers: a. ​peptonize b. ​journalism Correctc. ​plagiarize d. ​dualism Answer Feedback: Correct. According to the online version of the Merriam-Webster Dictionary, the term plagiarize means "to steal and pass off the ideas or words of another as one's own" or to "use another's production without crediting the source." To avoid plagiarizing Web page content, one should credit Web page sources—as well as any other Internet resources—when he or she uses them in papers, on Web pages, or in other documents. See 5-3: Searching the Internet

Consists of multiple keywords

search phrase

With _______________, you can view or listen to online content at any time rather than according to a set schedule.

on-demand media

People use a computer connected to the Internet to manage financial accounts.

online banking

A social network is a Web site that links people to form a(n) _____ with shared interests and experiences.

online community

Students connect to instructors, information, and other students using a computer and the Internet.

online education

With ______________, you can buy and sell stocks and bonds without using a broker.

online investing

Listeners can create a personal radio station by listening to songs and then voting for the ones they like or dislike.

online music service

A network where each computer is equal to others and maintains its own operating system and application software.

peer-to-peer

Network technology best suited to networks of ten or fewer computers.

peer-to-peer

Type of network that can transmit data from a media player to a computer's speakers

personal area network (PAN)

Flicker, Shutterfly, and Photobucket are ________ social networks.

photo-sharing

A(n) __________________ is an audio file stored online that can be distributed via download.

podcast

To customize search results, you can change _________ , such as the number of results displayed per page.

preferences

On a social network, you create an online form to create a virtual identity, or _____, which includes information you choose to describe yourself.

profile

This device connects two or more networks and directs the flow of information along the network.

router

Creates a query based on your search criteria and stores the data it collects in a database.

search engine


Set pelajaran terkait

Object Oriented Design - Java - Midterm

View Set

SCOPE OF HRM/ THREE MAJOR SUBFIELDS

View Set

Fluid, Electrolytes & Acid-Base Balance

View Set

Google UX Design Professional Certificate

View Set

1.3 Analyzing potential indicators associated with application attacks

View Set

DC Criminal Justice Complete Review

View Set

Biology Assignment 12-Cell Regulation

View Set