chapter 002 the internet & the world wide web exploring...

174
Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Multiple Choice Questions 1. An expression for how much data can be sent through a communications channel in a given amount of time is referred to as ________. A. connectivity B. dial-up C. bandwidth D. download 2. Generally, a very high-speed internet connection is referred to as ________. A. broadband B. dial-up C. bandwidth D. upload 3. The wired or wireless means of connecting a computer to the internet is called a ________. A. broadband B. physical connection C. dial-up D. bandwidth 4. Bps stands for ________. A. bytes per second B. bits per second C. bandwidth per second D. broadband per second 2-1

Upload: lytu

Post on 30-Jan-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

 

Multiple Choice Questions 

1. An expression for how much data can be sent through a communications channel in a given amount of time is referred to as ________. A. connectivityB. dial-upC. bandwidthD. download

 

2. Generally, a very high-speed internet connection is referred to as ________. A. broadbandB. dial-upC. bandwidthD. upload

 

3. The wired or wireless means of connecting a computer to the internet is called a ________. A. broadbandB. physical connectionC. dial-upD. bandwidth

 

4. Bps stands for ________. A. bytes per secondB. bits per secondC. bandwidth per secondD. broadband per second

 

5. Megabits per second are ________. A. 1 million bits per secondB. 10,000 bits per secondC. 1,000 bits per secondD. 100 bits per second

 

2-1

Page 2: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

6. Gigabits per second are ________. A. 1 hundred bits per secondB. 1 thousand bits per secondC. 1 million bits per secondD. 1 billion bits per second

 

7. The transmission of data from a remote computer to a local computer is referred to as ________. A. uploadB. downloadC. broadbandD. bandwidth

 

8. The transmission of data from a local computer to a remote computer is called ________. A. uploadB. downloadC. broadbandD. bandwidth

 

9. What consists of hardware and software and allows voice, video, and data to be communicated over traditional copper-wire telephone lines? A. ISDNB. cable modemC. communications satelliteD. bandwidth

 

10. The internet connection that uses regular phone lines to transmit data in megabits per second is ________. A. T1 lineB. cable modemC. DSL lineD. communications satellite

 

2-2

Page 3: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

11. Which traditional trunk line carries 24 normal telephone circuits and has a transmission rate of 1.5 Mbps? A. T1 lineB. cable modemC. DSL lineD. communications satellite

 

12. What connects a personal computer to a cable-TV system that offers an internet connection? A. T1 lineB. cable modemC. DSL lineD. communications satellite

 

13. A space station that transmits radio waves called microwaves from earth-based stations is called a ________. A. T1 lineB. cable modemC. DSL lineD. communications satellite

 

14. The method of going online that requires the user to be within 3.3 miles of a phone company central switching office is ________. A. dial-up modemB. DSLC. T1 lineD. satellite

 

15. The line most commonly used by corporate, government, and academic sites is ________. A. DSLB. T1 lineC. satelliteD. ISDN

 

2-3

Page 4: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

16. Which of the following is NOT an advantage of DSL? A. fast downloadB. connection always onC. consistent transmission rateD. universal availability

 

17. Which of the following is NOT an advantage of a T1 line? A. affordabilityB. high speed transmissionC. 24 separate circuits of 64 kbps eachD. supports many users

 

18. Which of the following is NOT an example of a download? A. Saving pictures from the internet to your hard drive.B. Storing a map for your vacation from the internet to your hard drive.C. Saving a presentation to a CD.D. Saving a program from an internet site to your hard drive.

 

19. Which of the following is NOT an example of an upload? A. Sending a photograph as an email attachment.B. Saving your favorite music videos from a music website to your hard drive.C. Sending a spreadsheet as an email attachment.D. Submitting a term paper to an instructor online.

 

20. Using a user name and password, the ISP will allow the user to connect or ________. A. log onB. downloadC. uploadD. log out

 

2-4

Page 5: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

21. ISP stands for ________. A. internet select providerB. internet service providerC. internet serial providerD. internet service pusher

 

22. A search engine that allows you to search several search engines simultaneously is called a ________. A. megasearch engine.B. hypersearch engine.C. metasearch engine.D. none of these.

 

23. An automatic email mailing list of people who regularly participate in discussion topics are called ________. A. attachmentsB. instant messagingC. listservD. spam

 

24. If you were emailing a term paper and wanted to maintain its formatting, it would be sent as a(n) ________. A. regular emailB. instant messageC. listserv messageD. attachment

 

25. The .gov, .com, .net, and .edu extensions are examples of ________. A. emoticonsB. FAQsC. top-level domainsD. URLs

 

2-5

Page 6: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

26. Any user on a given email system can send a message and have it pop up instantly on the screen of anyone else logged onto that system using ________. A. attachmentsB. instant messagingC. list-servesD. spam

 

27. Which of the following is NOT an example of good netiquette? A. Consult the frequently asked questions (FAQs).B. Don't SHOUT.C. Don't send large file attachments, unless requested.D. When replying, send the entire original message for reference.

 

28. Which of the following is NOT an example of flaming? A. a lieB. an ethnic jokeC. profanityD. a sexist comment

 

29. In terms of privacy, email is like ________. A. a sealed letterB. an insured packageC. a postcardD. a notarized document

 

30. An uninvited email solicitation to participate in a money-making scheme is an example of ________. A. flamingB. spamC. netiquetteD. list-serve

 

2-6

Page 7: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

31. If you wish to be part of an online discussions on a favorite topic of interest, you would subscribe to a(n) ________. A. instant message serviceB. listservC. spam trackingD. online group

 

32. Connections to other documents or web pages that contain related information are called ________ links. A. web portalB. multimediaC. URLD. hypertext

 

33. The set of special instructions that are used to specify document structure, formatting, and links to other multimedia documents is called ________. A. HTMLB. hypertextC. multimediaD. web portal

 

34. A computer with a domain name is called a ________. A. web pageB. websiteC. homeD. web portal

 

35. The location on a particular computer on the World Wide Web that has a unique address is called a ________. A. home pageB. web pageC. websiteD. web portal

 

2-7

Page 8: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

36. A secret word or string of characters that allows you to log on to a remote computer is called a ________. A. passwordB. websiteC. URLD. UserID

 

37. The first page seen at a website is called the ________. A. community pageB. home pageC. browserD. protocol

 

38. Software that enables users to find and access the various parts of the web is called a ________. A. home pageB. websiteC. browserD. web page

 

39. A string of characters that points to a specific piece of information on the web is called the ________. A. URLB. HTTPC. protocolD. browser

 

40. A set of communications rules for exchanging information is called a ________. A. web browserB. HTMLC. URLD. protocol

 

2-8

Page 9: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

41. The communications rules or protocols that allow browsers to connect with web servers is ________. A. HTTPB. HTMLC. JavaD. URL

 

42. Little circles located in front of various options, which can be selected with the mouse, are called ________. A. hyperlinksB. radio buttonsC. text boxesD. web portals

 

43. An independently controllable section of a web age is called a ________. A. hyperlinkB. web siteC. frameD. window

 

44. Websites that group together in one convenient location popular features such as online shopping malls, email support, community forums, current news and weather are called ________. A. home pagesB. browsersC. search enginesD. web portals

 

45. Which of the following provides lists of several websites classified by topic? A. web portalB. subject directoryC. metasearch engineD. browser

 

2-9

Page 10: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

46. The subject word or words of the topic you wish to find while using a search engine is called the ________. A. directoryB. URLC. keywordD. web portal

 

47. Which of the following can be used to locate information on the web by asking questions or using keywords? A. search enginesB. home pagesC. community pagesD. URLs

 

48. A program that adds a specific feature to a browser, allowing it to play or view certain files is a ________. A. scriptB. plug-inC. tagD. cookie

 

49. Plug-ins are also called ________. A. playersB. viewersC. browsersD. Both A and B

 

50. Small Java programs that can be quickly downloaded and run by most browsers are called ________. A. cookiesB. appletsC. active XD. hypertext

 

2-10

Page 11: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

51. The rapid sequencing of still images to create the appearance of motion is called a(n) ________. A. animationB. hyperlinkC. scriptD. applet

 

52. The technology in which software automatically downloads information to your computer is called ________. A. pull technologyB. downloadC. push technologyD. upload

 

53. The technology in which customized text, audio, and video are sent automatically to the user on a regular basis is called ________. A. webcastingB. broadcastingC. surfingD. streaming

 

54. A method whereby one can connect to a remote computer and transfer files to their own microcomputer's hard disk via TCP/IP over the internet is called ________. A. NetBEUIB. FTPC. ARAPD. SLIP

 

55. Which of the following is an FTP client program? A. CuteB. PutC. GrabD. FTP net

 

2-11

Page 12: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

56. With ________, online participants have a typed discussion while staying online at the same time. A. real-time chatB. blogsC. telnetD. newsgroups

 

57. Web logs made by various users that are also accessible to others are called ________. A. real-time chatB. blogsC. telnetD. applets

 

58. RSS newsreaders are also known as ________. A. attachmentsB. aggregatorsC. podcastersD. webcasts

 

59. To access a newsgroup, a(n) ________ program is needed. A. browserB. appletC. newsreaderD. chat

 

60. Which of the following is a person-to-person auction site? A. www.acponline.orgB. www.ebay.comC. www.onSale.comD. www.thirdage.com

 

2-12

Page 13: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

61. Trading, banking, and e-money can be classified as ________. A. online financeB. online job-huntingC. online matchmakingD. online auctioning

 

62. Forging of an email sender name so that the message appears to have originated from someone or somewhere other than the actual source is called ________. A. spoofingB. phishingC. pharmingD. spyware

 

63. Adware is also called ________. A. cookiesB. spamC. pop-up generatorsD. None of these

 

64. One type of spyware is ________. A. browser hijackersB. search hijackersC. key loggersD. All of these

 

2-13

Page 14: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

 

True / False Questions 

65. Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of time. True    False

 

66. The wired or wireless means of connecting to the internet is called a physical connection. True    False

 

67. Bps stands for bandwidth per second. True    False

 

68. One kilobit per second is the same as 1 million bits per second. True    False

 

69. Mps stands for megabits per second. True    False

 

70. The term gigabit refers to 1 billion bits per second. True    False

 

71. Upload is the transmission of data from a remote computer to a local computer. True    False

 

72. Download is the transmission of data from a local computer to a remote computer. True    False

 

2-14

Page 15: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

73. Integrated Services Digital Network (ISDN) consists of hardware and software that allows voice, video, and data to be communicated over traditional copper-wire telephone lines. True    False

 

74. Digital subscriber line (DSL) uses satellite technology to transmit data in megabits per second. True    False

 

75. A T1 line is essentially a traditional trunk line that carries 24 normal telephone circuits and has a transmission rate of 1.5 Mbps. True    False

 

76. A cable modem connects a personal computer to a cable-TV system that offers an internet connection. True    False

 

77. A communications satellite, a space station that transmits radio waves called microwaves from earth-based stations, can be used to retrieve information from the internet. True    False

 

78. Kilobits per second are faster than megabits per second. True    False

 

79. The transmission of the latest pinball game off a subscriber network to a home computer is an example of an upload. True    False

 

2-15

Page 16: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

80. The transmission of credit information to order something online is an example of an upload. True    False

 

81. A cable modem is an example of a physical connection to the internet. True    False

 

82. Cable modem lines are shared with other cable users in a particular area and can be slower during peak use periods. True    False

 

83. You can have a cable modem connection even if there is no cable television available in your area. True    False

 

84. The primary advantage of DSL is that it is always on and its transmission rate is consistent. True    False

 

85. The primary advantage of a T1 line is its affordability. True    False

 

86. A DSL line can be installed anywhere as long as the user has a telephone line. True    False

 

87. ISP stands for internet service provider. True    False

 

2-16

Page 17: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

88. An internet service provider (ISP) provides users with access to the internet. True    False

 

89. To log on or make connection to a remote computer, first enter the password and then the user name or user ID. True    False

 

90. A domain is simply a location on the internet. True    False

 

91. With instant messaging, any user on a given email system can send a message and have it pop up instantly on the screen of anyone else logged onto that system. True    False

 

92. A listserv is an automatic mailing list server that sends email to subscribers who regularly participate in discussion topics. True    False

 

93. Guides to appropriate online behavior are called netiquette. True    False

 

94. Most online groups post frequently asked questions (FAQs) that explain expected norms of online behavior for a particular group. True    False

 

95. Spamming is writing an online message that uses derogatory, obscene, or inappropriate language. True    False

 

2-17

Page 18: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

96. Use of all-capital letters on the internet is considered appropriate online behavior. True    False

 

97. Emoticons are keyboard-produced pictorial representations of expressions. True    False

 

98. Flaming refers to unsolicited email in the form of advertising or chain letters. True    False

 

99. Some commonly used top-level domains are .net, .com, .gov, and .edu. True    False

 

100. Many viruses ride along with email attachments. True    False

 

101. Instant messaging can be used to post advertisements on computer screens. True    False

 

102. It is important to type email addresses exactly as they appear. True    False

 

103. Emails can be organized with instant organizers called routers to sort emails based on certain criteria, such as the sender's name or the mailing list. True    False

 

104. URL is the website's unique address. True    False

 

2-18

Page 19: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

105. HTML is the set of special instructions that are used to specify document structure, formatting, and links to other documents. True    False

 

106. A website is the location of a web domain name in a computer somewhere on the internet. True    False

 

107. A browser is a document on the World Wide Web that can include text, pictures, sound, and video. True    False

 

108. The first page seen at a website is called the community page. True    False

 

109. A portal is software that enables users to view web pages and to jump from one page to another. True    False

 

110. A URL is a string of characters that points to a specific piece of information on the web. True    False

 

111. HyperText Transfer Protocol or HTTP refers to the communications rules that allow browsers to connect with web servers. True    False

 

112. Radio buttons are little circles located in front of various options, selecting an option with the mouse places a dot in the corresponding circle. True    False

 

2-19

Page 20: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

113. Scroll arrows, small up/down and left/right arrows, can be used to move the screen to see the rest of the web page. True    False

 

114. A frame is an independently controllable section of a web page. True    False

 

115. Search engines are websites that group together in one convenient location popular features such as search tools, email, electronic commerce, and discussion groups. True    False

 

116. A subject directory allows you to search for information by selecting lists of categories or topics. True    False

 

117. Search engines are programs that enable you to ask questions or use keywords to help locate information on the web. True    False

 

118. A web portal is a program that adds a specific feature to a browser, allowing it to play or view certain files. True    False

 

119. A metasearch engine allows you to search for information by typing one or more keywords, and the search engine then displays a list of web pages, or "hits," that contain those key words. True    False

 

2-20

Page 21: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

120. Plug-ins are also called players and viewers. True    False

 

121. RSS newsreaders and RSS aggregators are the same thing. True    False

 

122. Applets are small programs that can be quickly downloaded and run by most browsers. True    False

 

123. Spam consists of little text files left on your hard disk by some websites you visit. True    False

 

124. Applets are written in Java, a complex programming language that enables programmers to create animated and interactive web pages. True    False

 

125. Streaming video is the rapid sequencing of still images to create the appearance of motion, such as in a cartoon. True    False

 

126. In pharming, thieves implant malicious software on a victim's computer that redirects the user to an impostor web page even when the individual types the correct address into his or her browser. True    False

 

127. Streaming video is the process of transferring data in a continuous flow so a file can be viewed before the end of the file is sent. True    False

 

2-21

Page 22: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

128. Streaming audio allows you to listen to a file while the data is still being downloaded to your computer. True    False

 

129. Pull technology automatically downloads information to your computer. True    False

 

130. Webcasting sends customized text, video, and audio automatically on a regular basis. True    False

 

131. Internet telephony is the method of using the internet to make a phone call, either one-to-one or for audio conferencing. True    False

  

Fill in the Blank Questions 

132. The type of data transmission that allows only one signal at a time is called ____________________________ transmission. ________________________________________

 

133. When several signals can be transmitted at once, it is called ____________________________ transmission. ________________________________________

 

134. The wired or wireless means of connecting to the internet is called a(n) ____________________________ connection. ________________________________________

 

2-22

Page 23: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

135. A device that sends and receives data over telephone lines to and from computers is called a(n) ____________________________. ________________________________________

 

136. The device that connects a personal computer to a cable-TV system that offers an internet connection is called a(n) ____________________________. ________________________________________

 

137. A space station that transmits radio waves from earth-based stations is called a ____________________________. ________________________________________

 

138. The radio waves transmitted from a communications satellite are called ____________________________. ________________________________________

 

139. Data is transmitted in characters or collections of ____________________________. ________________________________________

 

140. The minimum speed needed for visiting websites with graphics is ____________________________. ________________________________________

 

141. The speed of a modem that is 28,800 bps can be expressed as ____________________________ Kbps. ________________________________________

 

142. One Gbps is approximately 1 ____________________________ bits per second. ________________________________________

 

2-23

Page 24: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

143. Downloading is the transmission of data from a(n) ____________________________ computer to a ____________________________ computer. ________________________________________

 

144. Transmitting data from a local PC to a website being constructed by a user can be termed as a(n) ____________________________. ________________________________________

 

145. A modem that uses telephone lines to transmit data generally uses a(n) ____________________________ connection. ________________________________________

 

146. Communications satellites transmit data at a rate of 512–1500 ____________________________. ________________________________________

 

147. The internet service provider's (ISP's) local access point for a particular area is its ____________________________. ________________________________________

 

148. The internet's high-speed, high-capacity communication lines are the ____________________________. ________________________________________

 

149. A collection of modems and other equipment in a local area is called a ____________________________. ________________________________________

 

2-24

Page 25: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

150. When two modems connect to each other at a single ISP location, the process is called ____________________________. ________________________________________

 

151. Every computer on the internet has a(n) ____________________________ address. ________________________________________

 

152. A set of rules that computers must follow to transmit data electronically is called ____________________________. ________________________________________

 

153. The protocol that enables all computers to use data transmitted on the internet is called ____________________________. ________________________________________

 

154. To send data over the internet, TCP/IP breaks data into smaller blocks called ____________________________. ________________________________________

 

155. The group established to regulate internet domain names is ____________________________. ________________________________________

 

156. The ____________________________ database returns the name and address of any domain name entered. ________________________________________

 

2-25

Page 26: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

157. The ____________________________.is the organizational home for groups responsible for internet infrastructure standards. ________________________________________

 

158. To avoid making their customers pay long-distance phone charges to connect, ISPs provide each customer with a ____________________________ . ________________________________________

 

159. Internet ____________________________ form the equivalent of an interstate highway system. ________________________________________

 

160. An IP address consists of four sets of numbers between ____________________________ and ____________________________. ________________________________________

 

161. An IP address consists of four sets of numbers separated by ____________________________. ________________________________________

 

162. Each time a user connects to an ISP, the ISP will assign the computer a new IP address for that session called a ____________________________ address. ________________________________________

 

163. ISPs that don't run their own backbones connect to an internet backbone through a ____________________________. ________________________________________

 

2-26

Page 27: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

164. Network access points (NAPs) are owned by a ____________________________, a large communications company. ________________________________________

 

165. To facilitate more efficient routing of data back and forth in the internet, by providing more backbone access locations, ____________________________ were introduced. ________________________________________

 

166. The ____________________________ part in TCP/IP is used to send data packets across the internet to their final destination. ________________________________________

 

167. In TCP/IP, the ____________________________ part is used to reassemble the packets in the correct order. ________________________________________

 

168. Incoming mail is usually stored on an ISP's server called a ____________________________. ________________________________________

 

169. Outgoing mail is sent to a ____________________________ server. ________________________________________

 

170. A location on the internet is called a ____________________________. ________________________________________

 

171. In an email address, the first section, called the ____________________________ identifies who is at the address. ________________________________________

 

2-27

Page 28: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

172. The second section of an email address, located after the "@" symbol, which tells the location and type of address, is called the ____________________________. ________________________________________

 

173. The user name and domain name in an email address are linked by the ____________________________ character. ________________________________________

 

174. With ____________________________, any user on a given mail system can send a message and have it pop up instantly on anyone's screen who is logged on to the system. ________________________________________

 

175. An automatic mailing list server that sends email to subscribers who regularly participate in discussion topics is called ____________________________. ________________________________________

 

176. Appropriate online behavior can also be called ____________________________. ________________________________________

 

177. Writing online messages that uses derogatory, obscene, or inappropriate language is called ____________________________. ________________________________________

 

178. Keyboard-produced pictorial representations of expressions are called ____________________________. ________________________________________

 

2-28

Page 29: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

179. Instant organizers that sort mail on the basis of the name of the sender, and put particular emails into one folder, are called ____________________________. ________________________________________

 

180. Unsolicited email, or junk mail, is called ____________________________. ________________________________________

 

181. The domain abbreviation for a military organization website is ____________________________. ________________________________________

 

182. The domain abbreviation for an educational or research institution website is ____________________________. ________________________________________

 

183. An internet network resources website would typically have a domain abbreviation like ____________________________. ________________________________________

 

184. A .gov domain abbreviation would indicate that the website is a ____________________________ site. ________________________________________

 

185. Viruses can ride along with emails as ____________________________ files. ________________________________________

 

186. ____________________________ is the forgery of an email name so that the message appears to have originated from someone or somewhere other than the actual source. ________________________________________

 

2-29

Page 30: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

187. Use of all-capital letters on the internet is akin to ____________________________. ________________________________________

 

188. ____________________________ are a form of online advertising in which, when you visit certain websites, a new window opens to display advertisement. ________________________________________

 

189. Information available on the internet can be accessed using software called a(n) ____________________________. ________________________________________

 

190. Documents scattered across many internet sites are directly linked with ____________________________. ________________________________________

 

191. Sets of instructions that are used in HTML to specify document structure and formatting are called ____________________________. ________________________________________

 

192. A computer with a domain name is called a ____________________________. ________________________________________

 

193. The welcome page that identifies the website and contains links to other pages at the site is called a ____________________________. ________________________________________

 

194. A string of characters that points to a specific piece of information anywhere on the web is called a ____________________________. ________________________________________

 

2-30

Page 31: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

195. Little circles located in front of various options are called ____________________________. ________________________________________

 

196. Little text files left on the hard disk by some websites visited by the user are called ____________________________. ________________________________________

 

197. An independently controllable section of a web page is called a ____________________________. ________________________________________

 

198. The subject word or words of the topic one wishes to search for on the web is called a ____________________________. ________________________________________

 

199. The software used to search for a topic with the help of a keyword provided by the user is called a ____________________________. ________________________________________

 

200. Small Java programs that can be quickly downloaded and run by most browsers are called ____________________________. ________________________________________

 

201. Applets are written in a programming language called ____________________________. ________________________________________

 

2-31

Page 32: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

202. The rapid sequencing of still images to create the appearance of motion is called ____________________________. ________________________________________

 

203. The process of transferring data in a continuous flow such that the file can be viewed even before the end of the file is sent is called ____________________________. ________________________________________

 

204. The technology that causes software to automatically download information to a computer is called ____________________________. ________________________________________

 

205. Webcasting companies are also called ____________________________. ________________________________________

 

206. Using the net to make phone calls, either one to one or for audioconferencing, is called ____________________________. ________________________________________

 

207. FTP files can be downloaded using either a web browser or a special ____________________________ program. ________________________________________

 

208. A worldwide public network of servers that can be accessed through the internet is called ____________________________. ________________________________________

 

2-32

Page 33: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

209. A program included with most browsers that allows access to newsgroups is called a ____________________________. ________________________________________

 

210. ____________________________ can record each character you type and transmit their information to someone else on the internet, making it possible for strangers to learn your passwords and other information. ________________________________________

 

211. Participants have a typed "chat" while online at the same time, using ____________________________. ________________________________________

 

212. Blogs are short for ____________________________. ________________________________________

 

213. Conducting business activities online is called ____________________________. ________________________________________

 

214. Goods, such as music, that can be downloaded directly from the retailer's site are called ____________________________. ________________________________________

 

215. Goods that can be viewed and priced online, but are then shipped to buyers by mail or any other physical mode, are called ____________________________. ________________________________________

 

2-33

Page 34: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

216. The electronic sales or exchange of goods and services directly between companies, cutting out intermediaries is called ____________________________ commerce. ________________________________________

 

217. ____________________________ intercept your legitimate search requests made to real search engines and return results from phony search services designed to send you to sites they run. ________________________________________

  

Essay Questions 

218. What is the difference between baseband transmission and broadband transmission? 

 

 

  

219. What is a T1 line? 

 

 

  

220. What is the difference between download and upload? 

 

 

  

2-34

Page 35: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

221. State the principal disadvantage of using a telephone modem to connect to the internet? 

 

 

  

222. State the advantages and disadvantages of using a digital subscriber line (DSL) service. 

 

 

  

223. What are the three things needed to gain access to the internet? 

 

 

  

224. List some means of internet connection? 

 

 

  

2-35

Page 36: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

225. What is an internet service provider (ISP)? 

 

 

  

226. Briefly describe a point-of-presence or POP. 

 

 

  

227. What is an IP address? 

 

 

  

228. What is Transmission Control Protocol/Internet Protocol (TCP/IP)? 

 

 

  

2-36

Page 37: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

229. What is the Internet Corporation for Assigned Names and Numbers (ICANN)? 

 

 

  

230. What's the difference between a keyword index type of search engine and a subject directory type of search engine? 

 

 

  

231. List the drawbacks of instant messaging (IM). 

 

 

  

232. Describe what an RSS newsreader is. 

 

 

  

2-37

Page 38: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

233. How can a user subscribe to a listserv? 

 

 

  

234. List some rules of netiquette? 

 

 

  

235. What is a web portal? 

 

 

  

236. What are the four types of web search tools available? 

 

 

  

2-38

Page 39: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace

237. How would you distinguish spoofing, phishing, and pharming? 

 

 

  

2-39

Page 40: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

 

Multiple Choice Questions 

1. (p. 52) An expression for how much data can be sent through a communications channel in a given amount of time is referred to as ________. A. connectivityB. dial-upC. bandwidthD. download

Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of time.

 

Difficulty: 1 

2. (p. 52) Generally, a very high-speed internet connection is referred to as ________. A. broadbandB. dial-upC. bandwidthD. upload

Broadband refers to a very high-speed internet connection.

 

Difficulty: 1 

3. (p. 52) The wired or wireless means of connecting a computer to the internet is called a ________. A. broadbandB. physical connectionC. dial-upD. bandwidth

The wired or wireless means of connecting a computer to the internet is called a physical connection.

 

Difficulty: 1 

2-40

Page 41: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

4. (p. 52) Bps stands for ________. A. bytes per secondB. bits per secondC. bandwidth per secondD. broadband per second

Bps stands for bits per second.

 

Difficulty: 1 

5. (p. 53) Megabits per second are ________. A. 1 million bits per secondB. 10,000 bits per secondC. 1,000 bits per secondD. 100 bits per second

Faster means of connection are measured in megabits per second, or Mbps 1 million bits per second.

 

Difficulty: 1 

6. (p. 53) Gigabits per second are ________. A. 1 hundred bits per secondB. 1 thousand bits per secondC. 1 million bits per secondD. 1 billion bits per second

1 Gbps is 1 billion bits per second.

 

Difficulty: 1 

2-41

Page 42: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

7. (p. 53) The transmission of data from a remote computer to a local computer is referred to as ________. A. uploadB. downloadC. broadbandD. bandwidth

Download is the transmission of data from a remote computer to a local computer.

 

Difficulty: 1 

8. (p. 53) The transmission of data from a local computer to a remote computer is called ________. A. uploadB. downloadC. broadbandD. bandwidth

Upload is the transmission of data from a local computer to a remote computer.

 

Difficulty: 1 

9. (p. 55) What consists of hardware and software and allows voice, video, and data to be communicated over traditional copper-wire telephone lines? A. ISDNB. cable modemC. communications satelliteD. bandwidth

ISDN sends digital signals over POTS (plain old telephone system) lines.

 

Difficulty: 1 

2-42

Page 43: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

10. (p. 55) The internet connection that uses regular phone lines to transmit data in megabits per second is ________. A. T1 lineB. cable modemC. DSL lineD. communications satellite

DSL (digital subscriber line) uses regular phone lines, a DSL modem, and special technology to transmit data in megabits per second.

 

Difficulty: 1 

11. (p. 56) Which traditional trunk line carries 24 normal telephone circuits and has a transmission rate of 1.5 Mbps? A. T1 lineB. cable modemC. DSL lineD. communications satellite

Generally, T1 lines are leased by corporate, government, and academic sites.

 

Difficulty: 1 

12. (p. 56) What connects a personal computer to a cable-TV system that offers an internet connection? A. T1 lineB. cable modemC. DSL lineD. communications satellite

Like a DSL connection, a cable modem is always on.

 

Difficulty: 1 

2-43

Page 44: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

13. (p. 57) A space station that transmits radio waves called microwaves from earth-based stations is called a ________. A. T1 lineB. cable modemC. DSL lineD. communications satellite

Communications satellite transmits radio waves called microwaves from earth-based stations.

 

Difficulty: 1 

14. (p. 56) The method of going online that requires the user to be within 3.3 miles of a phone company central switching office is ________. A. dial-up modemB. DSLC. T1 lineD. satellite

One big drawback to DSL is that one has to live within 3.3 miles of a phone company central switching office, because the access speed and reliability degrade with distance.

 

Difficulty: 2 

15. (p. 56) The line most commonly used by corporate, government, and academic sites is ________. A. DSLB. T1 lineC. satelliteD. ISDN

Generally, T1 lines are leased by corporate, government, and academic sites.

 

Difficulty: 2 

2-44

Page 45: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

16. (p. 55, 56) Which of the following is NOT an advantage of DSL? A. fast downloadB. connection always onC. consistent transmission rateD. universal availability

DSL is not universally available.

 

Difficulty: 3 

17. (p. 56) Which of the following is NOT an advantage of a T1 line? A. affordabilityB. high speed transmissionC. 24 separate circuits of 64 kbps eachD. supports many users

T1 lines have very expensive installation and monthly costs.

 

Difficulty: 3 

18. (p. 53) Which of the following is NOT an example of a download? A. Saving pictures from the internet to your hard drive.B. Storing a map for your vacation from the internet to your hard drive.C. Saving a presentation to a CD.D. Saving a program from an internet site to your hard drive.

Saving a presentation to a CD is not an example of a download.

 

Difficulty: 1 

2-45

Page 46: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

19. (p. 53) Which of the following is NOT an example of an upload? A. Sending a photograph as an email attachment.B. Saving your favorite music videos from a music website to your hard drive.C. Sending a spreadsheet as an email attachment.D. Submitting a term paper to an instructor online.

Saving music videos would be downloading, not uploading.

 

Difficulty: 1 

20. (p. 60) Using a user name and password, the ISP will allow the user to connect or ________. A. log onB. downloadC. uploadD. log out

Using a user name and password allows the user to make a connection to the remote computer.

 

Difficulty: 1 

21. (p. 58) ISP stands for ________. A. internet select providerB. internet service providerC. internet serial providerD. internet service pusher

ISP stands for internet service provider.

 

Difficulty: 1 

2-46

Page 47: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

22. (p. 76) A search engine that allows you to search several search engines simultaneously is called a ________. A. megasearch engine.B. hypersearch engine.C. metasearch engine.D. none of these.

A metasearch engine allows you to search several search engines simultaneously.

 

Difficulty: 1 

23. (p. 90) An automatic email mailing list of people who regularly participate in discussion topics are called ________. A. attachmentsB. instant messagingC. listservD. spam

 

Difficulty: 1 

24. (p. 85, 86) If you were emailing a term paper and wanted to maintain its formatting, it would be sent as a(n) ________. A. regular emailB. instant messageC. listserv messageD. attachment

Attachments are files sent along with email. This allows for the attachments to retain formatting.

 

Difficulty: 2 

2-47

Page 48: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

25. (p. 67, 68) The .gov, .com, .net, and .edu extensions are examples of ________. A. emoticonsB. FAQsC. top-level domainsD. URLs

The top-level domain is a three-letter extension that describes the domain type.

 

Difficulty: 2 

26. (p. 86) Any user on a given email system can send a message and have it pop up instantly on the screen of anyone else logged onto that system using ________. A. attachmentsB. instant messagingC. list-servesD. spam

The instant messaging service is popularly also known as

 

Difficulty: 3 

27. (p. 91) Which of the following is NOT an example of good netiquette? A. Consult the frequently asked questions (FAQs).B. Don't SHOUT.C. Don't send large file attachments, unless requested.D. When replying, send the entire original message for reference.

When replying, quote only the relevant section to save the recipient the effort of wading through lots of text to find the reference.

 

Difficulty: 3 

2-48

Page 49: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

28. (p. 91) Which of the following is NOT an example of flaming? A. a lieB. an ethnic jokeC. profanityD. a sexist comment

As long as the lie does not include derogatory, obscene, or inappropriate language, it is not flaming.

 

Difficulty: 2 

29. (p. 100) In terms of privacy, email is like ________. A. a sealed letterB. an insured packageC. a postcardD. a notarized document

Anyone can pick up and read a postcard, and chances are any number of people can read an email.

 

Difficulty: 2 

30. (p. 100) An uninvited email solicitation to participate in a money-making scheme is an example of ________. A. flamingB. spamC. netiquetteD. list-serve

Spam is unsolicited junk email.

 

Difficulty: 2 

2-49

Page 50: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

31. (p. 90) If you wish to be part of an online discussions on a favorite topic of interest, you would subscribe to a(n) ________. A. instant message serviceB. listservC. spam trackingD. online group

List-serves by definition provide this service.

 

Difficulty: 2 

32. (p. 69) Connections to other documents or web pages that contain related information are called ________ links. A. web portalB. multimediaC. URLD. hypertext

Hypertext links are connections to other documents or web pages that contain related information; a word or phrase in one document becomes a connection to a document in a different place.

 

Difficulty: 1 

33. (p. 68) The set of special instructions that are used to specify document structure, formatting, and links to other multimedia documents is called ________. A. HTMLB. hypertextC. multimediaD. web portal

HTML stands for HyperText Markup Language.

 

Difficulty: 1 

2-50

Page 51: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

34. (p. 66) A computer with a domain name is called a ________. A. web pageB. websiteC. homeD. web portal

The website is the location of a web domain name in a computer somewhere on the internet.

 

Difficulty: 1 

35. (p. 66) The location on a particular computer on the World Wide Web that has a unique address is called a ________. A. home pageB. web pageC. websiteD. web portal

A computer with a domain name is called a website.

 

Difficulty: 1 

36. (p. 60) A secret word or string of characters that allows you to log on to a remote computer is called a ________. A. passwordB. websiteC. URLD. UserID

The documents on a website that can include text, pictures, sound, and video are called web pages.

 

Difficulty: 1 

2-51

Page 52: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

37. (p. 66) The first page seen at a website is called the ________. A. community pageB. home pageC. browserD. protocol

The home page acts as the welcome page of the website; it identifies the website and contains links to other pages at the site.

 

Difficulty: 1 

38. (p. 64) Software that enables users to find and access the various parts of the web is called a ________. A. home pageB. websiteC. browserD. web page

Browsers are software for connecting to websites.

 

Difficulty: 1 

39. (p. 66) A string of characters that points to a specific piece of information on the web is called the ________. A. URLB. HTTPC. protocolD. browser

URLs are web page addresses.

 

Difficulty: 1 

2-52

Page 53: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

40. (p. 67) A set of communications rules for exchanging information is called a ________. A. web browserB. HTMLC. URLD. protocol

Protocols allow web browsers to communicate with web servers.

 

Difficulty: 1 

41. (p. 67) The communications rules or protocols that allow browsers to connect with web servers is ________. A. HTTPB. HTMLC. JavaD. URL

Most browsers assume that all web addresses begin with http://.

 

Difficulty: 1 

42. (p. 72) Little circles located in front of various options, which can be selected with the mouse, are called ________. A. hyperlinksB. radio buttonsC. text boxesD. web portals

Selecting an option with the mouse places a dot in the corresponding circle.

 

Difficulty: 1 

2-53

Page 54: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

43. (p. 72) An independently controllable section of a web age is called a ________. A. hyperlinkB. web siteC. frameD. window

A web page designer can divide a page into separate frames, each with different features or options.

 

Difficulty: 1 

44. (p. 73) Websites that group together in one convenient location popular features such as online shopping malls, email support, community forums, current news and weather are called ________. A. home pagesB. browsersC. search enginesD. web portals

Portals can be customized or personalized to fit your interests.

 

Difficulty: 1 

45. (p. 75) Which of the following provides lists of several websites classified by topic? A. web portalB. subject directoryC. metasearch engineD. browser

A subject directory provides lists of several categories of websites classified by topic.

 

Difficulty: 1 

2-54

Page 55: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

46. (p. 74) The subject word or words of the topic you wish to find while using a search engine is called the ________. A. directoryB. URLC. keywordD. web portal

The results of your keyword search will be displayed in a summary of documents containing the keyword you typed.

 

Difficulty: 1 

47. (p. 75) Which of the following can be used to locate information on the web by asking questions or using keywords? A. search enginesB. home pagesC. community pagesD. URLs

When you use a keyword to search for a topic, you are using a piece of software known as a search engine.

 

Difficulty: 1 

48. (p. 93) A program that adds a specific feature to a browser, allowing it to play or view certain files is a ________. A. scriptB. plug-inC. tagD. cookie

A program that adds a specific feature to a browser, allowing it to play or view certain files is called a plug-in.

 

Difficulty: 1 

2-55

Page 56: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

49. (p. 93) Plug-ins are also called ________. A. playersB. viewersC. browsersD. Both A and B

A plug-in is also called a player or a viewer.

 

Difficulty: 1 

50. (p. 93, 94) Small Java programs that can be quickly downloaded and run by most browsers are called ________. A. cookiesB. appletsC. active XD. hypertext

Java applets enhance web pages by playing music, displaying graphics and animation, and providing interactive games.

 

Difficulty: 1 

51. (p. 94) The rapid sequencing of still images to create the appearance of motion is called a(n) ________. A. animationB. hyperlinkC. scriptD. applet

Animation is used in online videogames as well as in moving banners displaying sports scores or stock prices.

 

Difficulty: 1 

2-56

Page 57: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

52. (p. 95) The technology in which software automatically downloads information to your computer is called ________. A. pull technologyB. downloadC. push technologyD. upload

Push technology allows software to automatically download information onto a computer.

 

Difficulty: 1 

53. (p. 95) The technology in which customized text, audio, and video are sent automatically to the user on a regular basis is called ________. A. webcastingB. broadcastingC. surfingD. streaming

Webcasting is an example of push technology.

 

Difficulty: 1 

54. (p. 88) A method whereby one can connect to a remote computer and transfer files to their own microcomputer's hard disk via TCP/IP over the internet is called ________. A. NetBEUIB. FTPC. ARAPD. SLIP

FTP is used to transfer files between computers with different operating systems.

 

Difficulty: 1 

2-57

Page 58: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

55. (p. 88) Which of the following is an FTP client program? A. CuteB. PutC. GrabD. FTP net

FTP client programs are special software that enables the download of FTP files.

 

Difficulty: 2 

56. (p. 90) With ________, online participants have a typed discussion while staying online at the same time. A. real-time chatB. blogsC. telnetD. newsgroups

A chat is just like a telephone conversation except that messages are typed rather than spoken.

 

Difficulty: 1 

57. (p. 96) Web logs made by various users that are also accessible to others are called ________. A. real-time chatB. blogsC. telnetD. applets

Web logs made by various users that are also accessible to others are called blogs.

 

Difficulty: 1 

2-58

Page 59: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

58. (p. 96) RSS newsreaders are also known as ________. A. attachmentsB. aggregatorsC. podcastersD. webcasts

RSS newsreaders, or RSS aggregators, are programs that scour the web, sometimes hourly or more frequently, and pull together in one place web from several websites.

 

Difficulty: 1 

59. (p. 89) To access a newsgroup, a(n) ________ program is needed. A. browserB. appletC. newsreaderD. chat

To access a newsgroup, a newsreader program is needed.

 

Difficulty: 3 

60. (p. 97) Which of the following is a person-to-person auction site? A. www.acponline.orgB. www.ebay.comC. www.onSale.comD. www.thirdage.com

www.ebay.com is a person-to-person auction site.

 

Difficulty: 2 

2-59

Page 60: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

61. (p. 97) Trading, banking, and e-money can be classified as ________. A. online financeB. online job-huntingC. online matchmakingD. online auctioning

Trading, banking, and e-money are examples of online finance.

 

Difficulty: 1 

62. (p. 102) Forging of an email sender name so that the message appears to have originated from someone or somewhere other than the actual source is called ________. A. spoofingB. phishingC. pharmingD. spyware

Spoofing is the forgery of an email sender name so that the message appears to have originated from someone or somewhere other than the actual source.

 

Difficulty: 1 

63. (p. 103) Adware is also called ________. A. cookiesB. spamC. pop-up generatorsD. None of these

Adware, or pop-up generators, is a kind of spyware that tracks web searching or online buying so that marketers can send you targeted and unsolicited pop-up and other ads.

 

Difficulty: 1 

2-60

Page 61: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

64. (p. 103) One type of spyware is ________. A. browser hijackersB. search hijackersC. key loggersD. All of these

Spyware includes adware, browser hijackers, search hijackers, and key loggers.

 

Difficulty: 2  

True / False Questions 

65. (p. 52) Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of time. TRUE

 

Difficulty: 1 

66. (p. 52) The wired or wireless means of connecting to the internet is called a physical connection. TRUE

 

Difficulty: 1 

67. (p. 52) Bps stands for bandwidth per second. FALSE

 

Difficulty: 1 

68. (p. 52) One kilobit per second is the same as 1 million bits per second. FALSE

 

Difficulty: 1 

2-61

Page 62: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

69. (p. 53) Mps stands for megabits per second. FALSE

 

Difficulty: 1 

70. (p. 53) The term gigabit refers to 1 billion bits per second. TRUE

 

Difficulty: 1 

71. (p. 53) Upload is the transmission of data from a remote computer to a local computer. FALSE

 

Difficulty: 1 

72. (p. 53) Download is the transmission of data from a local computer to a remote computer. FALSE

 

Difficulty: 1 

73. (p. 55) Integrated Services Digital Network (ISDN) consists of hardware and software that allows voice, video, and data to be communicated over traditional copper-wire telephone lines. TRUE

 

Difficulty: 1 

74. (p. 55) Digital subscriber line (DSL) uses satellite technology to transmit data in megabits per second. FALSE

 

Difficulty: 1 

2-62

Page 63: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

75. (p. 56) A T1 line is essentially a traditional trunk line that carries 24 normal telephone circuits and has a transmission rate of 1.5 Mbps. TRUE

 

Difficulty: 1 

76. (p. 56) A cable modem connects a personal computer to a cable-TV system that offers an internet connection. TRUE

 

Difficulty: 1 

77. (p. 57) A communications satellite, a space station that transmits radio waves called microwaves from earth-based stations, can be used to retrieve information from the internet. TRUE

 

Difficulty: 1 

78. (p. 52, 53) Kilobits per second are faster than megabits per second. FALSE

 

Difficulty: 1 

79. (p. 53) The transmission of the latest pinball game off a subscriber network to a home computer is an example of an upload. FALSE

 

Difficulty: 2 

2-63

Page 64: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

80. (p. 53) The transmission of credit information to order something online is an example of an upload. TRUE

 

Difficulty: 2 

81. (p. 56) A cable modem is an example of a physical connection to the internet. TRUE

 

Difficulty: 1 

82. (p. 56) Cable modem lines are shared with other cable users in a particular area and can be slower during peak use periods. TRUE

 

Difficulty: 2 

83. (p. 56) You can have a cable modem connection even if there is no cable television available in your area. FALSE

 

Difficulty: 3 

84. (p. 55) The primary advantage of DSL is that it is always on and its transmission rate is consistent. TRUE

 

Difficulty: 3 

85. (p. 56) The primary advantage of a T1 line is its affordability. FALSE

 

Difficulty: 1 

2-64

Page 65: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

86. (p. 56) A DSL line can be installed anywhere as long as the user has a telephone line. FALSE

 

Difficulty: 3 

87. (p. 58) ISP stands for internet service provider. TRUE

 

Difficulty: 1 

88. (p. 58) An internet service provider (ISP) provides users with access to the internet. TRUE

 

Difficulty: 1 

89. (p. 60) To log on or make connection to a remote computer, first enter the password and then the user name or user ID. FALSE

 

Difficulty: 2 

90. (p. 67) A domain is simply a location on the internet. TRUE

 

Difficulty: 1 

91. (p. 86) With instant messaging, any user on a given email system can send a message and have it pop up instantly on the screen of anyone else logged onto that system. TRUE

 

Difficulty: 1 

2-65

Page 66: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

92. (p. 90) A listserv is an automatic mailing list server that sends email to subscribers who regularly participate in discussion topics. TRUE

 

Difficulty: 1 

93. (p. 91) Guides to appropriate online behavior are called netiquette. TRUE

 

Difficulty: 1 

94. (p. 91) Most online groups post frequently asked questions (FAQs) that explain expected norms of online behavior for a particular group. TRUE

 

Difficulty: 1 

95. (p. 100) Spamming is writing an online message that uses derogatory, obscene, or inappropriate language. FALSE

 

Difficulty: 1 

96. (p. 91) Use of all-capital letters on the internet is considered appropriate online behavior. FALSE

 

Difficulty: 1 

97. (p. 91) Emoticons are keyboard-produced pictorial representations of expressions. TRUE

 

Difficulty: 1 

2-66

Page 67: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

98. (p. 91) Flaming refers to unsolicited email in the form of advertising or chain letters. FALSE

 

Difficulty: 1 

99. (p. 83) Some commonly used top-level domains are .net, .com, .gov, and .edu. TRUE

 

Difficulty: 2 

100. (p. 86) Many viruses ride along with email attachments. TRUE

 

Difficulty: 3 

101. (p. 86) Instant messaging can be used to post advertisements on computer screens. FALSE

 

Difficulty: 2 

102. (p. 83) It is important to type email addresses exactly as they appear. TRUE

 

Difficulty: 2 

103. (p. 85) Emails can be organized with instant organizers called routers to sort emails based on certain criteria, such as the sender's name or the mailing list. FALSE

 

Difficulty: 2 

2-67

Page 68: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

104. (p. 66) URL is the website's unique address. TRUE

 

Difficulty: 1 

105. (p. 68) HTML is the set of special instructions that are used to specify document structure, formatting, and links to other documents. TRUE

 

Difficulty: 1 

106. (p. 66) A website is the location of a web domain name in a computer somewhere on the internet. TRUE

 

Difficulty: 1 

107. (p. 64) A browser is a document on the World Wide Web that can include text, pictures, sound, and video. FALSE

 

Difficulty: 1 

108. (p. 66) The first page seen at a website is called the community page. FALSE

 

Difficulty: 1 

109. (p. 73) A portal is software that enables users to view web pages and to jump from one page to another. FALSE

 

Difficulty: 1 

2-68

Page 69: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

110. (p. 66) A URL is a string of characters that points to a specific piece of information on the web. TRUE

 

Difficulty: 1 

111. (p. 67) HyperText Transfer Protocol or HTTP refers to the communications rules that allow browsers to connect with web servers. TRUE

 

Difficulty: 1 

112. (p. 72) Radio buttons are little circles located in front of various options, selecting an option with the mouse places a dot in the corresponding circle. TRUE

 

Difficulty: 1 

113. (p. 72) Scroll arrows, small up/down and left/right arrows, can be used to move the screen to see the rest of the web page. TRUE

 

Difficulty: 1 

114. (p. 72) A frame is an independently controllable section of a web page. TRUE

 

Difficulty: 1 

2-69

Page 70: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

115. (p. 75) Search engines are websites that group together in one convenient location popular features such as search tools, email, electronic commerce, and discussion groups. FALSE

 

Difficulty: 1 

116. (p. 75) A subject directory allows you to search for information by selecting lists of categories or topics. TRUE

 

Difficulty: 1 

117. (p. 75) Search engines are programs that enable you to ask questions or use keywords to help locate information on the web. TRUE

 

Difficulty: 1 

118. (p. 73) A web portal is a program that adds a specific feature to a browser, allowing it to play or view certain files. FALSE

 

Difficulty: 1 

119. (p. 76) A metasearch engine allows you to search for information by typing one or more keywords, and the search engine then displays a list of web pages, or "hits," that contain those key words. FALSE

 

Difficulty: 1 

2-70

Page 71: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

120. (p. 93) Plug-ins are also called players and viewers. TRUE

 

Difficulty: 1 

121. (p. 96) RSS newsreaders and RSS aggregators are the same thing. TRUE

 

Difficulty: 1 

122. (p. 93, 94) Applets are small programs that can be quickly downloaded and run by most browsers. TRUE

 

Difficulty: 1 

123. (p. 100) Spam consists of little text files left on your hard disk by some websites you visit. FALSE

 

Difficulty: 1 

124. (p. 94) Applets are written in Java, a complex programming language that enables programmers to create animated and interactive web pages. TRUE

 

Difficulty: 1 

125. (p. 94) Streaming video is the rapid sequencing of still images to create the appearance of motion, such as in a cartoon. FALSE

 

Difficulty: 1 

2-71

Page 72: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

126. (p. 102) In pharming, thieves implant malicious software on a victim's computer that redirects the user to an impostor web page even when the individual types the correct address into his or her browser. TRUE

 

Difficulty: 2 

127. (p. 94) Streaming video is the process of transferring data in a continuous flow so a file can be viewed before the end of the file is sent. TRUE

 

Difficulty: 1 

128. (p. 95) Streaming audio allows you to listen to a file while the data is still being downloaded to your computer. TRUE

 

Difficulty: 1 

129. (p. 95) Pull technology automatically downloads information to your computer. FALSE

 

Difficulty: 1 

130. (p. 95) Webcasting sends customized text, video, and audio automatically on a regular basis. TRUE

 

Difficulty: 1 

2-72

Page 73: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

131. (p. 92) Internet telephony is the method of using the internet to make a phone call, either one-to-one or for audio conferencing. TRUE

 

Difficulty: 1  

Fill in the Blank Questions 

132. (p. 52) The type of data transmission that allows only one signal at a time is called ____________________________ transmission. baseband

 

Difficulty: 2 

133. (p. 52) When several signals can be transmitted at once, it is called ____________________________ transmission. broadband

 

Difficulty: 2 

134. (p. 52) The wired or wireless means of connecting to the internet is called a(n) ____________________________ connection. physical

 

Difficulty: 2 

135. (p. 53) A device that sends and receives data over telephone lines to and from computers is called a(n) ____________________________. modem

 

Difficulty: 1 

2-73

Page 74: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

136. (p. 56) The device that connects a personal computer to a cable-TV system that offers an internet connection is called a(n) ____________________________. cable modem

 

Difficulty: 1 

137. (p. 57) A space station that transmits radio waves from earth-based stations is called a ____________________________. communications satellite

 

Difficulty: 1 

138. (p. 57) The radio waves transmitted from a communications satellite are called ____________________________. microwaves

 

Difficulty: 1 

139. (p. 52) Data is transmitted in characters or collections of ____________________________. bits

 

Difficulty: 2 

140. (p. 52) The minimum speed needed for visiting websites with graphics is ____________________________. 28,800 bps

 

Difficulty: 2 

2-74

Page 75: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

141. (p. 52) The speed of a modem that is 28,800 bps can be expressed as ____________________________ Kbps. 28.8

 

Difficulty: 2 

142. (p. 53) One Gbps is approximately 1 ____________________________ bits per second. billion

 

Difficulty: 2 

143. (p. 53) Downloading is the transmission of data from a(n) ____________________________ computer to a ____________________________ computer. remote; local

 

Difficulty: 2 

144. (p. 53) Transmitting data from a local PC to a website being constructed by a user can be termed as a(n) ____________________________. upload

 

Difficulty: 2 

145. (p. 53) A modem that uses telephone lines to transmit data generally uses a(n) ____________________________ connection. dial-up

 

Difficulty: 2 

2-75

Page 76: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

146. (p. 57) Communications satellites transmit data at a rate of 512–1500 ____________________________. Kbps

 

Difficulty: 2 

147. (p. 61) The internet service provider's (ISP's) local access point for a particular area is its ____________________________. POP; point of presence

 

Difficulty: 1 

148. (p. 62) The internet's high-speed, high-capacity communication lines are the ____________________________. backbone

 

Difficulty: 1 

149. (p. 61) A collection of modems and other equipment in a local area is called a ____________________________. POP; point-of-presence

 

Difficulty: 1 

150. (p. 62) When two modems connect to each other at a single ISP location, the process is called ____________________________. handshaking

 

Difficulty: 2 

2-76

Page 77: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

151. (p. 63) Every computer on the internet has a(n) ____________________________ address. IP; Internet Protocol

 

Difficulty: 1 

152. (p. 62) A set of rules that computers must follow to transmit data electronically is called ____________________________. protocol

 

Difficulty: 1 

153. (p. 62) The protocol that enables all computers to use data transmitted on the internet is called ____________________________. TCP/IP; Transmission Control Protocol/Internet Protocol

 

Difficulty: 1 

154. (p. 62) To send data over the internet, TCP/IP breaks data into smaller blocks called ____________________________. packets

 

Difficulty: 1 

155. (p. 63) The group established to regulate internet domain names is ____________________________. ICANN; Internet Corporation for Assigned Names & Numbers

 

Difficulty: 1 

2-77

Page 78: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

156. (p. 64) The ____________________________ database returns the name and address of any domain name entered. Whosis

 

Difficulty: 3 

157. (p. 63) The ____________________________.is the organizational home for groups responsible for internet infrastructure standards. ISOC; Internet Society

 

Difficulty: 3 

158. (p. 61) To avoid making their customers pay long-distance phone charges to connect, ISPs provide each customer with a ____________________________ . point of presence

 

Difficulty: 3 

159. (p. 62) Internet ____________________________ form the equivalent of an interstate highway system. backbones

 

Difficulty: 2 

160. (p. 63) An IP address consists of four sets of numbers between ____________________________ and ____________________________. 0; 255

 

Difficulty: 3 

2-78

Page 79: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

161. (p. 63) An IP address consists of four sets of numbers separated by ____________________________. decimals

 

Difficulty: 2 

162. (p. 63) Each time a user connects to an ISP, the ISP will assign the computer a new IP address for that session called a ____________________________ address. dynamic IP

 

Difficulty: 3 

163. (p. 61) ISPs that don't run their own backbones connect to an internet backbone through a ____________________________. NAP; network access point

 

Difficulty: 2 

164. (p. 61) Network access points (NAPs) are owned by a ____________________________, a large communications company. NSP' network service provider

 

Difficulty: 2 

165. (p. 62) To facilitate more efficient routing of data back and forth in the internet, by providing more backbone access locations, ____________________________ were introduced. PNAPs; Private/Peer NAPs; miniNAPs

 

Difficulty: 2 

2-79

Page 80: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

166. (p. 62) The ____________________________ part in TCP/IP is used to send data packets across the internet to their final destination. IP; Internet Protocol

 

Difficulty: 3 

167. (p. 62, 63) In TCP/IP, the ____________________________ part is used to reassemble the packets in the correct order. TCP

 

Difficulty: 3 

168. (p. 81) Incoming mail is usually stored on an ISP's server called a ____________________________. mail server

 

Difficulty: 1 

169. (p. 81) Outgoing mail is sent to a ____________________________ server. SMTP; Simple Mail Transfer Protocol

 

Difficulty: 2 

170. (p. 67) A location on the internet is called a ____________________________. domain

 

Difficulty: 1 

171. (p. 83) In an email address, the first section, called the ____________________________ identifies who is at the address. user name; user ID

 

Difficulty: 1 

2-80

Page 81: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

172. (p. 83) The second section of an email address, located after the "@" symbol, which tells the location and type of address, is called the ____________________________. domain name

 

Difficulty: 1 

173. (p. 83) The user name and domain name in an email address are linked by the ____________________________ character. @; at; at the rate

 

Difficulty: 1 

174. (p. 86) With ____________________________, any user on a given mail system can send a message and have it pop up instantly on anyone's screen who is logged on to the system. IM; instant messaging

 

Difficulty: 1 

175. (p. 90) An automatic mailing list server that sends email to subscribers who regularly participate in discussion topics is called ____________________________. listserv

 

Difficulty: 1 

176. (p. 91) Appropriate online behavior can also be called ____________________________. netiquette

 

Difficulty: 1 

2-81

Page 82: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

177. (p. 91) Writing online messages that uses derogatory, obscene, or inappropriate language is called ____________________________. flaming

 

Difficulty: 1 

178. (p. 91) Keyboard-produced pictorial representations of expressions are called ____________________________. emoticons

 

Difficulty: 1 

179. (p. 85) Instant organizers that sort mail on the basis of the name of the sender, and put particular emails into one folder, are called ____________________________. filters

 

Difficulty: 2 

180. (p. 100) Unsolicited email, or junk mail, is called ____________________________. spam

 

Difficulty: 1 

181. (p. 67) The domain abbreviation for a military organization website is ____________________________. .mil

 

Difficulty: 2 

2-82

Page 83: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

182. (p. 67) The domain abbreviation for an educational or research institution website is ____________________________. .edu

 

Difficulty: 1 

183. (p. 67) An internet network resources website would typically have a domain abbreviation like ____________________________. .net

 

Difficulty: 1 

184. (p. 67) A .gov domain abbreviation would indicate that the website is a ____________________________ site. government; government agency; government bureau

 

Difficulty: 1 

185. (p. 86) Viruses can ride along with emails as ____________________________ files. attached; attachment

 

Difficulty: 2 

186. (p. 102) ____________________________ is the forgery of an email name so that the message appears to have originated from someone or somewhere other than the actual source. Spoofing

 

Difficulty: 1 

2-83

Page 84: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

187. (p. 91) Use of all-capital letters on the internet is akin to ____________________________. shouting

 

Difficulty: 1 

188. (p. 103) ____________________________ are a form of online advertising in which, when you visit certain websites, a new window opens to display advertisement. Pop-up ads

 

Difficulty: 1 

189. (p. 64) Information available on the internet can be accessed using software called a(n) ____________________________. browser

 

Difficulty: 1 

190. (p. 68) Documents scattered across many internet sites are directly linked with ____________________________. hyperlinks; hypertext links

 

Difficulty: 2 

191. (p. 68) Sets of instructions that are used in HTML to specify document structure and formatting are called ____________________________. tags; markups

 

Difficulty: 2 

2-84

Page 85: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

192. (p. 66) A computer with a domain name is called a ____________________________. site; website

 

Difficulty: 3 

193. (p. 66) The welcome page that identifies the website and contains links to other pages at the site is called a ____________________________. home page

 

Difficulty: 1 

194. (p. 66) A string of characters that points to a specific piece of information anywhere on the web is called a ____________________________. URL; Uniform Resource Locator

 

Difficulty: 1 

195. (p. 72) Little circles located in front of various options are called ____________________________. radio buttons

 

Difficulty: 1 

196. (p. 102) Little text files left on the hard disk by some websites visited by the user are called ____________________________. cookies

 

Difficulty: 1 

2-85

Page 86: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

197. (p. 72) An independently controllable section of a web page is called a ____________________________. frame

 

Difficulty: 1 

198. (p. 74) The subject word or words of the topic one wishes to search for on the web is called a ____________________________. keyword

 

Difficulty: 1 

199. (p. 75) The software used to search for a topic with the help of a keyword provided by the user is called a ____________________________. search engine

 

Difficulty: 1 

200. (p. 93, 94) Small Java programs that can be quickly downloaded and run by most browsers are called ____________________________. applets

 

Difficulty: 1 

201. (p. 94) Applets are written in a programming language called ____________________________. Java

 

Difficulty: 1 

2-86

Page 87: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

202. (p. 94) The rapid sequencing of still images to create the appearance of motion is called ____________________________. animation

 

Difficulty: 1 

203. (p. 94) The process of transferring data in a continuous flow such that the file can be viewed even before the end of the file is sent is called ____________________________. streaming video

 

Difficulty: 1 

204. (p. 95) The technology that causes software to automatically download information to a computer is called ____________________________. push technology

 

Difficulty: 1 

205. (p. 95) Webcasting companies are also called ____________________________. subscription services

 

Difficulty: 2 

206. (p. 92) Using the net to make phone calls, either one to one or for audioconferencing, is called ____________________________. internet telephony

 

Difficulty: 1 

2-87

Page 88: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

207. (p. 88) FTP files can be downloaded using either a web browser or a special ____________________________ program. FTP client

 

Difficulty: 3 

208. (p. 89) A worldwide public network of servers that can be accessed through the internet is called ____________________________. Usenet

 

Difficulty: 1 

209. (p. 89) A program included with most browsers that allows access to newsgroups is called a ____________________________. newsreader

 

Difficulty: 1 

210. (p. 104) ____________________________ can record each character you type and transmit their information to someone else on the internet, making it possible for strangers to learn your passwords and other information. Key loggers

 

Difficulty: 1 

211. (p. 90) Participants have a typed "chat" while online at the same time, using ____________________________. RTC; real-time chat

 

Difficulty: 1 

2-88

Page 89: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

212. (p. 96) Blogs are short for ____________________________. web logs

 

Difficulty: 1 

213. (p. 97) Conducting business activities online is called ____________________________. electronic commerce; e-commerce

 

Difficulty: 1 

214. (p. 97) Goods, such as music, that can be downloaded directly from the retailer's site are called ____________________________. soft goods

 

Difficulty: 2 

215. (p. 97) Goods that can be viewed and priced online, but are then shipped to buyers by mail or any other physical mode, are called ____________________________. hard goods

 

Difficulty: 2 

216. (p. 97) The electronic sales or exchange of goods and services directly between companies, cutting out intermediaries is called ____________________________ commerce. B2B; business-to-business

 

Difficulty: 1 

2-89

Page 90: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

217. (p. 103) ____________________________ intercept your legitimate search requests made to real search engines and return results from phony search services designed to send you to sites they run. Search hijackers

 

Difficulty: 2  

Essay Questions 

218. (p. 52) What is the difference between baseband transmission and broadband transmission? 

Baseband transmission allows data transmission at only one signal at a time, whereas in broadband transmission, several signals can be transmitted at once.

 

Difficulty: 1 

219. (p. 56) What is a T1 line? 

A T1 line is a trunk line that carries 24 normal telephone circuits and has a transmission rate of 1.5 Mbps. They are generally leased by corporate, government, and academic sites.

 

Difficulty: 1 

220. (p. 53) What is the difference between download and upload? 

Download is the transmission of data from a remote computer to a local computer, as from a website to the PC. Upload is the transmission of data from a local computer to a remote computer, as from the local PC to a website that is, say, being constructed.

 

Difficulty: 1 

2-90

Page 91: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

221. (p. 54) State the principal disadvantage of using a telephone modem to connect to the internet? 

One disadvantage of a telephone modem is that while a user is online, the user won't use that phone line to make voice calls unless special equipment is installed. In addition, people who try to call the user while the modem is being used will get a busy signal.

 

Difficulty: 2 

222. (p. 55, 56) State the advantages and disadvantages of using a digital subscriber line (DSL) service. 

An advantage of using DSL is that it is always on and, unlike cable, its transmission rate is relatively consistent. Also, one can talk on the phone and send data at the same time. The disadvantage is that one has to live within 3.3 miles of a phone company central switching office, because the access speed and reliability degrade with distance.

 

Difficulty: 2 

223. (p. 50) What are the three things needed to gain access to the internet? 

To access the internet, the user would need three things:a. An access device, such as a personal computer with a modemb. A physical connection, such as a telephone linec. An internet access provider

 

Difficulty: 2 

2-91

Page 92: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

224. (p. 52) List some means of internet connection? 

Some of the principal means of internet connection are:a. telephone (dialup) modemb. high-speed phone lines–ISDN, DSL, and T1c. cable modemd. wireless–satellite

 

Difficulty: 3 

225. (p. 58) What is an internet service provider (ISP)? 

An internet service provider (ISP) is a local, regional, or national organization that provides access to the internet.

 

Difficulty: 1 

226. (p. 61) Briefly describe a point-of-presence or POP. 

A point-of-presence (POP) is a collection of modems and other equipment in a local area. The user, when subscribing to an ISP, is given local telephone numbers for the ISP's POP. So, when the user connects to the ISP, the POP acts as a local gateway to the ISP's network.

 

Difficulty: 3 

227. (p. 63) What is an IP address? 

An IP address uniquely identifies every computer and device connected to the internet.

 

Difficulty: 3 

2-92

Page 93: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

228. (p. 62) What is Transmission Control Protocol/Internet Protocol (TCP/IP)? 

The protocol that enables all computers to use data transmitted on the internet is called Transmission Control Protocol/Internet Protocol, or TCP/IP.

 

Difficulty: 2 

229. (p. 63, 64) What is the Internet Corporation for Assigned Names and Numbers (ICANN)? 

The Internet Corporation for Assigned Names and Numbers (ICANN) is a global, private-sector, nonprofit corporation that was established to regulate human-friendly internet domain names–those addresses ending with .com, .org, .net, and so on, that overlie IP addresses and identify the website type.

 

Difficulty: 2 

230. (p. 75) What's the difference between a keyword index type of search engine and a subject directory type of search engine? 

A keyword index allows you to search for information by typing one or more keywords, and the search engine then displays a list of web pages, or "hits," that contain those key words. A subject directory allows you to search for information by selecting lists of categories or topics, such as "Business and Commerce" or "Art and Humanities."

 

Difficulty: 2 

231. (p. 88) List the drawbacks of instant messaging (IM). 

Some of the drawbacks of IM are as follows:a. Lack of privacyb. Lack of common standardsc. Wastage of time when there is work to be done

 

Difficulty: 2 

2-93

Page 94: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

232. (p. 96) Describe what an RSS newsreader is. 

An RSS newsreader is a program that scours the web, sometimes hourly or more frequently, and pulls together in one place web "feeds" from several websites.

 

Difficulty: 2 

233. (p. 90) How can a user subscribe to a listserv? 

To subscribe to a listserv, the user must send an email to the list-server moderator and ask to become a member. After this is done, the user will automatically receive email messages from anyone who responds to the server.

 

Difficulty: 3 

234. (p. 91, 92) List some rules of netiquette? 

Some rules of netiquette are as follows:a. Consult Frequently Asked Questions or FAQs.b. Avoid flaming.c. Avoid use of all-capital letters unless they are required for emphasis.d. Be careful with jokes.e. Avoid sloppiness, but avoid criticizing others' sloppiness.f. Don't send huge file attachments, unless requested.g. When replying, quote only the relevant portion.h. Don't "overforward" or automatically forward emails to other people without checking if the contents are true and appropriate.

 

Difficulty: 3 

2-94

Page 95: Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace40p6zu91z1c3x7lz71846qd1.wpengine.netdna-cdn.com/…  · Web viewChapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring

Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key

235. (p. 73) What is a web portal? 

A web portal is a type of gateway website that offers a broad array of resources and services, online shopping malls, email support, current news and weather, stock quotes, travel information, and links to other popular subject categories.

 

Difficulty: 1 

236. (p. 75, 76) What are the four types of web search tools available? 

The four types of web search tools are:a. Keyword indexesb. Subject directoriesc. Metasearch enginesd. Specialized search engines

 

Difficulty: 2 

237. (p. 102) How would you distinguish spoofing, phishing, and pharming? 

Spoofing is the forgery of an email sender name so that the message appears to have originated from someone or somewhere other than the actual source. Phishing is (1) the sending of a forged email that (2) directs recipients to a replica of an existing web page, both of which pretend to belong to a legitimate company. The purpose of the fraudulent sender is to "phish" for, or entice, people to share, their personal, financial, or password data. In pharming, thieves implant malicious software on a victim's computer that redirects the user to an impostor web page even when the individual types the correct address into his or her browser.

 

Difficulty: 3 

2-95