Networks and the Internet unit test ******

Ace your homework & exams now with Quizwiz!

Which of the following applies to a trademark?

belongs to just one company or organization

A _____ is a hacker who criminally breaches the security of a computer or network.

black hat

Which of the following accurately completes this sentence. (choose all that apply) Online predators ____.

can go to jail if caught try to befriend young people

In a network, servers receive requests from which of the following?

clients, which are the networked computers that request data.

lets people access their stored data from a device that can access the Internet.

cloud computing

Which of these improved the ability to send information over the network in the 1970s?

ethernet

What is the term for the exception to copyright that allows you to use copyrighted work without permission?

fair use

WANs are

networks that cover a large geographic area

Computer viruses are:

unwanted programs that may harm the computer.

The person responsible for the creation of the group known as ICANN is

vinton cerf

Select the problem-solving strategies a network administrator is likely to use. Check all of the boxes that apply.

try things that have worked before check the manuals ask others who might know what the problem is

How are computers connected to one another?

through networks

A hierarchical addressing scheme is used

to identify computers on the network.

Data is either sent one piece at a time over the wire (serial) or many different wires carry parts of the same transmission(parallel):

transmission types

What US agency originally started ARPANET?

Department of Advanced Research Projects Agency

LANs are

short ranged networks that increase speed of the network

Who came up with the idea for hypertex?

Tim Berners-Lee

WAN stands for

Wide Area Network.

A ______ connects many different Ethernet devices and forwards packets to all connected devices.

hub

Information or devices that can be accessed remotely from another computer:

shared resources

Which of the following statements describes patches?

They solve problems with software or security.

You would like to share information you found on a website. (select all that apply) You should:

give credit to the source of the information on the website. check to be sure this information is reliable and accurate.

The TCP/IP protocol was invented by

robert kahn and vinton cerf

Equipment that directs data to the right location:

router

The first network was called

ARPANET

Jeanne writes a song, and Raul wants to perform it. What should Raul do?

Ask Jeanne for permission to use her song in the show.

Which explanation best explains the importance of using encryption?

Encryption protects sensitive information.

Which of the following is the most reliable way to check the accuracy of a website?

Examine the sources cited by the website.

If you wanted to use information you found on a website, how could you do that in an ethical way? (select all that apply)

Give credit to the person or organization responsible for the site. Cite your sources.

One of the biggest changes to the usability of the Internet for people was the ability to use an easy way to remember site addresses. Which of the following was responsible for this?

ICANN

A unique location for a computer on the network:

IP address

Which outcome is one of the negative consequences of anonymous communication over the Internet?

It can lead to harassment and bullying.

Which of the following are disadvantages of networks? Check all of the boxes that apply.

Network intruders can access all computers on a network. Networks are costly to set up

Which of the following is a trend in Internet computing?

People are using a greater number and variety of apps to help them do everyday things.

What best describes the difference between plagiarism and fair use?

Plagiarism is copying material without crediting the source, while fair use is a limited, nonprofit use.

What was the original intention for the creation of ARPANET?

Scientists could share information and collaborate.

Which of the following statements are true of network packets? Check all of the boxes that apply.

They contain control information. They contain user data. They are sent over a network.

Which of the following statements describes the way networks are set up?

WANs are made up of LANs.

Which of the following statements is true of WANs?

WANs can be as big as the Internet.

The trademarked name of the accepted standard for configuring wireless networks is .

WiFi

What is the name of the type of connection standard used in wireless networking?

WiFi

What does WLAN stand for?

Wireless Local Area Network

What does the URL ending .com mean?

a business website

A client is

a computer that requests a service.

Which of the following does cloud computing allow users to do? Check all of the boxes that apply.

access data from anywhere with the Internet connection store pictures and music store data

Which of the following is an example of a payload?

an email message

A future trend of data storage is sure to be

an increase in cloud computing

How fast data travels on the network:

bandwith

The maximum data transfer rate, or capacity, of a network or Internet connection:

bandwith

A network technology with a higher bandwidth than older technologies is called

broadband

Troubleshooting is

the act of trying to fix what is wrong in a system.

Which is the best definition of a network?

computers and hardware connected so that they can share data

Telecommunications networks include _________ within an organization.

computers and telephones

The network backbone

connects routers to more efficiently route data.

Cloud computing helps to address

data storage problems

Routers know where to send a network packet because they read the _______ contained in the packet. The ________ is the information that a user wants to send. A(n) ________ is an example of a payload.

control information payload email message

A network packet contains two kinds of information. What are they?

control information and user data

Workplace ethics include

doing the work you have agreed to do while at work.

Ethics is a way of behaving so that you are

doing what is right

File sharing is a way for people to

download entire books

Check all of the improvements and inventions of the 1970s.

e-mail hardware improvements improved data transmissions

The ability of a network to recover after any type of failure:

fault tolerence

Part of the network that allows communication with other networks

gateway

Around the world, all the laws governing behavior on the Internet are

hard to enforce.

The physical equipment

hardware

What do network operating systems use? Check all of the boxes that apply.

hardware software

If someone gets on the network who is not authorized to have access,

he can steal people's information. He can do damage to the network. he can make the network crash.

Which two factors most influenced the growth of the Internet during the 1970s?

increase in the power of computer hardware and increased funding from the National Science Foundation

Local Area Networks (LANs) _________.

increase networking speed

DARPA was created to:

investigate technologies for the military in the US.

The letters LAN stand for ______ Area Network.

local

Which of the following is a current development in networking?

need for better data storage

The way the network is laid out, including all the interconnections:

network topology

Windows, Apple's Mac OS, and Unix/Linux are just some of the most common

operating systems that can network.

Which of the following activities have been made possible because of improvements in computer networks? Check all of the boxes that apply.

organizing the storage of data accessing the Internet at the same time as other users

Who did the IAB ask for ideas about how people should behave on the Internet?

other users

A type of network that does not use a router but shares data directly between computers:

peer to peer

P2P stands for

peer to peer

Cloud computing allows:

people to access information and applications from a web browser.

Trademark and copyright were first established so that

people's intellectual property would be protected

Which of the following uses of the Internet is unethical?

purchasing vacation flights online during work hours

A network that only people who have the right credentials can access

secured network

Wikis are

sites that allow for collaboration between many people

Mobile technologies access the network and are recent inventions. What are mobile technologies? (select all that apply)

smartphones laptops tablets netbooks

The programs used to run the network

software

Software as a Service (SaaS) allows users to remotely access which of the following? Check all of the boxes that apply.

software data applications

The program that allows jobs like printing to be saved until the printer is ready for the next job:

spooler

When all computers in a network are connected in a "star" formation:

star topology

What type of connection did networks use to communicate in the 1960s?

telephone

The first idea for a communications network was called:

the galactic network

What is an easy way to cut down on spam?

turn on the spam filter in your e-mail

A network that anyone can access

unsecured network

What is spam? (select all that apply)

unwanted communication can be inappropriate or harmful

Integrated Services Digital Network (ISDN) is the digital transmission that allows which of the following services? Check all of the boxes that apply.

voice television Internet mobile phones

You found something on the Internet about a topic for a paper. Which of the following are efficient ways to use the Internet? Check all of the boxes that apply.

Check to see if this information is reliable. Think critically about what you found to see if it makes sense based on your prior knowledge. Make sure that the Internet is the best place to be doing research of this type.

Which of the following are ways to avoid computer viruses? (choose all that apply)

Do not open e-mail attachments from strangers. Do not share personal information with people you do not know. Install security updates on a regular basis

Which of the following is used for security? Check all of the boxes that apply.

Firewall antivirus programs network backups

Which of the following statements describes antivirus software?

It identifies and removes viruses in computers.

Which of the following statements is true of a hierarchical addressing scheme? Check all of the boxes that apply.

It includes different parts that represent the location of a computer or device on a network. It is used for IP addresses.

Why is the access date important to include when citing a website? (select all that apply)

It indicates websites changes. It indicates website accessibility changes.

Identify the disadvantages with wireless. Check all of the boxes that apply.

It is easier for unwanted intruders to access the network. The network takes some expertise to set up Interference can change how well devices connect.

Use of the Internet for e-government has increased. Identify the benefits by checking all of the boxes that apply.

It keeps the public informed about events in the town. People can pay bills. The government can share important information about issues with the people in that town

Which of the following statements describe encryption? Check all of the boxes that apply.

It turns data into cipher text. It makes data unreadable without a decryption It helps secure data. key.

Which best describes the significance of ARPANET?

It was the first WAN.

Who first thought of the "galactic network?"

J. C. R. Licklider

Which of the following statements describe network backups? Check all of the boxes that apply.

Network backups help secure networks against failure. Network backups are usually done nightly.

Which of the following statements best describes network security?

Network security protects individuals' privacy.

How can people check whether information they found on the Internet is reliable?

People can determine if what they read agrees with other information they know is true.

Which of the following statements is true of hackers? Check all of the boxes that apply.

Some hackers are criminals. Some hackers do it as a form of protest. Some hackers are network security professionals who want to improve the security of a network by identifying flaws.

What helps you evaluate websites for reliable information? (select all that apply)

The information you found is repeated or agrees with what you already know to be true. The domain name ending indicates the website is reliable (.gov, for example).

The agency that started ARPANET was looking for technologies that could be used by

The military

Which of the following are security dangers to using the Internet at work? Check all of the boxes that apply.

There is greater potential for data loss. Security breaches can occur. Viruses can get into the network.

Which of the following statements describe cookies? Check all of the boxes that apply.

They can be removed from a computer. They are mostly harmless and useful.

Which of the following statements describe computer firewalls? Check all of the boxes that apply.

They check incoming packets to make sure that they have the right credentials. They check the behaviors of packets.

Which of the following are true of trademarks? Check all of the boxes that apply.

They protect logos. They show who the maker of the item is. They can be registered with the government.

Why has e-commerce expanded?

Users can trust the site with personal information.

Intellectual property issues cover many different types of creations. Which of the following are intellectual property? Check all of the boxes that apply.

a newspaper a student's diary the script of a play a painting hanging in a museum

Select the item in the drop-down menu that best describes social networking:

allows users to find others with similar interests

What are some current and future trends for network technology? Check all of the boxes that apply.

an increase in the number and types of devices an increase in the number and types of applications an increase in the use of the cloud

A wireless mobile device is set up so that it can receive a signal

anywhere its service broadcasts and it can receive a signal.

______ are programs that help people work and play online.

applications

What is missing in this list of information needed to cite a journal article? Title, journal title, edition, volume number, date, page numbers

author's name

What increases efficiency when using the Internet? Check all of the boxes that apply.

being prepared for a search looking to see that the information is reliable using the browser's "bookmark" tool

Which behaviors should be avoided because they are wrong or illegal?

changing other people's files without permission

What is missing in this list of information needed to cite a book? Author, title, date, publisher

city and state where it was published

Computer that uses the service provided by a server:

client

Which of the following is plagiarism?

copying a story from a book and then turning it in as your own creation

What is software piracy? Check all of the boxes that apply.

copying computer software or programs illegally making lots of copies and sharing with friends breaking the security on software so it can be used illegally

What does network administration normally include? Check all of the boxes that apply.

design of the network security for the network documentation identifying and fixing issues

What are some benefits of the Internet? (select all that apply)

ease of communication e-mail collaboration

Copyright protects the rights of the author of a book

for the life of the author plus seventy years

Which of the following is the most common cause of network failure?

human error

Two of the computers at work suddenly can't go online or print over the network. The computers may be trying to share the same IP address.

logging off one of the computers, and then logging back on

Everyone wants to avoid online predators. One good way to protect oneself is to

never give out personal information to people you have met online

Which of the following devices can be connected to a network? Check all of the boxes that apply.

printers smartphones laptops tablet computers

Identify the examples of ethical behavior. (select all that apply)

quoting a website's information and citing the source making sure that the information is accurate

Routes data where it is meant to go

router

The network backbone is not directly connected to computers. Instead, data goes through the______ first.

router

Creative Commons allows creators of intellectual property to

say how others can use their work.

Which of the following best describes the path of a network packet on the Internet?

sender, router 1, router 2, router 3, receiver

Creative Commons allows the creator of an artistic work to

share the work in the way she chooses to

Which of the following are items that are concerns for e-government? Check all of the boxes that apply.

sharing information with people sharing trustworthy information keeping personal information safe

Government agencies work to catch people who engage in software piracy, and_______ can also help to stop them by filing lawsuits.

software producers

Software piracy occurs when

someone steals software.

Which of the following is an unethical use of the Internet?

spreading rumors or gossip about people

A ______ connects network devices or different parts of a network and forwards messages to specific recipients.

switch

Select the best answer to the question: Which of the following best describes e-commerce?

the ability to do business online

Network administration is concerned with which tasks?

the installation and maintenance of network hardware and software

Which of the following are goals of e-government? Check all of the boxes that apply.

to have a secure website to be able to protect the personal information of the people who use the site to make information about the government available

A router sends data

to the correct computer. where it should go. based on the data's destination.

Which of the following is an example of intellectual property?

when you create a drawing based on something from your own imagination

When data is transmitted wirelessly, the computer needs_____ in order to receive it.

wireless access technology

What is the main benefit of a Wiki website?

collaborative content authoring

Which of the following protects intellectual property?

copyright

Intellectual property can be defined as

creations made from peoples imagination

Text within a document that is linked to other information available to the reader:

hypertext

The order in which certain jobs, such as print jobs, are received:

queue

Which device is used to direct the flow of data on a computer network?

router

Rules for how routers communicate with one another and send data:

router protocols

What was the original reason for the creation of ARPANET?

scientists and researchers could communicate and share information

The computer that responds to requests from the client computer:

server

What does e-commerce allow people to do? Check all of the boxes that apply.

shop online securely order items on the Internet set up an online store

Which of the following belongs in a website citation? (select all that apply)

the Internet address or web page address the person or organization responsible for the website the date when you got the information

Why is the .gov domain name so useful to know?

.gov sites have official authorization so they are usually reliable sites.

Which of the following statements describes spyware?

It tracks users' behavior online.

Why is network security important? Check all of the boxes that apply.

Network security allows organizations to continue to function. Network security keeps intruders out of the network. Network security prevents personal information from getting into the wrong hands.

What is the meaning of ethics? Check all of the boxes that apply.

behavior that is good for everyone following the rules behaving in a way that would be easy to defend

Select the correct description of adware.

advertisements used in programs


Related study sets

chapter 1 - The Nurse's Role in Health Assessment

View Set

ACE Group Fitness Instructor (Chapter 1)

View Set

Chapter 20 3-D Physiology - The Cardiac Cycle

View Set

Chapter 45: Male Reproductive System Patton: Anatomy and Physiology, 10th Edition

View Set

Strategic Mgnt - Exam #1 Practice Questions

View Set

Histopath Lec (Quality)n [Midterm]

View Set

Drugs & Drug Policy Chapter 3 & 4 Study Guide

View Set

MD Real Estate Practice & Law Unit 5 & 6

View Set