Exam 8: Networking and Digital Communication
Exam 1: Exploring Our Digital Planet133 Questions
Exam 2: Hardware Basics: Inside the Box146 Questions
Exam 3: Hardware Basics: Peripherals133 Questions
Exam 4: Software Basics: the Ghost in the Machine127 Questions
Exam 5: Productivity Applications118 Questions
Exam 6: Graphics, digital Media, and Multimedia110 Questions
Exam 7: Database Applications and Privacy Implications126 Questions
Exam 8: Networking and Digital Communication134 Questions
Exam 9: The Evolving Internet115 Questions
Exam 10: Computer Security and Risks84 Questions
Exam 11: Computers at Work, school, and Home96 Questions
Exam 12: Information Systems in Business129 Questions
Exam 13: E-Commerce and E-Business: the Evolving Internet Economy68 Questions
Exam 14: Systems Design and Development145 Questions
Exam 15: Is Artificial Intelligence Real80 Questions
Exam 16: Computer and Internet Terminology81 Questions
Select questions type
Software designed to allow several networked users to work on the same document at the same time is known as ________.
(Short Answer)
4.8/5
(35)
If one attempts to send a message to an email address which does not exist,it will return to you,or ________.
(Multiple Choice)
4.9/5
(37)
A(n)________ network is often used to set up a temporary communications system that requires no centralized router.
(Multiple Choice)
4.9/5
(38)
Many laptops and handheld computers have ________ ports that can send and receive digital information over short distances (approximately 1 meter)without the use of cables.
(Short Answer)
4.8/5
(38)
Like role-playing games,________ Life is a 3-D virtual world populated by avatars of Web users from all over the world.
(Short Answer)
4.8/5
(31)
Network transmission speeds are measured in ________ per second,and this term can be proceeded by units such as kilo,mega or giga.
(Short Answer)
4.8/5
(35)
Programs designed to enable several networked users to work on the same documents at the same time are called ________.
(Short Answer)
4.8/5
(33)
Graphical bodies used to represent a person in a virtual meeting place are known as
(Multiple Choice)
4.8/5
(42)
Many phone companies offer ________,a technology for bringing broadband connections to homes and small businesses by sharing the copper telephone lines that carry voice calls.
(Multiple Choice)
4.8/5
(43)
________ is a secure electronic "tunnel" through the Internet that prevents unauthorized access or eavesdropping.
(Multiple Choice)
4.8/5
(40)
Match the term on the left to its corresponding definition on the right.
-blog
(Multiple Choice)
4.9/5
(30)
Most Web-based email systems use ________ to retrieve mail and store the messages in a folder on a remote mail server.
(Multiple Choice)
4.9/5
(41)
Graphical representations for the tone of your message,such as :-)to express happiness or :-O to express surprise,are also known as ________.
(Short Answer)
4.9/5
(46)
A(n)________ is the shortened name of a Web site designed to enable anyone who accesses it to contribute to,and modify,content.
(Short Answer)
4.8/5
(34)
A newer PC will likely have an Ethernet ________ on the main circuit board so it can directly connect to an Ethernet network.
(Multiple Choice)
4.8/5
(40)
Two examples of a(n)________ operating system are Novell's Netware and Microsoft Windows Server.
(Short Answer)
4.8/5
(37)
Each individual computer and networked peripheral attached to a LAN is a
(Multiple Choice)
4.8/5
(42)
The fastest Ethernet devices today follow the ________ standard.
(Multiple Choice)
4.7/5
(35)
Connecting a computer to a telephone line requires a hardware device called a(n)________.
(Short Answer)
4.9/5
(39)
A(n)________ area network is a network of local area networks.
(Short Answer)
4.8/5
(40)
Showing 21 - 40 of 134
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)