Deck 19: Networks

Full screen (f)
exit full mode
Question
A communications protocol is a set of rules for efficiently transmitting data from one network device to another.
Use Space or
up arrow
down arrow
to flip the card.
Question
Social networking services, such as Facebook and LinkedIn, are designed for people to reconnect with old friends and coworkers, and make new social or professional contacts.
Question
Forum rooms provide a synchronous environment in which a group of participants share text-based information.
Question
Ethernet is a wireless network technology and does not require a cable to connect network devices.
Question
A built-in referral system in the social network helps participants contact other participants with similar interests.
Question
When communication is synchronous , messages are held until the recipient is ready to view them.
Question
Software for accessing files stored in the cloud storage can only be built into software applications and browsers.
Question
Packets traveling on a single line always go to a single destination.
Question
Internet connections are classified as always-on connections if they remain active even when you are not online.
Question
In a network configured with a router, all network data travels to the router before continuing to its destination.
Question
A Wi-Fi hotspot is basically a wireless local area network that provides access to guests using laptop computers or mobile devices.
Question
All networks are secured.
Question
Homegroups are designed for computers with either the Windows operating system or Apple's OS X operating system.
Question
Cyberfraud is the repeated use of Internet-based communications technologies to deliberately harm other people through intimidation, humiliation, or embarrassment.
Question
A computer can have a permanently assigned dynamic IP address.
Question
NSP equipment and links are tied together by network service points.
Question
If your password is strong enough, do not change it.
Question
Text messaging is an asynchronous service; messages are delivered to a mobile device, where they are stored, and the recipient should delete them after they are viewed.
Question
A domain name ends with an extension that indicates its bottom-level domain.
Question
You always can assign a unique IP address to your computer.
Question
<strong>  Referring to the accompanying figure, the connection point between the printer and the network is referred to as a _____.</strong> A) link B) point C) device D) node <div style=padding-top: 35px> Referring to the accompanying figure, the connection point between the printer and the network is referred to as a _____.

A) link
B) point
C) device
D) node
Question
The Internet is a global network that connects millions of smaller networks, computers, and other devices that exchange data using a standard communications protocol called _____.

A) IP/TCP
B) TPC/IP
C) TCP/IP
D) TCP
Question
The first time you want to connect to a secured network, you are required to enter the correct _____.

A) decryption key
B) user name and password
C) password
D) encryption key
Question
Your computer acts as a _____ that receives data or services.

A) network server
B) client
C) destination computer
D) data processing unit
Question
Early communications networks, such as the telephone system, used a technology called _____ switching, which essentially established a dedicated, private link between two telephones for the duration of a call.

A) circuit
B) packet
C) connection
D) line
Question
Which of the following Internet Protocol addresses are divided into eight segments?

A) IPv6
B) IPv8
C) IPv4
D) IPv10
Question
NSP stands for _____.

A) Network System Provider
B) Network Support Provider
C) Network Service Protocol
D) Network Service Provider
Question
Packets can originate from _____ sources.

A) only one
B) not more than two
C) several
D) not more than five
Question
Discoverable network devices are listed under the _____ heading of File Explorer.

A) Homegroup
B) Network
C) Computer
D) Shared
Question
A router's wired _____ port can connect to a modem for Internet access.

A) uplink
B) outlink
C) inlink
D) onlink
Question
The most popular type of wireless network is called _____.

A) Bluetooth
B) Ethernet
C) VPN
D) Wi-Fi
Question
A _____ network typically connects personal computers within a very limited geographical area.

A) local area
B) wide area
C) virtual
D) private
Question
Homegroups are designed for computers with the _____ operating system.

A) Windows
B) OS X
C) iOS
D) Android
Question
Which of the following is the domain name of the following Web address: www.msu.edu/infotech?

A) www.msu.edu
B) msu.edu
C) edu
D) msu.edu/infotech
Question
<strong>  Referring to the accompanying figure, the _____ is serving the purpose of linking two or more nodes of the network.</strong> A) file server B) printer C) router D) modem <div style=padding-top: 35px> Referring to the accompanying figure, the _____ is serving the purpose of linking two or more nodes of the network.

A) file server
B) printer
C) router
D) modem
Question
All of the following are secure network icons, except _____.

A) <strong>All of the following are secure network icons, except _____.</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
B) <strong>All of the following are secure network icons, except _____.</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
C) <strong>All of the following are secure network icons, except _____.</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
D) <strong>All of the following are secure network icons, except _____.</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
Question
SSID stands for _____.

A) service set identifier
B) service system identifier
C) system set identifier
D) single service identifier
Question
To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.

A) <strong>To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
B) <strong>To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
C) <strong>To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
D) <strong>To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
Question
Which of the following links devices within an organization?

A) Internet
B) intranet
C) extranet
D) virtual network
Question
A virtual private network (VPN) is a type of _____ that allows remote users to connect to a private network using a public communications system such as the Internet.

A) local area network
B) intranet
C) extranet
D) wide area network
Question
Which of the following is the newest instant messaging platform?

A) AOL's AIM
B) Google Talk
C) Windows Messenger
D) ICQ
Question
A series of entries posted online similar to the entries in a diary is called a(n) _____.

A) blog
B) podcast
C) chat room
D) Facebook
Question
Which of the following is Microsoft's cloud storage service?

A) SkyDrive
B) iCloud
C) Dropbox
D) Just Cloud
Question
_____ provides a way to transfer files from one computer to another over a network.

A) TCP
B) FTP
C) IPv6
D) IP
Question
Which of the following is a video conferencing application?

A) Pinterest
B) Google Talk
C) Windows Messenger
D) GoToMeeting
Question
Fast Internet connections, called broadband, blaze away at _____ or more.

A) 200 Mbps
B) 100 Mbps
C) 100Kbps
D) 50 Mbps
Question
Which of the following top-level domains is designed for unrestricted use?

A) gov
B) edu
C) int
D) net
Question
Which of the following top-level domains is restricted to organizations established by international treaties?

A) gov
B) info
C) int
D) biz
Question
Which of the following is the most common Internet connection?

A) symmetrical
B) always-on
C) asymmetrical
D) downstream
Question
Which of the following is a broadband Internet access technology that works over standard phone lines?

A) cable Internet service
B) dial-up Internet service
C) satellite Internet service
D) DSL
Question
Which of the following types of communications tools is used for social networking (Facebook)?

A) Public Asynchronous
B) Private Asynchronous
C) Public Synchronous
D) Private Synchronous
Question
Which of the following types of communications tools is used for chat rooms?

A) Public Asynchronous
B) Private Asynchronous
C) Public Synchronous
D) Private Synchronous
Question
All of the Internet's domain names and corresponding IP addresses are stored on a system of computers called the _____.

A) Domain Name System
B) Domain Name Server
C) Domain Name Service
D) Domain Name Database
Question
Which of the following types of communications tools is used for forums and discussion groups?

A) Public Asynchronous
B) Private Asynchronous
C) Public Synchronous
D) Private Synchronous
Question
Which of the following is LEAST likely related to a slow Internet connection?

A) the number of users logged in to your Internet service
B) the amount of traffic that is circulating on the Internet
C) environmental factors that affect the speed of wireless connections
D) the speed of your computer's processor
Question
Window's network troubleshooter provides a set of utilities to identify and fix all of the following problems, EXCEPT _____.

A) Internet connections
B) Windows registry
C) shared folders
D) network circuitry
Question
Mobile broadband service is offered by the following wireless cellular phone service providers, EXCEPT _____.

A) Comcast
B) Verizon
C) AT&T
D) Sprint
Question
<strong>  The tool shown in the accompanying figure allows you _____.</strong> A) to check the speed of your computer B) to check the speed of your Internet connection C) both a and b D) neither a nor b <div style=padding-top: 35px> The tool shown in the accompanying figure allows you _____.

A) to check the speed of your computer
B) to check the speed of your Internet connection
C) both a and b
D) neither a nor b
Question
Which of the following types of communications tools is used for voice over IP (Skype)?

A) Public Asynchronous
B) Private Asynchronous
C) Public Synchronous
D) Private Synchronous
Question
If your network fails and you cannot get an e-mail or browse the Internet, you should check that _____.

A) airplane mode is enabled
B) the router is functioning correctly
C) the wireless signal is strong enough
D) All of the above
Question
Each connection point on a network is referred to as a network ____________________.
Question
Network data is often stored on a network ____________________, such as one that handles e-mail or movie downloads.
Question
Case-Based Critical Thinking Questions Case 19-1 Leon made a presentation about netiquette. His presentation was followed by a very useful discussion. Answer the following questions that the audience asked him. Which of the following is among the most important rules of netiquette?

A) Distinguish between business and personal
B) Proofread messages before you send them
C) Respond promptly
D) All of the above
Question
____________________ is online jargon for "Internet etiquette."
Question
The ____________________ is maintained by network service providers (NSPs).
Question
A Wi-Fi ____________________ is basically a wireless local area network that provides access to guests using laptop computers or mobile devices.
Question
A(n) ____________________ name is a key component of e-mail addresses and Web site addresses.
Question
Case-Based Critical Thinking Questions Case 19-1 Leon made a presentation about netiquette. His presentation was followed by a very useful discussion. Answer the following questions that the audience asked him. Which of the following is not appropriate etiquete for e-mail communications?

A) Promptly respond to messages
B) Type important messages in all uppercase
C) Be careful with wording
D) Do not spread false information
Question
Please briefly describe the following three ways of connecting to the Internet: Cable Internet service, digital subscriber line, and dial-up Internet service.
Question
When a communications tool is ____________________, interchanges happen in real time and all parties must be online at the same time.
Question
The capacity of an Internet connection is sometimes referred to as ____________________ and can be measured in bits per second.
Question
A(n) ____________________ area network is one that covers a large geographical area and typically consists of several smaller networks.
Question
The chapter listed nine of the most commonly used top-level domains. Please name five of the nine and include a description of who can use each domain.
Question
When your computer is connected to a local area network, you have access to files designated as "____________________" on other network computers.
Question
Case-Based Critical Thinking Questions Case 19-1 Leon made a presentation about netiquette. His presentation was followed by a very useful discussion. Answer the following questions that the audience asked him. Which of the following should be avoided when communicating with businesses?

A) Use of smileys
B) Use of uppercase and lowercase letters
C) Use of more formal language
D) Tailoring your message
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 19: Networks
1
A communications protocol is a set of rules for efficiently transmitting data from one network device to another.
True
2
Social networking services, such as Facebook and LinkedIn, are designed for people to reconnect with old friends and coworkers, and make new social or professional contacts.
True
3
Forum rooms provide a synchronous environment in which a group of participants share text-based information.
False
4
Ethernet is a wireless network technology and does not require a cable to connect network devices.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
A built-in referral system in the social network helps participants contact other participants with similar interests.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
When communication is synchronous , messages are held until the recipient is ready to view them.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
Software for accessing files stored in the cloud storage can only be built into software applications and browsers.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
Packets traveling on a single line always go to a single destination.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
Internet connections are classified as always-on connections if they remain active even when you are not online.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
In a network configured with a router, all network data travels to the router before continuing to its destination.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
A Wi-Fi hotspot is basically a wireless local area network that provides access to guests using laptop computers or mobile devices.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
All networks are secured.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
Homegroups are designed for computers with either the Windows operating system or Apple's OS X operating system.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
Cyberfraud is the repeated use of Internet-based communications technologies to deliberately harm other people through intimidation, humiliation, or embarrassment.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
A computer can have a permanently assigned dynamic IP address.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
NSP equipment and links are tied together by network service points.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
If your password is strong enough, do not change it.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
Text messaging is an asynchronous service; messages are delivered to a mobile device, where they are stored, and the recipient should delete them after they are viewed.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
A domain name ends with an extension that indicates its bottom-level domain.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
You always can assign a unique IP address to your computer.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
<strong>  Referring to the accompanying figure, the connection point between the printer and the network is referred to as a _____.</strong> A) link B) point C) device D) node Referring to the accompanying figure, the connection point between the printer and the network is referred to as a _____.

A) link
B) point
C) device
D) node
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
The Internet is a global network that connects millions of smaller networks, computers, and other devices that exchange data using a standard communications protocol called _____.

A) IP/TCP
B) TPC/IP
C) TCP/IP
D) TCP
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
The first time you want to connect to a secured network, you are required to enter the correct _____.

A) decryption key
B) user name and password
C) password
D) encryption key
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
Your computer acts as a _____ that receives data or services.

A) network server
B) client
C) destination computer
D) data processing unit
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
Early communications networks, such as the telephone system, used a technology called _____ switching, which essentially established a dedicated, private link between two telephones for the duration of a call.

A) circuit
B) packet
C) connection
D) line
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following Internet Protocol addresses are divided into eight segments?

A) IPv6
B) IPv8
C) IPv4
D) IPv10
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
NSP stands for _____.

A) Network System Provider
B) Network Support Provider
C) Network Service Protocol
D) Network Service Provider
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
Packets can originate from _____ sources.

A) only one
B) not more than two
C) several
D) not more than five
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
Discoverable network devices are listed under the _____ heading of File Explorer.

A) Homegroup
B) Network
C) Computer
D) Shared
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
A router's wired _____ port can connect to a modem for Internet access.

A) uplink
B) outlink
C) inlink
D) onlink
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
The most popular type of wireless network is called _____.

A) Bluetooth
B) Ethernet
C) VPN
D) Wi-Fi
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
A _____ network typically connects personal computers within a very limited geographical area.

A) local area
B) wide area
C) virtual
D) private
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
Homegroups are designed for computers with the _____ operating system.

A) Windows
B) OS X
C) iOS
D) Android
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is the domain name of the following Web address: www.msu.edu/infotech?

A) www.msu.edu
B) msu.edu
C) edu
D) msu.edu/infotech
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
<strong>  Referring to the accompanying figure, the _____ is serving the purpose of linking two or more nodes of the network.</strong> A) file server B) printer C) router D) modem Referring to the accompanying figure, the _____ is serving the purpose of linking two or more nodes of the network.

A) file server
B) printer
C) router
D) modem
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
All of the following are secure network icons, except _____.

A) <strong>All of the following are secure network icons, except _____.</strong> A)   B)   C)   D)
B) <strong>All of the following are secure network icons, except _____.</strong> A)   B)   C)   D)
C) <strong>All of the following are secure network icons, except _____.</strong> A)   B)   C)   D)
D) <strong>All of the following are secure network icons, except _____.</strong> A)   B)   C)   D)
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
SSID stands for _____.

A) service set identifier
B) service system identifier
C) system set identifier
D) single service identifier
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.

A) <strong>To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.</strong> A)   B)   C)   D)
B) <strong>To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.</strong> A)   B)   C)   D)
C) <strong>To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.</strong> A)   B)   C)   D)
D) <strong>To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.</strong> A)   B)   C)   D)
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following links devices within an organization?

A) Internet
B) intranet
C) extranet
D) virtual network
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
A virtual private network (VPN) is a type of _____ that allows remote users to connect to a private network using a public communications system such as the Internet.

A) local area network
B) intranet
C) extranet
D) wide area network
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following is the newest instant messaging platform?

A) AOL's AIM
B) Google Talk
C) Windows Messenger
D) ICQ
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
A series of entries posted online similar to the entries in a diary is called a(n) _____.

A) blog
B) podcast
C) chat room
D) Facebook
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is Microsoft's cloud storage service?

A) SkyDrive
B) iCloud
C) Dropbox
D) Just Cloud
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
_____ provides a way to transfer files from one computer to another over a network.

A) TCP
B) FTP
C) IPv6
D) IP
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following is a video conferencing application?

A) Pinterest
B) Google Talk
C) Windows Messenger
D) GoToMeeting
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
Fast Internet connections, called broadband, blaze away at _____ or more.

A) 200 Mbps
B) 100 Mbps
C) 100Kbps
D) 50 Mbps
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following top-level domains is designed for unrestricted use?

A) gov
B) edu
C) int
D) net
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following top-level domains is restricted to organizations established by international treaties?

A) gov
B) info
C) int
D) biz
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following is the most common Internet connection?

A) symmetrical
B) always-on
C) asymmetrical
D) downstream
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following is a broadband Internet access technology that works over standard phone lines?

A) cable Internet service
B) dial-up Internet service
C) satellite Internet service
D) DSL
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following types of communications tools is used for social networking (Facebook)?

A) Public Asynchronous
B) Private Asynchronous
C) Public Synchronous
D) Private Synchronous
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following types of communications tools is used for chat rooms?

A) Public Asynchronous
B) Private Asynchronous
C) Public Synchronous
D) Private Synchronous
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
All of the Internet's domain names and corresponding IP addresses are stored on a system of computers called the _____.

A) Domain Name System
B) Domain Name Server
C) Domain Name Service
D) Domain Name Database
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following types of communications tools is used for forums and discussion groups?

A) Public Asynchronous
B) Private Asynchronous
C) Public Synchronous
D) Private Synchronous
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following is LEAST likely related to a slow Internet connection?

A) the number of users logged in to your Internet service
B) the amount of traffic that is circulating on the Internet
C) environmental factors that affect the speed of wireless connections
D) the speed of your computer's processor
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
Window's network troubleshooter provides a set of utilities to identify and fix all of the following problems, EXCEPT _____.

A) Internet connections
B) Windows registry
C) shared folders
D) network circuitry
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
Mobile broadband service is offered by the following wireless cellular phone service providers, EXCEPT _____.

A) Comcast
B) Verizon
C) AT&T
D) Sprint
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
<strong>  The tool shown in the accompanying figure allows you _____.</strong> A) to check the speed of your computer B) to check the speed of your Internet connection C) both a and b D) neither a nor b The tool shown in the accompanying figure allows you _____.

A) to check the speed of your computer
B) to check the speed of your Internet connection
C) both a and b
D) neither a nor b
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following types of communications tools is used for voice over IP (Skype)?

A) Public Asynchronous
B) Private Asynchronous
C) Public Synchronous
D) Private Synchronous
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
If your network fails and you cannot get an e-mail or browse the Internet, you should check that _____.

A) airplane mode is enabled
B) the router is functioning correctly
C) the wireless signal is strong enough
D) All of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
Each connection point on a network is referred to as a network ____________________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
Network data is often stored on a network ____________________, such as one that handles e-mail or movie downloads.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
Case-Based Critical Thinking Questions Case 19-1 Leon made a presentation about netiquette. His presentation was followed by a very useful discussion. Answer the following questions that the audience asked him. Which of the following is among the most important rules of netiquette?

A) Distinguish between business and personal
B) Proofread messages before you send them
C) Respond promptly
D) All of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
____________________ is online jargon for "Internet etiquette."
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
The ____________________ is maintained by network service providers (NSPs).
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
A Wi-Fi ____________________ is basically a wireless local area network that provides access to guests using laptop computers or mobile devices.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
A(n) ____________________ name is a key component of e-mail addresses and Web site addresses.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
Case-Based Critical Thinking Questions Case 19-1 Leon made a presentation about netiquette. His presentation was followed by a very useful discussion. Answer the following questions that the audience asked him. Which of the following is not appropriate etiquete for e-mail communications?

A) Promptly respond to messages
B) Type important messages in all uppercase
C) Be careful with wording
D) Do not spread false information
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
Please briefly describe the following three ways of connecting to the Internet: Cable Internet service, digital subscriber line, and dial-up Internet service.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
When a communications tool is ____________________, interchanges happen in real time and all parties must be online at the same time.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
The capacity of an Internet connection is sometimes referred to as ____________________ and can be measured in bits per second.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
A(n) ____________________ area network is one that covers a large geographical area and typically consists of several smaller networks.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
The chapter listed nine of the most commonly used top-level domains. Please name five of the nine and include a description of who can use each domain.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
When your computer is connected to a local area network, you have access to files designated as "____________________" on other network computers.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
Case-Based Critical Thinking Questions Case 19-1 Leon made a presentation about netiquette. His presentation was followed by a very useful discussion. Answer the following questions that the audience asked him. Which of the following should be avoided when communicating with businesses?

A) Use of smileys
B) Use of uppercase and lowercase letters
C) Use of more formal language
D) Tailoring your message
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 75 flashcards in this deck.