Testout Chapters 5&6
Control smart devices
A major capability of Alexa is its ability to do what? Control smart devices Play audio books Set alarms Speak a variety of languages
5 GHz
A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this? 5 GHz 2.4 GHz 802.11b 802.11g
Secondary Source
A news article about the mayor's speech
Pop-up Blockers
A pop-up blocker is a feature of most web browsers that prevents pop-up windows such as advertisements from being displayed. The reason web browsers often block pop-up windows is to protect you from malware. However, since legitimate websites also use pop-up windows, you can disable the pop-up blocker for specific sites. To verify that pop-up windows from specific sites are allowed, go to the Chrome menu in the upper-right corner of the window and then Settings. From there, open the Advanced settings and go to Privacy and security, then Site settings. In the Pop-ups and redirects section, you'll see whether the domain is allowed to use pop-up windows. If you want to allow another site, click Add and then enter its domain name.
Cloud computing
A service or software application that relies on shared resources over the Internet
Change the SSID to something other than the default. Disable SSID broadcast.
A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device. They use an 802.11n wireless network. The wireless network is broadcasting an SSID of Linksys. The wireless network uses WPA2 with AES security. Directional access points are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client do to increase their wireless network security? (Select two.) Upgrade to an 802.11g wireless network. Change the SSID to something other than the default. Implement omnidirectional access points. Configure the wireless network to use WPA with TKIP security. Disable SSID broadcast.
Satellite
A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should they select to ensure network connectivity for any clinic located anywhere in the world, even remote areas? Cable modem Satellite ISDN DSL Dial Up
Improved performance
A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade? Improved performance 802.11g uses older technology More overlapping channels Less attenuation
Access point
A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the BEST choice for this connectivity? Router Firewall Switch Access point
POP3
A user read their work email from their home computer and when they returned to work the next day and accessed the email server, all of their email was missing. Which of the following protocols removes mail from a mail server? SMTP POP3 HTTPS IMAP
Tracert
Bob, a network professional, wants to find out where packets are getting stuck on the path to their destination. Which of the following utilities should he use? Ping Ipconfig Route Tracert
POP3 IMAP SMTP
The TCP/IP suite has three protocols that deal with sending and receiving email. What are these protocols? (Select three.) POP3 WPA IMAP HTTP WEP SMTP SSL DNS
UDP
The User Datagram Protocol (UDP) is generally used when speed in transmission is more important than accuracy, such as streaming audio or video. Like TCP, UDP adds a header to each packet. However, unlike TCP, the sending computer doesn't verify that the packets were correctly received. This makes transmissions happen much faster but leaves room for transmission errors.
World Wide Web
The ______________ is an information system that connects documents to each other by hypertext links. TCP/IP suite Internet Network World Wide Web
Email filtering
Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented? Antivirus Email filtering Firewall Multifactor authentication
Four
How many ping packets are sent by default in a successful ping request? Six Four One Two
IMAP
IMAP, or Internet Message Access Protocol, is a much more common receiving protocol. With IMAP, email messages stay saved on the remote mail server. This way, people can access their emails from multiple devices, such as a home computer, a work laptop, and a smartphone.
Manually change the TCP/IP properties to match your network's settings.
If your network does not have a DHCP server, what must you do to access the internet? Open PowerShell, enter the ipconfig command, and press the Enter key. Manually change the TCP/IP properties to match your network's settings. Right-click the network adapter and select Update driver. Open Command Prompt, enter the tracert command, and press the Enter key.
Front-end coding languages
In addition to good design sense, what else do web designers need to be proficient in? Editing content for social media platforms Search Engine Optimization (SEO) Front-end coding languages Communication skills
ISP
Internet Service Providers, or ISPs, manage an access point to the Internet. They don't manage the entire Internet. If you think of the Internet as a big freeway, then ISPs manage the on-ramp to the freeway. They're responsible for building the on-ramp and keeping it maintained and open, but they're not responsible for the Internet itself.
Mosaic
John is using synonyms to replace words while keeping the meaning of the original phrase. Which form of plagiarism is he engaging in? Self Accidental Mosaic Direct
Modem
Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer? Modem Server Switch Router
Monitor fuel usage
Owners of internet-enabled cars can use their phones to do which of the following? Control their speed Adjust tire pressure Monitor fuel usage Change traffic lights
POP3
POP3, or Post Office Protocol 3, is one of two protocols used to receive email. When an email client uses POP3, it grabs messages from the remote server, downloads them to the local client, then deletes them from the server.
A network in a small geographic area, like in an office.
Which of the following is the best definition for a LAN? A network in a small geographic area, like in an office. A network whose computers and servers are separated geographically but still connected. An extension of a private network over a shared or public network, such as the Internet. The interconnection of components, such as laptops, printers, keyboards, and other wireless devices within a personal range (typically 10 meters or less).
Firewall
Which of the following is the best device to deploy to protect your private network from an untrusted public network? Firewall Hub Router Gateway
SSID
Which of the following is used on a wireless network to identify the network name? MAC address WPA2 passphrase SSID WEP key
ITCS
Which of the following is used to change traffic lights for emergency vehicles? ITCS IoT sensor IoT car Smart car
Uniform Resource Locator
Which of the following is used to identify specific hypertext resources on the World Wide Web? Internet Protocol Uniform Resource Locator Hyperlink Transmission Control Protocol
microsoft gov
Which of the following lines will initiate an Internet search from the address bar of a web browser? microsoft.com microsoft gov testout.com microsoft.org
IMAP
Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server? SMTP IMAP POP3 NTP
WPA2
Which of the following provides security for wireless networks? 802.3u 802.11a CSMA/CD WPA2 WAP
Server
Which of the following provides services to hosts on its network? Client Storage Server Email
Always review and set privacy settings.
Which of the following should be done to protect your identity when creating a social media profile? Always use a fake name and fake personal information. Always review and set privacy settings. Use the default privacy settings for the account. Always include your physical address and set privacy to Friends of Friends.
A VPN masks a user's IP address in order to make their actions untraceable.
Which of the following statements is true regarding a VPN? Sometimes a VPN can increase your browsing speed. A VPN masks a user's IP address in order to make their actions untraceable. With a VPN, other sites can use your IP address to determine your physical location. You can hide your browsing history from the VPN company.
They typically require an industry certification in network design and implementation.
Which of the following statements is true regarding a network architect? They typically require an industry certification in network design and implementation. They work closely with network administrators to ensure uninterrupted access to the company network. They perform regular backups of files saved on the network and train users in accessing network resources. They have a broad range of responsibilities, including creating and managing user accounts.
They design intranets, cloud infrastructure, and information security based on the needs of an organization.
Which of the following statements is true regarding a network technician? They are familiar with network protocols, network adapters, data formats, and project management. They manage an organization's email system, configure network printers, and maintain internet connectivity. They troubleshoot reported problems and assist users in resolving network-connection issues. They design intranets, cloud infrastructure, and information security based on the needs of an organization.
Internet service technician
Which of the following tech careers builds infrastructure for networking, telephones, radio, and other communication channels? Internet service technician Customer service representative Web designer Social media marketer
VoIP
Which of the following technologies can be used to make a phone call over an Internet connection? VoIP IoT TCP UDP
Internet
Which of the following terms describes an enormous public network that connects billions of devices and networks around the world? Local Area Network Intranet Internet of Things Internet
Internet Service Provider
Which of the following terms describes an organization that connects users to the Internet? Internet Service Provider Web Server Data Center Network Server
Ping
Which of the following tools would you use to check connectivity between two computers? Tracert Ping TCP/IP DHCP
Online chat
Which of the following typically does NOT save a conversation after it has taken place? SMS/MMS Message board Online chat Email
Device Manager
Which of the following utilities can you use to monitor, update, and manage all your hardware devices on a Windows computer? Device Manager Ping Windows Update Tracert
DHCP
Which of the following utilities would you use to automatically assign IP addresses on a network? DNS TCP/IP HTTP DHCP
Tracert
Which of the following utilities would you use to find the path between two computers? Tracert Ping DNS HTTP
Forward
Which option should you choose to send an email you've received to a new person? CC Reply Forward Reply All
Reply All
Which option should you use to respond to every single person included on an email? Forward CC Reply All Reply
Reply
Which option should you use to respond to the sender of an email but not all the recipients? Forward Reply All Reply CC
Search engine
Which service would be most useful when looking for information about your favorite TV show? Cloud Storage Email File Transfer Protocol Search engine
Tertiary
Wikipedia is considered which of the following sources? Tertiary Primary Consumer-level Academic
MAC address filtering
You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections based on the hardware address? SSID WEP DHCP MAC address filtering
Accidental
You are inadvertently using comparable wording or sentence structure. Which form of plagiarism are you engaging in? Self Accidental Mosaic Direct
Client error
You have entered a URL into a browser and have received a 404 error. Which type of error did you receive? Informational Redirection Client error Server error Success
NFC chips
You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following is the technology being used in these phones? NFC chips Bluetooth transmitters VPN Infrared transmitters
Satellite
You live in a rural area and don't have a nearby wired network to connect to. What could you use to connect to the Internet? Cable Satellite Fiber optic DSL
WPA2
You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement? WEP WPA Kerberos WPA2
Network & Internet
You need to troubleshoot a Windows computer that isn't connecting to a network. Which utility should you use? Device Manager Windows Update Network Properties Network & Internet
Self
You submitted the same paper from high school for a college class. Which form of plagiarism is this? Direct Accidental Self Mosaic
Local installation
You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose? Cloud hosting n-tier application Local installation Network hosting
Windows updates
You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers? Antivirus updates Windows updates Scheduled backups Scheduled disk maintenance
Your company is exposed to litigation by violating the software license agreement. You risk losing your job.
Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. This is an enterprise paper license and there is no mechanism that enforces a limit to the number of times the key can be used. You decide to update all 20 users. Which of the following are possible consequences of this decision? (Select two.) There are no consequences. By law, you are allowed 1 to 3 activations per user. The software will eventually stop working properly for the 10 extra updates you installed. The software company will never detect the violation so negative consequences are unlikely. Your company is exposed to litigation by violating the software license agreement. You risk losing your job.
Cloud
_____________ computing refers to services and applications that run remotely over the Internet. Cloud Virtual Global Remote
Use the Browser Address Bar
To perform an online search, you can visit the website for your preferred search engine, such as google.com or bing.com, and then begin entering search terms. However, for a quick online search, you can enter search terms directly into the address bar of your web browser, which will forward them to the default search engine. If you enter the URL for a website, such as testout.com, the browser will display the website. But if you enter one or more search terms separated by a space, the terms will be processed by the default search engine.
Open-source Software
What is the term for software that anyone can use or modify for free? Open-source Software Proprietary Software Read-write Software Linux Software
Proprietary Software
What is the term for software that is exclusively controlled by a company and cannot be used or modified without permission? Open-source Software Read-only Software Proprietary Software Microsoft Software
SMTP
What protocol is used to send email messages from a mail client to a mail server? SMTP POP3 FTP SNMP IMAP
When a website is not functioning as it should
When might it be most helpful to clear your browser's cache of temporary Internet files? When a website is not functioning as it should Immediately after opening a new Microsoft Office document After every Internet search When you switch to a different web browser
Phishing attempts
When protecting your online identity, which of the following is an internet security threat you need to be aware of? Using a different password for each social media platform Using personal information USB keyloggers Phishing attempts
The video may become glitchy.
When you stream video, the server doesn't verify that your computer received the files correctly. It just sends a continuous stream of data. This type of transmission has advantages and disadvantages. What issue can this potentially cause? A copy of the video file must first be saved to your computer. The video may become glitchy. The video may cause your system to crash. The video must be constantly restarted.
802.11a 802.11g
Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.) 802.11a 802.11b Bluetooth 802.11g 802.1x
Windows Update
Which application makes sure your computer has the most recent versions of its system software? Windows Update Disk Cleaner Backup and Restore Windows Defender
2G
Which cellular network type was the first kind of network to use encryption? 4G 3G 1G 5G 2G
4G
Which cellular network type was the first to have gigabit-per-second speeds? 2G 5G 4G 3G 1G
Cortana
Which digital assistant was named after an artificial intelligence in an Xbox video game? Alexa Google Assistant Cortana Siri
Siri
Which digital assistant was one of the earliest? Alexa Siri Cortana Google Assistant
Alexa
Which digital assistant's voice was inspired by the voice of the supercomputer on the USS Enterprise in the Star Trek series? Siri Cortana Alexa Google Assistant
Discussion board
Which digital communication medium consists of top-level posts with threads of response posts? Social network Email client Chat room Discussion board
Internet installation
Which installation method is most likely to put your computer at risk of downloading a virus? App store installation Software subscription CD or DVD installation Internet installation
Radio waves
Which medium does Wi-Fi use to send data between networks and devices? Cellular signals Ultraviolet light Radio waves Bluetooth
Put the search terms in "quotes"
Which method should be used to search for an exact phrase? Put the search terms in (parentheses) Put the search terms in "quotes" Put the search terms in <angle brackets> Put the search terms in [brackets]
Cable
Which network type uses a coaxial cable to receive its signal? Fiber-optic Cable Cellular Satellite
Fiber optic
Which network type uses light pulses to transmit data? Cable Fiber optic Wireless Satellite
One Tier
Which of the following Application Architecture Model tiers describes office productivity software? n-Tier Three Tier One Tier Two Tier
It is a utility that displays all current TCP/IP network configuration values.
Which of the following BEST describes the ipconfig utility? It is a utility that displays all current TCP/IP network configuration values. It is a utility that shows the exact path a packet takes between two hosts on different networks. It is a utility that verifies connectivity between two nodes on a network. It is a utility that gives you a huge amount of control over your system.
It sends a single packet to a specified network address and then waits for a reply.
Which of the following BEST describes the ping utility? It sends a single packet to a specified network address and then waits for a reply. It shows the exact path a packet takes between two hosts on different networks. It displays all current TCP/IP network configuration values. It displays and modifies the entries in the local IP routing table.
Network administrator
Which of the following IT jobs includes installing and configuring network media? Network architect Database administrator Network administrator Support specialist
Network Architect
Which of the following IT jobs specializes in configuring communication hardware such as cabling, routers, and wireless adapters? Database Administrator Programmer Network Architect Security Analyst Support Specialist
Network technician
Which of the following IT jobs typically do not require as much education or on-the-job experience? Network administrator Network technician Network architect Network engineer
Fiber optic
Which of the following Internet technologies provides the FASTEST speeds? DSL Cable Fiber optic Cellular
Mobile data
Which of the following allows for access to the internet without either a Wi-Fi or a wired connection? Mobile data DSL 2G 1G
Easier collaboration, Data security
Which of the following are advantages of cloud computing? (Select two.) Easier collaboration Lower speeds Greater costs Local software Data security
2.4 GHz radio wireless Ad hoc connections
Which of the following are characteristics of Bluetooth? (Select two.) Line-of-sight transmission 5.75 GHz radio wireless 2.4 GHz radio wireless Red spectrum light waves Ad hoc connections
Message boards Email
Which of the following are considered asynchronous technologies? (Select two.) Video conferencing Voice over Internet Protocol (VoIP) Message boards Email Live streaming
Video conferencing Instant messaging
Which of the following are considered private technologies? (Select two.) Video conferencing Instant messaging Chat rooms Live streaming Social media posts
Jane Austen's Pride and Prejudice The United States Constitution
Which of the following are primary sources? (Select two.) Newspaper article about new legislation Encyclopedia entry on wolves Documentary about the Great Depression Jane Austen's Pride and Prejudice The United States Constitution
Google Assistant
Which of the following can recognize different voices that it records and tailor its responses accordingly? Google Assistant Alexa Cortana Siri
Wireless adapter
Which of the following components is NOT required to create a network? Network media Network interfaces Wireless adapter Computer systems
Authentication Encryption
Which of the following features is supplied by WPA2 on a wireless network? (Select two.) Authentication Identification of the network Encryption Filtering of traffic based on packet characteristics Centralized access for clients Refusal of client connections based on MAC address
Social media makes it difficult to keep in touch with friends and family
Which of the following is NOT a drawback of social media? Social media companies make money by selling personal information Social media makes it difficult to keep in touch with friends and family Social media exacerbates social divisions Stories shared on social media are often exaggerated or false
Post the bully's physical address on social media
Which of the following is NOT a good response to cyberbullying? Reach out to the person who was targeted Do not like, share, or comment on bullying posts Respond to the bully in a calm, clear, and constructive manner Post the bully's physical address on social media
Relies fully on a stable internet connection
Which of the following is a disadvantage of a VoIP system? One account for internet and phone The costs associated with the initial setup Relies fully on a stable internet connection Users communicate using VoIP from PC to PC
Which of the following is a valid email address? support@testout support#testout.com support#testout [email protected]
Ethernet
Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network? Ethernet ArcNet 802.11n Token Ring Bluetooth
Thermostat
Which of the following is considered part of a smart home? TV Laptop Telephone Thermostat
Academic journal
Which of the following is most likely to have peer-reviewed material written by an expert in the field? Newspaper Academic journal Cable news channel Library book
DSL
Which of the following is not an example of wireless networking communications? Bluetooth DSL Infrared 802.11n
The sources are more likely to be peer reviewed
Which of the following is the BEST reason to search for articles in an online academic database? The sources contain a wider range of practical knowledge The sources generally provide better background information on topics The sources are more likely to include streaming video content The sources are more likely to be peer reviewed
The ability to quickly troubleshoot and fix any issues that may arise from customers
Which of the following is the MOST important skill an internet service technician can possess? Proficiency in front-end coding languages like HTML, CSS, and JavaScript Excellent communication skills and the ability to collaborate across teams The ability to quickly troubleshoot and fix any issues that may arise from customers A well-developed sense of color, font, layout, and images
Web Search
A search of the World Wide Web using a web browser, often done by visiting a web search engine site such as Google, Bing, or Yahoo.
Hyperlinks
Clickable text or images that take you to different sites on the World Wide Web are called __________. Hyperlinks Attachments Navigation buttons Shortcuts
OneDrive
Microsoft's cloud storage service, which is automatically installed on new versions of Windows, is called _____________. MicroCloud Dropbox Windows Store OneDrive
Most popular microblogging platform
Provides live video streaming
SMTP
SMTP, or Simple Mail Transfer Protocol, is used to send email. When you send a message, SMTP routes it through the Internet to its destination mail server. SMTP is used by all email systems that use the Internet.
Social network focused on images
Proxy Server
A device that stands as an intermediary between an application such as a web browser and the Internet. A proxy server intercepts all requests and can use filter rules to allow or deny internet traffic.
Cloud storage
A service that lets you store data in a remote location over the Internet is called _____________. Internet backup Database Online repository Cloud storage
Browser
A software application that accesses web applications and websites
World Wide Web
An information system that connects documents to each other by hypertext links
Internet
An interconnected global public computer network
Narrow Your Search
At the top of the list of search results, most search engines include a few options for narrowing your search to specific result categories. For example, you can click "News" and see news articles related to your search terms. Or you can click "Images or Videos" to view media results. Another option for narrowing your search is to return to the Search box and add or clarify search terms. You can also put some or all of the terms in quotations, which tells the search engine to display results containing that exact phrase instead of results that include each of the individual words.
Hyperlinks
On a web page, if you hover your cursor over certain words or images, the white arrow turns into a pointed finger. This lets you know there's a hyperlink to another webpage or to more information. Sometimes hovering over a hyperlink opens a dropdown menu.
HTTP
The Hypertext Transfer Protocol (HTTP) is used to identify resources and transfer hypertext pages on the World Wide Web.
Configuring Email Accounts
When configuring an email account on your computer or smartphone, you typically need to know the host names of both the incoming and outgoing mail servers. For example, if you want to check your Gmail messages using a different mail client like Microsoft Outlook, you would likely enter imap.gmail.com as the incoming mail server and smtp.gmail.com as the outgoing mail server.
Google Cloud
Which of the following charges resources used, such as bandwidth and processing power, by the second? OneDrive Google Cloud Microsoft Azure Amazon Web Services (AWS)
Social Media Optimization (SMO)
Which of the following describes the strategy that defines a businesses social media goals and objectives? Social media marketing Social channels Search Engine Optimization (SEO) Social Media Optimization (SMO)
Microsoft Paint
Which of the following does NOT rely on cloud technologies? Facebook Google Drive Microsoft Paint TestOut Desktop Pro
Office tools
Which of the following is a category of SaaS applications? Virtual machines Office tools Web hosting Disaster recovery
Web applications can carry a monthly or yearly fee.
Which of the following is a disadvantage of web applications? Web applications can be limited by the hardware they run on. Web applications can carry a monthly or yearly fee. Web applications can require a significant amount of disk space. Web applications can connect people in different locations.
World Wide Web
Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser? Internet Intranet World Wide Web Wide Area Network
A proxy server is filtering access to websites.
You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research. Which of the following is the MOST likely cause of this problem? Port triggering is redirecting traffic to the wrong IP address. A firewall is blocking ports 80 and 443. A proxy server is filtering access to websites. The router has not been configured to perform port forwarding.
Internet Service Provider
A company that provides access to the Internet
Pop-up Blocker
A feature of most web browsers that prevents pop-up windows such as advertisements from being displayed.
Computer Restart
A good tip for any computer problem you may run into is to restart your system, which will turn the computer off, then on again. To restart your Windows system, click the Start button at the bottom-left corner of the screen. Click the Power icon, then click Restart. This is a step you should always take before you call a technical support helpline, including TestOut's support team.
IP Address
A numerical label that is assigned to devices so they can connect and communicate on a network.
prevents unwanted advertisements
A pop-up blocker is a web browser feature that _________________. keeps the window in a minimized state prevents color images from being displayed prevents unwanted advertisements censors Internet searches
Cookie
A small piece of data sent from a website and stored on a user's computer by the web browser while the user is browsing. Cookies are designed to help websites remember information such as items in an online shopping cart and entries in a web form so that the website can customize a web page for the user.
Proxy settings
After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem? Browser cache Invalid certificate Private browsing Proxy settings
Wikis
All of the following formats may contain incorrect or misleading information. On which should you be MOST careful about trusting the information you come across as it may seem academically reviewed but in fact is not? RSS feeds Podcasts Wikis Blogs
Web Browser
An application for accessing information on the World Wide Web.
Cookies
Cookies are files that store data for specific websites. This data may contain information about your browsing habits and preferences, or even your email account and favorite sites. They can be saved on your computer for any length of time, sometimes for as long as the browser is open or even after you close it. If an attacker has access to these files, they can gather your personal information. It's important to review the security settings for cookie storage on your computer. A common practice is to block third-party cookies, which are placed on your computer by advertisers and other sites with a domain name other than the one you're currently visiting.
DNS
DNS, short for Domain Name System, is a protocol that associates domain names (such as web servers) with unique IP addresses. DNS servers translate URLs into machine-readable IP addresses.
Certificates
Ecommerce and other websites that handle sensitive information should be certified to indicate they're using a secure protocol with data encryption. To determine whether a website is using this safer protocol, you can look for the padlock symbol in the address bar. This will let you know that the site is using a valid digital certificate.
Configure the browser proxy settings.
Frank, a technician, has finished installing a wireless router. Jessica is connected to the WiFi. However, she can only see the company intranet pages. What should Frank do to troubleshoot the problem? Configure the browser proxy settings. Disable the pop-up blocker. Clear the browser cache. Apply a firmware update.
Investigate Author Biases
If you have any reason to doubt the reliability of an author's claim, find out more about his or her affiliations and investigate possible biases. What is the author's purpose? Is it simply to inform as objectively as possible, or is it to persuade you or sell you something? Does the author seem to be overly emotional or making outlandish claims?
Use Scholarly Sources for Academic Research
If you're working on academic or professional research, limit your searching to scholarly authors who have credentials in their field. Online academic databases such as Google Scholar are configured to limit search results to scholarly sources.
Navigation Buttons
If you've navigated to the wrong webpage, you can always click on the left arrow in the upper left corner of the browser, called the back button, to return to the previous page. From here, you can use the right button or forward button to return to go back to a website.
Compatible Browsers
If your web browser is not displaying website content properly, you might want to consider installing and using a different web browser. Sometimes a particular site might have been designed and programmed without taking into account different browser functionality. Popular web browsers include Google Chrome, Mozilla Firefox, Apple Safari, and Microsoft Edge. To take advantage of security and bug fixes, be sure that you're running the latest version of the browser.
Browser History
In Chrome, to see a list of all the web pages you've previously visited, you can click and hold down the Back button. Then select Show Full History. To return to one of these previously visited sites, simply click one of the links.
Startup
Kickstarter and Indiegogo are crowdsourcing platforms primarily started for which type of crowdsourcing? Financial hardship Brainstorming Idea Startup
Largest social media platform in the world
Messaging platform where messages disappear after being read
Address Bar
Near the top of browser windows is the address bar. This is where you can type the address for the website you want to visit. Another name for a web address is URL, or Uniform Resource Locator.
HTTPS
One of the biggest downsides of HTTP is that it transmits data as plain text. This is a problem, because an attacker could intercept the signal during transmission and read the sensitive information it contains. When they need to send or receive data securely, most websites use HTTPS, which combines HTTP with the Secure Sockets Layer (SSL) protocol. SSL encrypts data so unauthorized parties can't understand the data even if they manage to intercept it.
Client-Side Scripting
Scripting languages such as PHP and JavaScript are used to extend the functionality of web pages. The code for scripting languages can be executed either on the web server or on the client-side within the web browser itself. Since client-side scripting is a security risk on untrusted sites, it can be deactivated in some web browsers. However, since most modern websites rely on client-side scripting, it usually needs to be allowed. For greater control over which websites can run scripts, you could also choose to install a script blocker add-on for your browser.
Sift Through Search Results
Search engines use complex algorithms that rank websites according to their popularity, responsiveness, and overall "relevance." These rankings influence which sites are displayed near the top of your search results. Most search engines also highlight links to related content sponsored by advertisers. As you sift through search results, if you're looking for products or services related to your search terms, you might want to consider clicking on an advertised link. Otherwise, you'll want to ignore them and scan the list for more reliable, objective information. It's often a good idea to click through a few pages of results, since the most relevant pages might not be at the top of the list.
Verify Facts
Since information on the Internet is not regulated by a fact-checking body, it's important to verify claims by looking at multiple sources. Don't trust one or two sources of unverified pieces of information.
Cookies
Small files that a website saves on your computer to remember your preferences are called ______________. Malware Cookies Fingerprints Reminders
TCP/IP
TCP/IP stands for Transmission Control Protocol/Internet Protocol. It is the suite of protocols or rules that facilitate Internet communication.
TCP
The Transmission Control Protocol (TCP) adds a header to each IP packet. The TCP header helps the receiving computer to assemble the packets into the right configuration once the entire file is downloaded. The headers also allow the sending and receiving computers to verify with each other that each packet was received correctly.
Caching
The browser cache refers to the storage location for images, sounds, web pages, and other information associated with particular websites. In addition to taking up space on your computer, data in the cache could be retrieved by someone with access to your computer. To provide some level of protection, you should clear the Web browser cache after you use a public computer to access the Internet. In the Chrome menu, under More tools, you can see the option to clear browsing data. Sometimes, when a website is not functioning as it should, a good troubleshooting tip is to "clear the cache," or delete this stored information. In Chrome, when you click the Clear data button, you delete your browsing and download history, cookies, passwords, and other website data.
Client-Side Scripting
The process of transferring source code from a web server to a web browser and running that code directly in the browser.
Caching
The storing of images, sounds, web pages, and other information associated with particular websites that allows a browser to redisplay data without having to reload it from the website.
Cache
Web browsers save website information in their _________, which helps the site load faster on future visits. Repository Cache Storage Memory
Encryption
What do cloud services provide to help with privacy and security concerns? Collaboration Backups Accessibility Encryption
SaaS
What is the term for delivering an application over the internet called? IaaS SaaS FaaS PaaS
Browser Restart
When a web browser becomes unresponsive or slow, the problem can often be fixed by closing the browser and then opening it up again. This clears the computer's memory and lets you start with fresh content.
Proxy Servers
A proxy server is a device that stands as an intermediary between an application such as a web browser and the Internet. It intercepts all requests and uses filter rules to allow or deny Internet traffic. Proxy servers can improve performance on frequently-used websites. They can also be used to prevent access to specific websites. If you're using a school or public network and are able to access some websites but not others, the reason may be the network's proxy settings.
Private Browsing
If you share your computer with someone else and don't want Chrome to track your browsing activity, you can open a window in incognito mode. This is also called private browsing. Be aware that private browsing will only prevent the web browser from tracking your activity. If you're using a computer at school or work, your browsing will still be visible to network administrators.
Change browser settings to notify before downloading.
Martin just purchased a new computer and wants to surf the web. He is afraid his new computer may get infected by automatically installing viruses. What should he do to protect his computer? Change browser settings to block third-party cookies. Change browser settings to notify when downloads are complete. Change browser settings to notify before downloading. Change browser settings to prevent pop-up windows.
IP
The Internet Protocol (IP) is used to route information over the Internet. When you send a file over the Internet, IP divides it into small pieces and adds a header to each one. The header contains the source address and the destination address. The piece of data combined with the header is called a packet.
Safe Browsers
Whatever web browser you decide to use, make sure you're using the latest version. Older browsers often have security holes that are easy entry points for attackers if they're not patched. Some older browser versions are no longer even supported by the company that created them. Since many web applications enable different functionalities on your browser that leave you vulnerable to attacks, the safest policy is to disable most functions that are not absolutely necessary for the application. Then, if you determine a website is trustworthy, you can temporarily enable the functionalities as needed.
Easter eggs
What is one of the things that has set Siri apart from other digital assistants? Reminders Voice command Playing music Easter eggs
They save time for the network administrator.
What is the biggest benefit to using a DHCP server in a large network? There is no benefit to using a DHCP server. They save time for the network administrator. DHCP servers use DNS. DHCP servers can assign MAC addresses.
TCP/IP
What is the name of the protocol suite used on the Internet? UDP/IP HTTP TCP/IP HTTP/DNS
Intranet
A _________ is a private network that utilizes the same technologies as the Internet. Local Area Network Wide Area Network World Wide Web Intranet
Tertiary source
A catalog of all the mayor's speeches and news articles about them
Use Advanced Search Options
All of the popular search engines have some kind of advanced search option. Advanced searches provide several ways to refine and narrow your search, including fields for "exact words" and fields for words you do not want to be found in the source. You can also narrow the search by language, region, domain, and file type. One important thing to note about advanced searches is that the search filters are cumulative. This means you can apply as many of the filters as you want and they will all be applied at the same time. If your search ends up being too narrow, you can go back and remove some of the filters or try alternative phrases.
Crowdsourcing platform
Crowdsourcing is reaching out to a group (crowd) as a way to solve a problem. Which of the following provides a way to raise funds without web development expenses? Crowdsourcing media Crowdsourcing website Crowdsourcing campaign Crowdsourcing platform
Internet Protocol
Divides files into packets and routes them through the Internet to their destination
HTTPS
Encrypts and transfers hypertext pages on the World Wide Web
Attachments
Files that you send along with an email message are called __________. E-files Extras MMS Attachments
802.11n
Gary has finished installing a wireless router for his neighbor's small business. Which wireless standard should Gary use to support up to 150 Mbps on the 5 GHz band? 802.11n 802.11g 802.11b 802.11a
DNS
Matches unique IP addresses with easy-to-read URLs
Email Filtering
Most email clients include a feature that automatically filters out junkmail. While email filtering can be implemented by each user, it can also be enabled in incoming mail services to reduce spam and other unwanted email by blocking email based on the sender address or by content.
Network
Multiple computers configured to be able to communicate and share information with each other form a ____________. Group Commune Network Family
Open Source
One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but often requires a fee for support, training, or added functionality. What is the name of this model? Proprietary Open Source Personal Persistent Enterprise
Browser Extensions
Plug-ins and other browser extensions such as the Adobe Flash Player can be installed to enhance the appearance and functionality of websites. Untrusted extensions can take advantage of security vulnerabilities. Extensions can be temporarily disabled on particular browsers, or they can be deleted from the system. If you need to install a plug-in to use a legitimate website, make sure it's up-to-date with the latest version. Some websites require that you install a browser extension to support new functionality. If the extension does not appear to be working, check to make sure it's enabled in the browser. In Chrome settings, open an Extensions tab and turn the extension on. In some cases, you may need to remove an extension that's incompatible with others.
Search Engines
Search engines are tools that gather relevant websites from around the Internet and show them to you in a list. Every search engine has a text entry box where you can type the information you're looking for. A search engine can help you find what you're looking for even if you don't remember the web address. After clicking inside the text entry box, you can type words relevant to your search and press Enter to see the search engine results.
Collaborate across teams
Social media marketers need the ability to do what? Make a website useful Code in JavaScript Collaborate across teams Communicate with customers
Software as a service
Software that requires a monthly subscription fee is often called _______________. Software as a service Online-only software Web applications Temporary software
Smart door locks
Some IP-enabled devices are not considered IoT devices. Which of the following is considered an IoT device? Tablet Smart door locks TVs Smartphone
DNS
The Domain Name System (DNS) matches unique IP addresses with easy-to-read URLs. When you navigate to a website, your computer asks a DNS server which IP address corresponds to the URL you want to visit. DNS returns the correct IP address, which is then connected using the IP protocol.
HTTP and FTP
The Hypertext Transfer Protocol (HTTP) is used to identify resources and transfer content on the web. Some web pages use the HTTPS protocol, which adds an additional layer of encryption to make data transfers more secure. The File Transfer Protocol (FTP) can also be used to transfer data between computers on a network.
Primary source
The transcript of a speech by the mayor
Social Media
Web services that help people meet, interact, and share content with other people online are called ____________. Social Media Internetworks Facebooks Web Servers
Targeted ads Selling user-generated data to other companies
There are many social media platforms available today. What are the top two primary ways that social media platforms generate revenue? (Select two.) Usage fees Targeted ads Selling user-generated data to other companies Content Membership fees
Browser Settings
To change the Chrome startup options and other settings, click the Chrome menu in the upper right-hand corner of the browser and select Settings. In Settings you can manage your Google account, change autofill settings, customize appearance configurations, manage the default search engine and browsers, and change the startup options.
Bookmarks
To find a specific website more quickly in the future, you can add a bookmark. In Chrome, go to the upper right corner of the window and click the star symbol. Add the bookmark to the bookmarks bar and click Done. To return to the bookmarked page, you can click the Chrome menu and select Bookmarks. If you open a new tab in the browser, you can see the bookmark conveniently below the address bar.
HTTP
Transfers hypertext pages on the World Wide Web
UDP
Transmits packets in a continuous stream but doesn't verify packets
The look and feel of a website
What is a web designer responsible for? Web traffic metrics The content on social media The look and feel of a website The latest trends in design
TCP (Transmission Control Protocol)
Verifies that each packet has been transmitted and received correctly
VoIP
Voice over IP (VoIP) sends voice phone calls using the TCP/IP protocol over digital data lines. With VoIP, phone calls are made through a network connection rather than through a standard phone line. When you make the phone call, it is converted into digital data and sent through the network or over the Internet.
