I forgot lol

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

When you search online using two or more words, which Boolean operator is implied? A. AND B. OR C. NOT D. BY

A. AND

The _________ file format is often used for photos and other web images. A. JPG B. TIF C. EPS D. PSD E. GIF

A. JPG

Which of the following is an example of a compressed file format? A. MP3 (MPEG-1, Audio Layer 3) B. WAV (Waveform Audio Format) C. AIFF (Audio Interchange File Format) D. CD Quality (Compact Disc Quality) E. MP5 (MPEG-5 Part 15)

A. MP3 (MPEG-1, Audio Layer 3)

How do you start searching for a scholarly article on Google Scholar? A. Type the title of the article or keywords associated with it. B. Type the publishing date of the article. C. Click the Google logo. D. Click the Settings button. E. Click the Search button.

A. Type the title of the article or keywords associated with it.

Using the ______________ field in an email message prevents recipients from seeing that anyone else was copied. A. blind carbon copy (BCC) B. carbon copy (CC) C. private copy (PC) D. subject E. attachment

A. blind carbon copy (BCC)

Which part of the following URL is the protocol? http://maps.google.com A. http:// B. google.com C. maps D. google E. .com

A. http://

One purpose of a(n) ______ website is to showcase the creative talent of the website author. A. personal B. entertainment C. nonprofit D. art

A. personal

Google ___________ let you see just one type of result at a time. A. search modes B. settings C. search words D. menu options E. sorting tools

A. search modes

To use a search engine, you enter a _________. A. search term B. URL C. line of code in a web programming language D. web routing number E. web address

A. search term

If you want to buy zebra angelfish for your aquarium, which of the following search terms will provide the best results? A. zebra angelfish B. fish C. angelfish D. aquarium E. types of zebra fish

A. zebra angelfish

What did a Stanford study find about people who had to cut down a tree in a virtual world? A. They cut down more trees in the real world. B. They used less paper in the real world. C. They couldn't stop cutting down trees in the virtual world. D. They chose the most difficult method to cut down the tree. E. They never returned to the site of the fallen tree.

B. They used less paper in the real world.

Cable and DSL Internet connections are called _____________ because they offer faster speeds than dial-up connections. A. broadcast B. broadband C. lightning band D. ethereal links E. broadened links

B. broadband

A typical ___________ is 48,000 Hz. A. resolution B. sample rate C. bit rate D. audio speed E. horizontal rate

B. sample rate

A wiki is a(n) ____________ that members of a group can edit. A. email message B. webpage C. database D. blog entry E. text message

B. webpage

Which of the following is not a news site ranked in the top 10 most popular news sites? A. theguardian.com B. nytimes.com C. sportsnews.com D. washingtonpost.com E. news.google.com

C. sportsnews.com

The Internet translates every website name into its exact address, called a(n)________. A. browser B. broadband address C. IP locator D. IP address E. series

D. IP address

Why should you avoid using "Cincinnati" in a domain name? A. It is the name of a city. B. It ends with a vowel. C. Only residents of Ohio can use it. D. It is often misspelled. E. It is the same as a top-level domain name.

D. It is often misspelled.

Why might you want to set up a personal hotspot? A. Cost—using a personal hotspot is less expensive than using a public network. B. Customization—you can use a personal hotspot to customize the appearance of your mobile device. C. Access—you can access more websites with a personal hotspot than with a public network. D. Security—a personal hotspot is more secure than a public network. E. Features—a personal hotspot provides more Internet-access features than a public network.

D. Security—a personal hotspot is more secure than a public network.

What should you do when shopping or banking online? A. Send your banking details to others via email. B. Respond immediately to pop-up windows. C. Click links in pop-up windows and email messages to confirm banking details. D. Use a secure payment method. E. Leave the webpage open while you take a break from the computer.

D. Use a secure payment method.

What is an advantage of using web apps? A. They involve plenty of reading. B. You run them outside of a browser. C. You can run them only on a phone. D. You do not have to update them. E. They offer free videos.

D. You do not have to update them.

What is a blog? A. a webpage that does not accept advertising B. the comments section of a news organization's website C. a webpage members of a group can edit at the same time D. a website organized by blog posts, or individual news stories E. a website where members share contact information

D. a website organized by blog posts, or individual news stories

Which of the following is not a way cybercriminals try to gather your personal information on social media sites? A. friend requests from people you do not know B. imposter accounts C. malicious links added to your profile D. blocking your friend requests E. unusual messages or requests

D. blocking your friend requests

E-commerce transactions between businesses and customers is called ________. A. business-to-business (B2B) B. person-to-person (P2P) C. customer-to-business (C2B) D. business-to-customer (B2C) E. customer-to-customer (C2C)

D. business-to-customer (B2C)

Which of the following is not a type of blog? A. themed or niche B. personal C. mixed D. experimental E. corporate

D. experimental

When attackers use third-party ads to infect your computer with malware, it is called _________. A. Javascripting B. phishing C. spamming D. malvertising E. third partying

D. malvertising

A(n) _________ resolves top-level domains such as .com, .org, and .edu. A. authoritative DNS B. IP address C. Internet service provider (ISP) D. root DNS E. browser

D. root DNS

To refine the in-between motions, a computer animator uses a mathematical function called a(n) _______. A. sine B. keyframe C. in-between D. spline E. pose

D. spline

To register a .edu top-level domain, you must be a(n) ____________. A. student registered at a college or university B. instructor at a college or university C. business doing some type of research D. two-year or four-year college or university E. government agency in the Department of Education

D. two-year or four-year college or university

When you search from the general to the specific, you are performing a __________. A. horizontal search B. hierarchical search C. direction search D. vertical search E. categorical search

D. vertical search

A _____________ acts as a bridge between a Wi-Fi device and the Internet. A. cable modem B. smartphone C. hotspot D. wireless access point (WAP) E. wired access portal (WAP)

D. wireless access point (WAP)

Which of the following search tools would you use to filter out specific words? A. AND B. quotation marks (" ") C. asterisk (*) D. OR E. NOT

E. NOT

________ apps are defined as those you download and run directly on the mobile device. A. Web-based B. Interactive C. Marketing D. Engagement E. Native

E. Native

Why did the traditional method of performing banking transactions have to change? A. Banks ran out of Transaction Authentication Numbers (TANs). B. Banking changed from local to global. C. Users demanded a simpler method. D. Banking servers became unreliable. E. User behavior changed; people now use mobile devices for banking.

E. User behavior changed; people now use mobile devices for banking.

Which of the following is not a recommendation for protecting your identity? A. Know your payment due dates. B. Review your credit reports at least once a year. C. Shred documents with personal and financial information. D. Read credit card and bank statements. E. Wait for businesses to contact you when their bills are late.

E. Wait for businesses to contact you when their bills are late.

Why should you look for an author's name when evaluating news shared through a social media website? A. You should read only information posted by well-known journalists. B. You can assume the author vouches for the products advertised on the webpage. C. You can then use the author's words as if they were your own. D. You can use it to determine the currency of the information. E. You can then determine whether the author has expertise to report on the topic.

E. You can then determine whether the author has expertise to report on the topic.

What is a PageRank for a webpage? A. the result of a poll taken by users of a webpage B. a calculation that shows how many links the webpage contains C. a code that helps a search engine find the webpage D. a code indicating whether the webpage is legitimate or spam E. a formula that rates the importance of a webpage

E. a formula that rates the importance of a webpage

When an email message arrives at a domain name system (DNS) server, the server acts as a(n) _______. A. post office B. mail carrier C. censor D. security enforcer E. address book

E. address book

Which of the following is not an example of social media? A. podcast B. blog C. video sharing D. customer review websites E. product description webpage

E. product description webpage

When you access a website, your ________ translates web language code into words, graphics, and videos. A. website address B. web host C. Internet service provider D. HTML decoder E. web browser

E. web browser

Cyberbullying tactics, such as posting rumors or humiliating videos, are often slow to spread across social media networks. True False

False

Factual headlines are likely to be more credible than sensational headlines. True False

True

Information posted publicly, and sometimes privately, is being stored and analyzed through social media networks. True False

True

The homepage of a website usually contains the main content with the website's purpose. True False

True

To join a social network, you sign up for a free account and fill out your _____________. A. profile B. friends list C. connections D. prologue E. prompts

profile


Set pelajaran terkait

Chapter 5: The circulation of the Oceans

View Set

chapter 5 understanding children from birth to age two

View Set

Oceanography: Chapter 7 Ocean Circulation

View Set

Life, Health, & Law Outline - KY State Law (Chapter 15)

View Set

Chapter 37: Management of Patients With HIV Infection and AIDS

View Set