CS103

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A not-for-profit organization will usually -- though not necessarily -- use the _____ domain.​

.org

3G wireless offers data transfer rates of up to ____ Mbps.

2

Text messages were first made available to cell phone users with the advent of ____ technology

2G

The hotspot created by MiFi is password protected and can be used to connect Wi-Fi devices located within ____ feet of the MiFi device to the Internet.

30

An SSID may contain up to ____ alphanumeric characters

32

Some mail servers will reject messages with too many recipients (usually ____ or more).​

50

All of the following are 802.11 standards EXCEPT_____.

802.11ad

When you do online banking, you are participating in _____.

B2C

If you make homemade knitted garments and you sell them to individuals online, you are participating in _____ e-commerce.

C2C

The MiFi device is produced by the company ____.

Novatel

​____ is a term for finding and using somebody else's wireless network, usually illicitly.

Piggybacking

All devices that connect to the wireless network must use the _____

SSID

Windows Live Messenger has been replaced with _____.

Skype

​____ is a standard that was developed by the Wi-Fi Alliance to address some of the inherent weaknesses in WEP.

WPA

​____ is the term for driving through a neighborhood with a wireless-enabled notebook looking for unsecured wireless networks.

Wardriving

​____ is probably the most famous wiki in the world.

Wikipedia

​The HTML ____ tag enables web designers to link HTML documents to each other.

anchor

​With WEP encryption, the key being used to encrypt the data is sent over the network ____ the actual data is encrypted.

before

​The Bluetooth security concern posing the lowest threat is that of ____.

bluejacking

​A(n) ____ is a small file that a web server writes to the disk drive of the client computer, containing information about the user.

cookie

​A(n) ____ comes into existence as soon as a work is placed into a tangible form.

copyright

​If you change the default name of the wireless router or access point, you also prevent unknown users from detecting your network by attempting to randomly connect to a wireless network using a manufacturer name or the word "____" as an SSID.

default

A MAC address contains ____

digits and letters

Bloggers often used code ______ to create hyperlinks and embed photos in postings.

hackers

In the beginning of wireless technology, some devices used _____ technology to "beam" information from one source to another source without the use of wired connections.

infrared

​Disabling the SSID broadcast of a network makes that network ____ to roaming devices.

invisible

In addition to storing a contact's email address in Google Contacts, you can store all of the following EXCEPT _____.

labels

​All of the following are important to the quality of a well-designed website EXCEPT _____.

lack of captions

A ____ attack occurs when transmissions, such as messages between users, logins, and normal connections with Web servers, that are being sent between two devices are intercepted by a third party

man-in-the-middle

​Firefox allows for easy drag-and-drop modifications to its _____.

menu

​A(n) ____ is a form of blogging in which users send short messages on a very frequent schedule.

microblog

A wireless router broadcasts its SSID as a means of identifying the network's ____

name

A ____ is a user-entered key that encrypts data sent over a network.​

passphrase

A collection of devices connected via Bluetooth technology is called a(n) ____

piconet

​The Internet of Things (IoT) uses _____ to collect and transmit data using wireless connections so that data can be acted upon by a person or another machine.

sensors

A basic search page includes a _____ box for entering a search expression and a command button to begin the search.​

text

The webpage ____ will usually appear directly above the main content of the page.​

title

The addition of a Web camera (also called a ____) enables users to participate in a video chat, in which participants can see and speak to each other.

webcam​

A(n) ____ local area network is a network in which devices use high-frequency radio waves to communicate with a base station, which is connected to the Internet.

wireless

All of the following are email acronyms noted in the text EXCEPT ____.​

wth

The correct format for a hashtag is ____.

​#professor

Second-generation (2G) wireless networks transfer data at a rate of ____.

​14.4 Kbps

The ICQ, which extended the capabilities of the original Tal program, started in ____, and is still used world-wide today.

​1996

Web ____ caters to user-generated content.

​2.0

YouTube was started in ____ as a private venture.

​2005

​In the U.S., a work that was created in 2000 by an individual author who died in 2005 will be protected by copyright until ____.

​2075

​Currently, WWANs provide wireless connections to the Internet using ____ networks created by cellular phone carriers.

​3G and 4G

​Encryption keys are generally ____ or ____ bits long.

​64, 128

Facebook has a large number of active users, and more than ____ of its users check their Facebook pages daily.​

​65%

____ was the first to make APIs available to other developers.

​Amazon.com

​Edge uses the _____ search engine as its default.

​Bing

​Bluetooth standards and licensing for all Bluetooth products is officially overseen by ____.

​Bluetooth SIG

In January 2004, the U.S. ____ law went into effect.​

​CAN-SPAM

​The following is NOT on the security checklist for installing a wireless router: ____.

​Change the SSID frequently because SSIDs are not case sensitive

Jarkko Oikarinen wrote a multiuser communications program called Internet Relay ____ (IRC).

​Chat

Usenet was founded in 1979 at ____ and is a way of collecting information and storing it by topic category.

​Duke University

MIME stands for Multipurpose Internet Mail ____.​

​Extensions

Political candidates, grassroots campaigns, television programs, and millions of businesses have ____ that are an integral part of their marketing efforts.

​Facebook pages

____ is a photo-sharing site.

​Flickr

Facebook, which began in 2004 as a closed network for college students and later was expanded to include high school students, was founded by Mark Zuckerberg, then a student at ____ University.

​Harvard

​The ____ is useful when you know you visited a site recently but you did not create a favorite and you cannot recall the URL of the site.

​History feature

All of the following host popular websites offering weather information and forecasting EXCEPT ____.

​Hubble Climate

​Private browsing mode in Chrome is called _____ .

​Incognito

_____ is a photo-sharing site and a social network.

​Instagram

____ is a general term that includes all products of the human mind, including original ideas.

​Intellectual property

​The following are all major wire services EXCEPT ____.

​Interfax

Unlike ______, which is a social network open to business professionals, _____ is a social networking site restricted to credentialed physicians.

​LinkedIn/Sermo

​Each manufacturer of network interface cards adds a(n) ____ to identify the device.

​Media Access Control address

City-wide wireless networks are often called ____.

​Muni Wi-Fi

​In most browsers, the Back button and Forward button are located on the ____ bar

​Navigation

____ software manages the schedule for downloading podcast files to your device.

​Podcatcher

One website that offers full-text copies of works no longer protected by copyright is ____.​

​Project Gutenberg

VoIP is an acronym for Voice over Internet ____.

​Protocol

Sometimes the link to subscribe to feeds is a text link with the letters "____" to indicate the file format of the syndicated content.

​RSS

​Edge includes a _____, which is a streamlined and less cluttered view that allows readers to focus on the selected material

​Reading View

____ handles outgoing email messages, determining the paths an email message takes on the Internet.

​SMTP

Which of the following converts the user's search expression into a database-readable query?​

​Search expression processing software

The early networks that became the Internet included many computers that ran a program called ____ that allowed users to exchange short text messages.

​Talk

____ allows users to send very short messages to others who are connected to the network using smartphones or other Internet devices.

​Text messaging

Which of the following would provide the fastest transfer rate?

​The device is close to the access point.

When using the "Reply All" option, your message will automatically be sent to ____ recipients of the original message.

​To and Cc only

A file that has been attached to an email message will be received by those recipients in the ____ line(s) of the message header.​

​To, Cc, and Bcc

Many blogs are published using free blogging tools available from sites such as Blogger, WordPress, and _____.

​Tumblr

____ is a website that checks a submitted paper and then determines how much of the paper is unoriginal.

​Turnitin

​The following is an example of hacking: ____.

​Unauthorized access to information being sent over a wireless network

Which of the following is an example of a newsfeed using pull technology?

​Usenet

An example of VoIP is ____.

​Vonage

​If you have both WPA and WEP available to you, your system will be most secure if you use ____.

​WPA only

The content of a microblog differs from that of a traditional blog in that it answers the question, "____"​

​What are you doing now?

The ____ is a not-for-profit organization that certifies interoperability of Wi-Fi products and promotes Wi-Fi as a standard for wireless LANs.

​Wi-Fi Alliance

​Subscribing to a _____ requires payment for use but will provide a more reliable and secure connection.

​Wi-Fi service

​With the wide variety of information available on the web, it is important to be diligent in evaluating the information's _____.

​accuracy

​The Edge Note compose mode allows the user to do all of the following EXCEPT:

​add audio notes

Mashup developers usually include additional APIs on the mashup site that generate revenue by linking to customized ____.

​advertising

A news ____ website collects and displays content from a variety of online news sources, including wire services, print media, broadcast outlets, and even blogs, and displays it in one place.​

​aggregation

To receive feed content, you can install a program called a(n) ____ on your device.

​aggregator

A Bluetooth-enabled smartphone will also be compatible with a Bluetooth-enabled ____ ​car ​notebook computer all of the above ​printer

​all of the above

A blog often contains ____. photographs ​videos all of the above ​text and comments

​all of the above

A feed might include ____. all of the above ​news topics ​blog updates ​podcasts

​all of the above

Chats can be ____. ​text all of the above ​video ​voice

​all of the above

Most business professionals use ____ on their cell phones and other mobile devices to communicate with clients and customers. ​instant messaging ​chat ​all of the above ​email

​all of the above

Spam ____.​ ​consumes large amounts of network capacity ​may include content that is offensive or misleading ​distracts employees and wastes their time all of the above

​all of the above

The quality of information on a webpage can be inferred from the webpage's _____.​

​all of the above

Users of online business networks are typically ____. ​seeking jobs ​all of the above ​Recruiting workers ​searching for potential business partners

​all of the above

Using Twitter, you can ____. ​tweet an idea ​all of the above ​follow another person's Twitter feed ​retweet another user's comments

​all of the above

You can listen to or watch a podcast on a _____. ​smartphone all of the above ​tablet ​computer

​all of the above

_____ is an example of a Google filetype operator.​ all of the above ​text ​html ​pdf

​all of the above

​Security experts warn against ____ in public places. ​all of the above ​checking e-mail ​online banking ​online shopping

​all of the above

The following are generally accepted rules for email messages EXCEPT which of the following:​

​always forward new information about viruses and hoaxes

​To access the Internet using a WWAN, you need a USB modem for the device you want to use and ____.

​an account with the appropriate cellular carrier

Software that detects and eliminates malicious code is called a(n) ____ app.

​antivirus

Any Wi-Fi certified device can connect to any ____ certified access point.11. Any Wi-Fi certified device can connect to any ____ certified access point.

​any 802.11

A social network is a general term that refers to any community of people who use the Internet to share ____.​

​any of the above

​A collection of facts can be copyrighted, but only if the collection is ____ in a way that causes the resulting work to rise to the level of an original work. ​arranged any of the above ​selected ​coordinated

​any of the above

​You can use the address bar in Chrome to do all of the following EXCEPT:

​as a calendar

​If you receive an email message from a sender that you don't recognize and the message contains an attached file, you should ____.

​avoid opening the file until you are sure that it doesn't contain a virus

Chat participants might use common acronyms as a typing shortcut for common expressions, such as "bbl" for "____."

​be back later

​You should preview a webpage before printing it for all of the following reasons EXCEPT:

​be sure linked pages will print too

Some e-commerce sites also maintain a physical store, which is referred to as a _____ store.

​brick and mortar

In addition to text-only chats, people in the 1990s used their Web browsers to visit a virtual ____ room, where they could send text-only messages to other users in the room.

​chat

​You can use the Address bar to do all of the following EXCEPT:

​click the address book and select a link

At sites such as careerbuilder.com, you can do all of the following EXCEPT:

​contact a potential employer directly

Clicking a _____ takes you to a webpage that no longer exists or has been moved.​

​dead link

One of a spider's most important tasks is to _____ information in a search engine database when a website no longer exists.​

​delete

All of the following are roadblocks to properly citing webpages EXCEPT ____.

​differences between a web document and its print version

DRM stands for ____.

​digital rights management

A(n) ____ database is stored in multiple physical locations, with portions of the database replicated in different locations.

​distributed

A forwarded message ____.​

​does include the email addresses of previous recipients and senders

The advantage of a wireless mesh network is that ____.

​each new node automatically configures itself to work without the use of cables

When sending an email to multiple recipients, separate the addresses with a ____. ​neither a. nor b. ​comma ​semicolon either a. or b.

​either a. or b.

​Search engines can perform date-filtered searches because, when web servers send a webpage to a ____, they include a header that contains information about the webpage, such as the date it was last modified. ​either a. or b. ​search engine's web robot ​browser ​neither a. nor b.

​either a. or b.

"Email" is short for ____.​

​electronic mail

​In a(n) ____ attack, a hacker sets up a computer to act as a legitimate access point, and then steals personal information from users trying to connect to it.

​evil twin

​Small programs that can enhance and extend the functionality of Chrome are called ____.

​extensions

​One of the most serious mistakes that home users make when installing a wireless network is ____.

​failing to change the default login for the device

In the U.S., ____ laws allow people to use copyrighted works under some conditions.

​fair use

Some email programs let you use a ____ to move incoming mail to a specific folder or to delete it automatically based on the content of the message.​

​filter

​When the website you are visiting places a cookie on your computer, it is called a(n) _____ cookie

​first-party

​On the Favorites tab, you can add, delete, and organize favorites into ____ that best suit your needs and working style.

​folders

When you ____ a message, a copy of the original message is sent to the new recipient(s) without the original sender's knowledge.

​forward

Intellectual property rights offer protections afforded by ____.

​governments

A webpage indexed in a search engine's database containing text matching a query is called a(n) _____.​

​hit

In Wi-Fi terms, a(n) ____ is an area of network coverage.

​hotspot

Most browsers include help for all of the following EXCEPT:

​how to create your own webpages

​If you type nbc.com in the Address bar, your browser will convert it to ____ and load the home page at that URL.

​http://www.nbc.com

Web documents are built with _____.​

​hypertext markup language

The email acronym "iow" stands for "____."​

​in other words

A(n) ____ message is sent in real time between users who are chatting over a network.

​instant

​When computer networks are connected to each other, the system is called a(n) ____.

​internet

A search engine searches _____ to find a match for the query.​

​its own database

A podcast with educational content is sometimes referred to as a ____.

​learncast

​By default, most wireless networks are ____.

​left unsecured

Stemming refers to the ability of search engines to _____.​

​look for variations of words used in a search expression

If your email program does not provide filters, you can filter the messages ____ by reading them and moving them to the appropriate folders​

​manually

Which of the following is NOT an example of push technology?

​mashups

A ____ contains information about the message.​

​message header

A(n) _____ tag is HTML code that a webpage creator places in the page header for the specific purpose of informing web robots about the content of the page.​

​meta

3.5G wireless networks are also called ____.

​mobile broadband

In general, a webpage that has _____ inbound links is given a higher ranking than a page that has _____ inbound links.​

​more, fewer

The term ____ refers to a set of commonly accepted rules for proper behavior on a network.​

​netiquette

A ____ stores items on a server as articles or postings that are sorted by topic.

​newsgroup

A(n) ____ is a discussion group that occurs over a computer network with many users contributing to a specific topic.

​newsgroup

When the Usenet News Service began operating, the only way to read or post articles to newsgroups was to install and run a software program called a ____.

​newsreader

Which of the following is NOT an example of pull technology?

​online social networks

​Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.

​over-the-shoulder attack

​In the address http://www.nytimes.com/pages/sports/index.html, the folder containing the webpage is _____.

​pages

The procedure of converting a natural language question into a search expression is called _____.

​parsing

The connection of your smartphone to your wireless headset is an example of a(n) ____.

​personal area network

Failure to cite the source of research material that you use is called ____.

​plagiarism

If a play was written in the U.S. 200 years ago, but performed and videotaped by a stage troupe today, the tape of today's performance is ____.

​protectable under copyright laws

The original purpose of podcasting was to make it easy for people to create and broadcast their own ____, but many other uses soon followed.

​radio shows

A wireless device's ____ refers to the physical distance between the access point and the wireless device.

​range

A language operator is used to _____.​

​restrict search results to webpages coded using a specific language

To save an image from a webpage, first you ____.

​right-click the image you want to save

All of the following are typical parts of an email message EXCEPT ____.​

​salutation

In terms of using search engines, another word for "query" is _____.​

​search expressions

Regarding search engines, the term "stemming" means _____.​

​searching for variants of keywords

Search engines create a list of results by _____.​

​searching through its own database with information about webpages

All of the following are benefits of medical information being readily available on the web EXCEPT:

​self-diagnosis resulting in self-medication

The term Web ____ describe the process of organizations communicating through a network to share data without needing extensive knowledge of each other's systems.

​service

A ____ might appear at the bottom of an email message and contain standard information about the sender.​

​signature

If you are using email for a business communication, your ____ usually contains your name, title, and your company's name.​

​signature file

If a typical search engine robot encounters a webpage with the text "Test Data: Do Not Use," its response would be to _____.​

​simply include the content as is, since it would not recognize the text as a warning

Businesses and sometimes individuals use a _____ to assimilate all of their social media content on a specific topic to engage readers and generate interest.

​social hub

​The coverage area for wireless broadband service will ____ the area where you can get cell phone reception.

​sometimes differ from

A(n) _____ is a paid placement that appears in a search engine's results page at or near the top of the results.​

​sponsored link

​Using one browser window for all open pages is called ____.

​tabbed browsing

Originally the term "chat" referred to ____ chat.

​text

On Wikipedia, contributors may post and edit articles anonymously, in which case the author is only identified by _____.​

​the IP address of their connection to the Internet

Page rank is determined by _____.​

​the number of high-quality back links that the webpage provides

​The safest wireless network is one that is ____.

​turned off

Copyright protection exists when the work is ____.

​unpublished

​All of the following are ways to use Chrome efficiently EXCEPT:

​use the control key and the = key to zoom to the original page view

A ____ usually identifies one person's email account on a mail server.​

​username

Two of the most important issues in conducting research on the web is assessing not only the quality of the information but al​so the _____.

​validity

One way to access library information is through a ____ library, which is a website that provides online access to library information services.

​virtual

​The World Wide Web is a collection of files that reside on ____ located all over the world.

​web servers

Unambiguous criteria to determine whether or not an object belongs to a collection are called _____.​

​well-defined

​In the address http://www.nytimes.com/pages/sports/index.html, the domain name is ____.

​www.nytimes.com

​Unlike WLAN technology, Bluetooth requires ____ access point(s) for communication.

​​0


Set pelajaran terkait

Read & Interact: Baye & Prince: Chapter 8

View Set

Real Estate Appraisal: Chapter 8 Cost Approach to Value

View Set

Тема 7. Індивідуальна свідомість людини як вища форма психічного відображення

View Set

Money, banking and the Fed review

View Set

Cybersecurity Fundamentals - CIA Triad

View Set