Testout Chapters 5&6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Intranet

A _________ is a private network that utilizes the same technologies as the Internet. Local Area Network Wide Area Network World Wide Web Intranet

Web Search

A search of the World Wide Web using a web browser, often done by visiting a web search engine site such as Google, Bing, or Yahoo.

Cloud computing

A service or software application that relies on shared resources over the Internet

Cloud storage

A service that lets you store data in a remote location over the Internet is called _____________. Internet backup Database Online repository Cloud storage

Browser

A software application that accesses web applications and websites

World Wide Web

An information system that connects documents to each other by hypertext links

Internet

An interconnected global public computer network

Narrow Your Search

At the top of the list of search results, most search engines include a few options for narrowing your search to specific result categories. For example, you can click "News" and see news articles related to your search terms. Or you can click "Images or Videos" to view media results. Another option for narrowing your search is to return to the Search box and add or clarify search terms. You can also put some or all of the terms in quotations, which tells the search engine to display results containing that exact phrase instead of results that include each of the individual words.

Hyperlinks

Clickable text or images that take you to different sites on the World Wide Web are called __________. Hyperlinks Attachments Navigation buttons Shortcuts

Crowdsourcing platform

Crowdsourcing is reaching out to a group (crowd) as a way to solve a problem. Which of the following provides a way to raise funds without web development expenses? Crowdsourcing media Crowdsourcing website Crowdsourcing campaign Crowdsourcing platform

IMAP

IMAP, or Internet Message Access Protocol, is a much more common receiving protocol. With IMAP, email messages stay saved on the remote mail server. This way, people can access their emails from multiple devices, such as a home computer, a work laptop, and a smartphone.

OneDrive

Microsoft's cloud storage service, which is automatically installed on new versions of Windows, is called _____________. MicroCloud Dropbox Windows Store OneDrive

Email Filtering

Most email clients include a feature that automatically filters out junkmail. While email filtering can be implemented by each user, it can also be enabled in incoming mail services to reduce spam and other unwanted email by blocking email based on the sender address or by content.

Twitter

Most popular microblogging platform

Hyperlinks

On a web page, if you hover your cursor over certain words or images, the white arrow turns into a pointed finger. This lets you know there's a hyperlink to another webpage or to more information. Sometimes hovering over a hyperlink opens a dropdown menu.

POP3

POP3, or Post Office Protocol 3, is one of two protocols used to receive email. When an email client uses POP3, it grabs messages from the remote server, downloads them to the local client, then deletes them from the server.

Facebook

Provides live video streaming

SMTP

SMTP, or Simple Mail Transfer Protocol, is used to send email. When you send a message, SMTP routes it through the Internet to its destination mail server. SMTP is used by all email systems that use the Internet.

Search Engines

Search engines are tools that gather relevant websites from around the Internet and show them to you in a list. Every search engine has a text entry box where you can type the information you're looking for. A search engine can help you find what you're looking for even if you don't remember the web address. After clicking inside the text entry box, you can type words relevant to your search and press Enter to see the search engine results.

Instagram

Social network focused on images

DNS

The Domain Name System (DNS) matches unique IP addresses with easy-to-read URLs. When you navigate to a website, your computer asks a DNS server which IP address corresponds to the URL you want to visit. DNS returns the correct IP address, which is then connected using the IP protocol.

HTTP and FTP

The Hypertext Transfer Protocol (HTTP) is used to identify resources and transfer content on the web. Some web pages use the HTTPS protocol, which adds an additional layer of encryption to make data transfers more secure. The File Transfer Protocol (FTP) can also be used to transfer data between computers on a network.

HTTP

The Hypertext Transfer Protocol (HTTP) is used to identify resources and transfer hypertext pages on the World Wide Web.

IP

The Internet Protocol (IP) is used to route information over the Internet. When you send a file over the Internet, IP divides it into small pieces and adds a header to each one. The header contains the source address and the destination address. The piece of data combined with the header is called a packet.

Targeted ads Selling user-generated data to other companies

There are many social media platforms available today. What are the top two primary ways that social media platforms generate revenue? (Select two.) Usage fees Targeted ads Selling user-generated data to other companies Content Membership fees

Browser Settings

To change the Chrome startup options and other settings, click the Chrome menu in the upper right-hand corner of the browser and select Settings. In Settings you can manage your Google account, change autofill settings, customize appearance configurations, manage the default search engine and browsers, and change the startup options.

Bookmarks

To find a specific website more quickly in the future, you can add a bookmark. In Chrome, go to the upper right corner of the window and click the star symbol. Add the bookmark to the bookmarks bar and click Done. To return to the bookmarked page, you can click the Chrome menu and select Bookmarks. If you open a new tab in the browser, you can see the bookmark conveniently below the address bar.

Use the Browser Address Bar

To perform an online search, you can visit the website for your preferred search engine, such as google.com or bing.com, and then begin entering search terms. However, for a quick online search, you can enter search terms directly into the address bar of your web browser, which will forward them to the default search engine. If you enter the URL for a website, such as testout.com, the browser will display the website. But if you enter one or more search terms separated by a space, the terms will be processed by the default search engine.

Internet Service Provider

Which of the following terms describes an organization that connects users to the Internet? Internet Service Provider Web Server Data Center Network Server

Internet Service Provider

A company that provides access to the Internet

Proxy Server

A device that stands as an intermediary between an application such as a web browser and the Internet. A proxy server intercepts all requests and can use filter rules to allow or deny internet traffic.

Pop-up Blocker

A feature of most web browsers that prevents pop-up windows such as advertisements from being displayed.

Computer Restart

A good tip for any computer problem you may run into is to restart your system, which will turn the computer off, then on again. To restart your Windows system, click the Start button at the bottom-left corner of the screen. Click the Power icon, then click Restart. This is a step you should always take before you call a technical support helpline, including TestOut's support team.

IP Address

A numerical label that is assigned to devices so they can connect and communicate on a network.

Pop-up Blockers

A pop-up blocker is a feature of most web browsers that prevents pop-up windows such as advertisements from being displayed. The reason web browsers often block pop-up windows is to protect you from malware. However, since legitimate websites also use pop-up windows, you can disable the pop-up blocker for specific sites. To verify that pop-up windows from specific sites are allowed, go to the Chrome menu in the upper-right corner of the window and then Settings. From there, open the Advanced settings and go to Privacy and security, then Site settings. In the Pop-ups and redirects section, you'll see whether the domain is allowed to use pop-up windows. If you want to allow another site, click Add and then enter its domain name.

prevents unwanted advertisements

A pop-up blocker is a web browser feature that _________________. keeps the window in a minimized state prevents color images from being displayed prevents unwanted advertisements censors Internet searches

Proxy Servers

A proxy server is a device that stands as an intermediary between an application such as a web browser and the Internet. It intercepts all requests and uses filter rules to allow or deny Internet traffic. Proxy servers can improve performance on frequently-used websites. They can also be used to prevent access to specific websites. If you're using a school or public network and are able to access some websites but not others, the reason may be the network's proxy settings.

Cookie

A small piece of data sent from a website and stored on a user's computer by the web browser while the user is browsing. Cookies are designed to help websites remember information such as items in an online shopping cart and entries in a web form so that the website can customize a web page for the user.

Proxy settings

After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem? Browser cache Invalid certificate Private browsing Proxy settings

Wikis

All of the following formats may contain incorrect or misleading information. On which should you be MOST careful about trusting the information you come across as it may seem academically reviewed but in fact is not? RSS feeds Podcasts Wikis Blogs

Use Advanced Search Options

All of the popular search engines have some kind of advanced search option. Advanced searches provide several ways to refine and narrow your search, including fields for "exact words" and fields for words you do not want to be found in the source. You can also narrow the search by language, region, domain, and file type. One important thing to note about advanced searches is that the search filters are cumulative. This means you can apply as many of the filters as you want and they will all be applied at the same time. If your search ends up being too narrow, you can go back and remove some of the filters or try alternative phrases.

Web Browser

An application for accessing information on the World Wide Web.

Cookies

Cookies are files that store data for specific websites. This data may contain information about your browsing habits and preferences, or even your email account and favorite sites. They can be saved on your computer for any length of time, sometimes for as long as the browser is open or even after you close it. If an attacker has access to these files, they can gather your personal information. It's important to review the security settings for cookie storage on your computer. A common practice is to block third-party cookies, which are placed on your computer by advertisers and other sites with a domain name other than the one you're currently visiting.

DNS

DNS, short for Domain Name System, is a protocol that associates domain names (such as web servers) with unique IP addresses. DNS servers translate URLs into machine-readable IP addresses.

Certificates

Ecommerce and other websites that handle sensitive information should be certified to indicate they're using a secure protocol with data encryption. To determine whether a website is using this safer protocol, you can look for the padlock symbol in the address bar. This will let you know that the site is using a valid digital certificate.

Configure the browser proxy settings.

Frank, a technician, has finished installing a wireless router. Jessica is connected to the WiFi. However, she can only see the company intranet pages. What should Frank do to troubleshoot the problem? Configure the browser proxy settings. Disable the pop-up blocker. Clear the browser cache. Apply a firmware update.

Investigate Author Biases

If you have any reason to doubt the reliability of an author's claim, find out more about his or her affiliations and investigate possible biases. What is the author's purpose? Is it simply to inform as objectively as possible, or is it to persuade you or sell you something? Does the author seem to be overly emotional or making outlandish claims?

Private Browsing

If you share your computer with someone else and don't want Chrome to track your browsing activity, you can open a window in incognito mode. This is also called private browsing. Be aware that private browsing will only prevent the web browser from tracking your activity. If you're using a computer at school or work, your browsing will still be visible to network administrators.

Use Scholarly Sources for Academic Research

If you're working on academic or professional research, limit your searching to scholarly authors who have credentials in their field. Online academic databases such as Google Scholar are configured to limit search results to scholarly sources.

Navigation Buttons

If you've navigated to the wrong webpage, you can always click on the left arrow in the upper left corner of the browser, called the back button, to return to the previous page. From here, you can use the right button or forward button to return to go back to a website.

Compatible Browsers

If your web browser is not displaying website content properly, you might want to consider installing and using a different web browser. Sometimes a particular site might have been designed and programmed without taking into account different browser functionality. Popular web browsers include Google Chrome, Mozilla Firefox, Apple Safari, and Microsoft Edge. To take advantage of security and bug fixes, be sure that you're running the latest version of the browser.

Browser History

In Chrome, to see a list of all the web pages you've previously visited, you can click and hold down the Back button. Then select Show Full History. To return to one of these previously visited sites, simply click one of the links.

ISP

Internet Service Providers, or ISPs, manage an access point to the Internet. They don't manage the entire Internet. If you think of the Internet as a big freeway, then ISPs manage the on-ramp to the freeway. They're responsible for building the on-ramp and keeping it maintained and open, but they're not responsible for the Internet itself.

Startup

Kickstarter and Indiegogo are crowdsourcing platforms primarily started for which type of crowdsourcing? Financial hardship Brainstorming Idea Startup

Facebook

Largest social media platform in the world

Change browser settings to notify before downloading.

Martin just purchased a new computer and wants to surf the web. He is afraid his new computer may get infected by automatically installing viruses. What should he do to protect his computer? Change browser settings to block third-party cookies. Change browser settings to notify when downloads are complete. Change browser settings to notify before downloading. Change browser settings to prevent pop-up windows.

Instagram

Messaging platform where messages disappear after being read

Address Bar

Near the top of browser windows is the address bar. This is where you can type the address for the website you want to visit. Another name for a web address is URL, or Uniform Resource Locator.

HTTPS

One of the biggest downsides of HTTP is that it transmits data as plain text. This is a problem, because an attacker could intercept the signal during transmission and read the sensitive information it contains. When they need to send or receive data securely, most websites use HTTPS, which combines HTTP with the Secure Sockets Layer (SSL) protocol. SSL encrypts data so unauthorized parties can't understand the data even if they manage to intercept it.

Browser Extensions

Plug-ins and other browser extensions such as the Adobe Flash Player can be installed to enhance the appearance and functionality of websites. Untrusted extensions can take advantage of security vulnerabilities. Extensions can be temporarily disabled on particular browsers, or they can be deleted from the system. If you need to install a plug-in to use a legitimate website, make sure it's up-to-date with the latest version. Some websites require that you install a browser extension to support new functionality. If the extension does not appear to be working, check to make sure it's enabled in the browser. In Chrome settings, open an Extensions tab and turn the extension on. In some cases, you may need to remove an extension that's incompatible with others.

Client-Side Scripting

Scripting languages such as PHP and JavaScript are used to extend the functionality of web pages. The code for scripting languages can be executed either on the web server or on the client-side within the web browser itself. Since client-side scripting is a security risk on untrusted sites, it can be deactivated in some web browsers. However, since most modern websites rely on client-side scripting, it usually needs to be allowed. For greater control over which websites can run scripts, you could also choose to install a script blocker add-on for your browser.

Sift Through Search Results

Search engines use complex algorithms that rank websites according to their popularity, responsiveness, and overall "relevance." These rankings influence which sites are displayed near the top of your search results. Most search engines also highlight links to related content sponsored by advertisers. As you sift through search results, if you're looking for products or services related to your search terms, you might want to consider clicking on an advertised link. Otherwise, you'll want to ignore them and scan the list for more reliable, objective information. It's often a good idea to click through a few pages of results, since the most relevant pages might not be at the top of the list.

Verify Facts

Since information on the Internet is not regulated by a fact-checking body, it's important to verify claims by looking at multiple sources. Don't trust one or two sources of unverified pieces of information.

Cookies

Small files that a website saves on your computer to remember your preferences are called ______________. Malware Cookies Fingerprints Reminders

TCP/IP

TCP/IP stands for Transmission Control Protocol/Internet Protocol. It is the suite of protocols or rules that facilitate Internet communication.

TCP

The Transmission Control Protocol (TCP) adds a header to each IP packet. The TCP header helps the receiving computer to assemble the packets into the right configuration once the entire file is downloaded. The headers also allow the sending and receiving computers to verify with each other that each packet was received correctly.

UDP

The User Datagram Protocol (UDP) is generally used when speed in transmission is more important than accuracy, such as streaming audio or video. Like TCP, UDP adds a header to each packet. However, unlike TCP, the sending computer doesn't verify that the packets were correctly received. This makes transmissions happen much faster but leaves room for transmission errors.

Caching

The browser cache refers to the storage location for images, sounds, web pages, and other information associated with particular websites. In addition to taking up space on your computer, data in the cache could be retrieved by someone with access to your computer. To provide some level of protection, you should clear the Web browser cache after you use a public computer to access the Internet. In the Chrome menu, under More tools, you can see the option to clear browsing data. Sometimes, when a website is not functioning as it should, a good troubleshooting tip is to "clear the cache," or delete this stored information. In Chrome, when you click the Clear data button, you delete your browsing and download history, cookies, passwords, and other website data.

Client-Side Scripting

The process of transferring source code from a web server to a web browser and running that code directly in the browser.

Caching

The storing of images, sounds, web pages, and other information associated with particular websites that allows a browser to redisplay data without having to reload it from the website.

VoIP

Voice over IP (VoIP) sends voice phone calls using the TCP/IP protocol over digital data lines. With VoIP, phone calls are made through a network connection rather than through a standard phone line. When you make the phone call, it is converted into digital data and sent through the network or over the Internet.

Cache

Web browsers save website information in their _________, which helps the site load faster on future visits. Repository Cache Storage Memory

Social Media

Web services that help people meet, interact, and share content with other people online are called ____________. Social Media Internetworks Facebooks Web Servers

Encryption

What do cloud services provide to help with privacy and security concerns? Collaboration Backups Accessibility Encryption

SaaS

What is the term for delivering an application over the internet called? IaaS SaaS FaaS PaaS

Safe Browsers

Whatever web browser you decide to use, make sure you're using the latest version. Older browsers often have security holes that are easy entry points for attackers if they're not patched. Some older browser versions are no longer even supported by the company that created them. Since many web applications enable different functionalities on your browser that leave you vulnerable to attacks, the safest policy is to disable most functions that are not absolutely necessary for the application. Then, if you determine a website is trustworthy, you can temporarily enable the functionalities as needed.

Browser Restart

When a web browser becomes unresponsive or slow, the problem can often be fixed by closing the browser and then opening it up again. This clears the computer's memory and lets you start with fresh content.

Configuring Email Accounts

When configuring an email account on your computer or smartphone, you typically need to know the host names of both the incoming and outgoing mail servers. For example, if you want to check your Gmail messages using a different mail client like Microsoft Outlook, you would likely enter imap.gmail.com as the incoming mail server and smtp.gmail.com as the outgoing mail server.

When a website is not functioning as it should

When might it be most helpful to clear your browser's cache of temporary Internet files? When a website is not functioning as it should Immediately after opening a new Microsoft Office document After every Internet search When you switch to a different web browser

Phishing attempts

When protecting your online identity, which of the following is an internet security threat you need to be aware of? Using a different password for each social media platform Using personal information USB keyloggers Phishing attempts

Discussion board

Which digital communication medium consists of top-level posts with threads of response posts? Social network Email client Chat room Discussion board

Radio waves

Which medium does Wi-Fi use to send data between networks and devices? Cellular signals Ultraviolet light Radio waves Bluetooth

Easier collaboration, Data security

Which of the following are advantages of cloud computing? (Select two.) Easier collaboration Lower speeds Greater costs Local software Data security

Message boards Email

Which of the following are considered asynchronous technologies? (Select two.) Video conferencing Voice over Internet Protocol (VoIP) Message boards Email Live streaming

Video conferencing Instant messaging

Which of the following are considered private technologies? (Select two.) Video conferencing Instant messaging Chat rooms Live streaming Social media posts

Google Cloud

Which of the following charges resources used, such as bandwidth and processing power, by the second? OneDrive Google Cloud Microsoft Azure Amazon Web Services (AWS)

Social Media Optimization (SMO)

Which of the following describes the strategy that defines a businesses social media goals and objectives? Social media marketing Social channels Search Engine Optimization (SEO) Social Media Optimization (SMO)

Microsoft Paint

Which of the following does NOT rely on cloud technologies? Facebook Google Drive Microsoft Paint TestOut Desktop Pro

Social media makes it difficult to keep in touch with friends and family

Which of the following is NOT a drawback of social media? Social media companies make money by selling personal information Social media makes it difficult to keep in touch with friends and family Social media exacerbates social divisions Stories shared on social media are often exaggerated or false

Post the bully's physical address on social media

Which of the following is NOT a good response to cyberbullying? Reach out to the person who was targeted Do not like, share, or comment on bullying posts Respond to the bully in a calm, clear, and constructive manner Post the bully's physical address on social media

Office tools

Which of the following is a category of SaaS applications? Virtual machines Office tools Web hosting Disaster recovery

Web applications can carry a monthly or yearly fee.

Which of the following is a disadvantage of web applications? Web applications can be limited by the hardware they run on. Web applications can carry a monthly or yearly fee. Web applications can require a significant amount of disk space. Web applications can connect people in different locations.

Uniform Resource Locator

Which of the following is used to identify specific hypertext resources on the World Wide Web? Internet Protocol Uniform Resource Locator Hyperlink Transmission Control Protocol

microsoft gov

Which of the following lines will initiate an Internet search from the address bar of a web browser? microsoft.com microsoft gov testout.com microsoft.org

Always review and set privacy settings.

Which of the following should be done to protect your identity when creating a social media profile? Always use a fake name and fake personal information. Always review and set privacy settings. Use the default privacy settings for the account. Always include your physical address and set privacy to Friends of Friends.

VoIP

Which of the following technologies can be used to make a phone call over an Internet connection? VoIP IoT TCP UDP

World Wide Web

Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser? Internet Intranet World Wide Web Wide Area Network

Internet

Which of the following terms describes an enormous public network that connects billions of devices and networks around the world? Local Area Network Intranet Internet of Things Internet

A proxy server is filtering access to websites.

You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research. Which of the following is the MOST likely cause of this problem? Port triggering is redirecting traffic to the wrong IP address. A firewall is blocking ports 80 and 443. A proxy server is filtering access to websites. The router has not been configured to perform port forwarding.

Cloud

_____________ computing refers to services and applications that run remotely over the Internet. Cloud Virtual Global Remote


Set pelajaran terkait

Chapter 2: Connect Master Intro to Buisness

View Set

anatomy and physiology chapter 4

View Set

Chapter 7 Imperialism and the Spanish American War

View Set