Exam 2: Connecting and Communicating Online

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

To thwart attempts to steal your personal data, install a personal threat reporter, which is software that protects network resources from outside intrusions.

(True/False)
4.8/5
(27)

VoIP is an Internet standard that permits file uploading and downloading with other computers on the Internet.

(True/False)
4.8/5
(35)

When two people are conversing over the Internet in real time, what do you know about them?

(Multiple Choice)
5.0/5
(30)

Which of the following is a small version of a larger graphic?

(Multiple Choice)
4.8/5
(44)

An organization to which you belong is joining the W3C. What is the mission of the work you will undertake as a member?

(Multiple Choice)
4.8/5
(37)

Which of the following is a collection of related webpages and associated items, such as documents and pictures, stored on a web server?

(Multiple Choice)
4.8/5
(38)

What term is used to describe the harassment of computer users through various forms of Internet communications?

(Multiple Choice)
4.8/5
(42)

Identify the letter of the choice that best matches the phrase or definition. a. Internet2 b. server c. Wi-Fi d. FTTP e. DSL f. IP address g. tethering h. fixed wireless i. W3C j. access provider k. thread l. VoIP m. megabyte n. email list o. gigabyte p. subscribe q. domain name r. FTP s. animation t. search engines -Any computer that provides services and connections to other computers on a network

(Short Answer)
4.8/5
(39)

A Uniform Resource Locator is the same as which of the following?

(Multiple Choice)
5.0/5
(35)

  -Most websites of the kind shown in the accompanying figure require payment for services. -Most websites of the kind shown in the accompanying figure require payment for services.

(True/False)
4.8/5
(41)

When you enter a domain name, a(n) ____________________ translates the domain name to its associated IP address so data can be routed to the correct computer.

(Short Answer)
4.8/5
(39)

Which of the following consists of images displayed in motion?

(Multiple Choice)
4.8/5
(29)

A(n) ____________________ is a type of software for computers and mobile devices that reads a user's specified web feeds and collects their most recent content.

(Short Answer)
5.0/5
(36)

  -Using the technology shown in the accompanying figure, others connected to the same server see what a user has typed. -Using the technology shown in the accompanying figure, others connected to the same server see what a user has typed.

(True/False)
4.8/5
(30)

If your friend is enjoying a cup of coffee in a trendy coffee shop and at the same time is surfing the web, which of the following is she using?

(Multiple Choice)
4.9/5
(43)

A phishing filter will prevent your browsing history, passwords, user names, and other personal information from being revealed.

(True/False)
4.7/5
(40)

You have a new web app and the host for it is going to provide storage for your data on their server. What is this called?

(Multiple Choice)
4.9/5
(47)

Which of the following is application software that allows users to access and view webpages?

(Multiple Choice)
4.9/5
(36)

In Internet terminology, what is the term, google.com, called?

(Multiple Choice)
4.9/5
(43)

In a web address, the ____________________ is a set of rules that defines how pages transfer on the Internet.

(Essay)
4.8/5
(34)
Showing 101 - 120 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)