Exam 7: Connecting to the Internet
Exam 1: Getting Started75 Questions
Exam 2: Looking at Windows75 Questions
Exam 3: Installing and Using Software75 Questions
Exam 4: File Basics75 Questions
Exam 5: Organizing Files and Folders75 Questions
Exam 6: Protecting Files75 Questions
Exam 7: Connecting to the Internet74 Questions
Exam 8: Browsing and Searching the Web74 Questions
Exam 9: Sending E-Mail and Attachments75 Questions
Exam 10: Writing and Printing Documents75 Questions
Exam 11: Working With Spreadsheets75 Questions
Exam 12: Accessing Databases75 Questions
Exam 13: Making Presentations75 Questions
Exam 14: Recording and Editing Sound75 Questions
Exam 15: Working With Graphics75 Questions
Exam 16: Creating Desktop Video and Animation75 Questions
Exam 17: Looking Under the Hood75 Questions
Exam 18: Computing Programming75 Questions
Select questions type
Some Internet connections are asymmetrical with data traveling the same speed upstream and downstream.
(True/False)
4.9/5
(29)
Case-Based Critical Thinking Questions Case 7-1 Toby is looking into purchasing Internet service. He is researching the different types of service that are available to him and trying to figure out what best suits his needs. Toby wants his computer to be protected from intrusions once it is connected to the Internet. Two easy and effective ways for him to protect his computer are ____.
(Multiple Choice)
4.8/5
(26)
A public IP address can be used within a LAN, but not for Internet data transport.
(True/False)
4.7/5
(29)
Ports from many different sources can share a single communications channel or circuit.
(True/False)
5.0/5
(33)
The ____________________ is composed of computers and other devices that exchange data using a standard protocol called TCP/IP.
(Short Answer)
4.7/5
(29)
A(n) ___________________________________ is a company that offers Internet access to individuals, businesses, and smaller ISPs.
(Short Answer)
4.9/5
(34)
The key feature of ____________________ technology is that you can use it on the go.
(Short Answer)
4.9/5
(36)
The first time you want to connect to a secured network, you are required to enter the correct ____________________.
(Short Answer)
4.9/5
(33)
With satellite internet service, the speed of an Internet connection is the time it takes data to travel to a satellite and back, known as ____.
(Multiple Choice)
4.9/5
(31)
The Internet is composed of computers and other devices that exchange data using a standard protocol called ____.
(Multiple Choice)
4.9/5
(34)
Most connections are ____ with data traveling faster downstream than upstream.
(Multiple Choice)
4.9/5
(37)
Network service provider equipment and links are tied together by ____.
(Multiple Choice)
4.9/5
(41)
One of the most common ways of gaining unauthorized access to a network-based computer is by looking for ____ ports.
(Multiple Choice)
4.8/5
(34)
When setting up wireless encryption, what works like a password?
(Multiple Choice)
4.8/5
(34)
The two most popular LAN technologies are Ethernet and ____________________.
(Short Answer)
4.9/5
(37)
An Ethernet hotspot is basically a wireless local area network that provides access to guests using laptop computers or mobile devices.
(True/False)
4.7/5
(41)
Showing 41 - 60 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)