Chapter 002 the INTERNET & the WORLD WIDE WEB Exploring Cyberspace

Chapter 002 the INTERNET & the WORLD WIDE WEB Exploring Cyberspace

<p> Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>Multiple Choice Questions</p><p>1. An expression for how much data can be sent through a communications channel in a given amount of time is referred to as ______. A. connectivity B. dial-up C. bandwidth D. download</p><p>2. Generally, a very high-speed internet connection is referred to as ______. A. broadband B. dial-up C. bandwidth D. upload</p><p>3. The wired or wireless means of connecting a computer to the internet is called a ______. A. broadband B. physical connection C. dial-up D. bandwidth</p><p>4. Bps stands for ______. A. bytes per second B. bits per second C. bandwidth per second D. broadband per second</p><p>5. Megabits per second are ______. A. 1 million bits per second B. 10,000 bits per second C. 1,000 bits per second D. 100 bits per second</p><p>2-1 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>6. Gigabits per second are ______. A. 1 hundred bits per second B. 1 thousand bits per second C. 1 million bits per second D. 1 billion bits per second</p><p>7. The transmission of data from a remote computer to a local computer is referred to as ______. A. upload B. download C. broadband D. bandwidth</p><p>8. The transmission of data from a local computer to a remote computer is called ______. A. upload B. download C. broadband D. bandwidth</p><p>9. What consists of hardware and software and allows voice, video, and data to be communicated over traditional copper-wire telephone lines? A. ISDN B. cable modem C. communications satellite D. bandwidth</p><p>10. The internet connection that uses regular phone lines to transmit data in megabits per second is ______. A. T1 line B. cable modem C. DSL line D. communications satellite</p><p>2-2 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>11. Which traditional trunk line carries 24 normal telephone circuits and has a transmission rate of 1.5 Mbps? A. T1 line B. cable modem C. DSL line D. communications satellite</p><p>12. What connects a personal computer to a cable-TV system that offers an internet connection? A. T1 line B. cable modem C. DSL line D. communications satellite</p><p>13. A space station that transmits radio waves called microwaves from earth-based stations is called a ______. A. T1 line B. cable modem C. DSL line D. communications satellite</p><p>14. The method of going online that requires the user to be within 3.3 miles of a phone company central switching office is ______. A. dial-up modem B. DSL C. T1 line D. satellite</p><p>15. The line most commonly used by corporate, government, and academic sites is ______. A. DSL B. T1 line C. satellite D. ISDN</p><p>2-3 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>16. Which of the following is NOT an advantage of DSL? A. fast download B. connection always on C. consistent transmission rate D. universal availability</p><p>17. Which of the following is NOT an advantage of a T1 line? A. affordability B. high speed transmission C. 24 separate circuits of 64 kbps each D. supports many users</p><p>18. Which of the following is NOT an example of a download? A. Saving pictures from the internet to your hard drive. B. Storing a map for your vacation from the internet to your hard drive. C. Saving a presentation to a CD. D. Saving a program from an internet site to your hard drive.</p><p>19. Which of the following is NOT an example of an upload? A. Sending a photograph as an email attachment. B. Saving your favorite music videos from a music website to your hard drive. C. Sending a spreadsheet as an email attachment. D. Submitting a term paper to an instructor online.</p><p>20. Using a user name and password, the ISP will allow the user to connect or ______. A. log on B. download C. upload D. log out</p><p>2-4 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>21. ISP stands for ______. A. internet select provider B. internet service provider C. internet serial provider D. internet service pusher</p><p>22. A search engine that allows you to search several search engines simultaneously is called a ______. A. megasearch engine. B. hypersearch engine. C. metasearch engine. D. none of these.</p><p>23. An automatic email mailing list of people who regularly participate in discussion topics are called ______. A. attachments B. instant messaging C. listserv D. spam</p><p>24. If you were emailing a term paper and wanted to maintain its formatting, it would be sent as a(n) ______. A. regular email B. instant message C. listserv message D. attachment</p><p>25. The .gov, .com, .net, and .edu extensions are examples of ______. A. emoticons B. FAQs C. top-level domains D. URLs</p><p>2-5 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>26. Any user on a given email system can send a message and have it pop up instantly on the screen of anyone else logged onto that system using ______. A. attachments B. instant messaging C. list-serves D. spam</p><p>27. Which of the following is NOT an example of good netiquette? A. Consult the frequently asked questions (FAQs). B. Don't SHOUT. C. Don't send large file attachments, unless requested. D. When replying, send the entire original message for reference.</p><p>28. Which of the following is NOT an example of flaming? A. a lie B. an ethnic joke C. profanity D. a sexist comment</p><p>29. In terms of privacy, email is like ______. A. a sealed letter B. an insured package C. a postcard D. a notarized document</p><p>30. An uninvited email solicitation to participate in a money-making scheme is an example of ______. A. flaming B. spam C. netiquette D. list-serve</p><p>2-6 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>31. If you wish to be part of an online discussions on a favorite topic of interest, you would subscribe to a(n) ______. A. instant message service B. listserv C. spam tracking D. online group</p><p>32. Connections to other documents or web pages that contain related information are called ______links. A. web portal B. multimedia C. URL D. hypertext</p><p>33. The set of special instructions that are used to specify document structure, formatting, and links to other multimedia documents is called ______. A. HTML B. hypertext C. multimedia D. web portal</p><p>34. A computer with a domain name is called a ______. A. web page B. website C. home D. web portal</p><p>35. The location on a particular computer on the World Wide Web that has a unique address is called a ______. A. home page B. web page C. website D. web portal</p><p>2-7 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>36. A secret word or string of characters that allows you to log on to a remote computer is called a ______. A. password B. website C. URL D. UserID</p><p>37. The first page seen at a website is called the ______. A. community page B. home page C. browser D. protocol</p><p>38. Software that enables users to find and access the various parts of the web is called a ______. A. home page B. website C. browser D. web page</p><p>39. A string of characters that points to a specific piece of information on the web is called the ______. A. URL B. HTTP C. protocol D. browser</p><p>40. A set of communications rules for exchanging information is called a ______. A. web browser B. HTML C. URL D. protocol</p><p>2-8 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>41. The communications rules or protocols that allow browsers to connect with web servers is ______. A. HTTP B. HTML C. Java D. URL</p><p>42. Little circles located in front of various options, which can be selected with the mouse, are called ______. A. hyperlinks B. radio buttons C. text boxes D. web portals</p><p>43. An independently controllable section of a web age is called a ______. A. hyperlink B. web site C. frame D. window</p><p>44. Websites that group together in one convenient location popular features such as online shopping malls, email support, community forums, current news and weather are called ______. A. home pages B. browsers C. search engines D. web portals</p><p>45. Which of the following provides lists of several websites classified by topic? A. web portal B. subject directory C. metasearch engine D. browser</p><p>2-9 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>46. The subject word or words of the topic you wish to find while using a search engine is called the ______. A. directory B. URL C. keyword D. web portal</p><p>47. Which of the following can be used to locate information on the web by asking questions or using keywords? A. search engines B. home pages C. community pages D. URLs</p><p>48. A program that adds a specific feature to a browser, allowing it to play or view certain files is a ______. A. script B. plug-in C. tag D. cookie</p><p>49. Plug-ins are also called ______. A. players B. viewers C. browsers D. Both A and B</p><p>50. Small Java programs that can be quickly downloaded and run by most browsers are called ______. A. cookies B. applets C. active X D. hypertext</p><p>2-10 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>51. The rapid sequencing of still images to create the appearance of motion is called a(n) ______. A. animation B. hyperlink C. script D. applet</p><p>52. The technology in which software automatically downloads information to your computer is called ______. A. pull technology B. download C. push technology D. upload</p><p>53. The technology in which customized text, audio, and video are sent automatically to the user on a regular basis is called ______. A. webcasting B. broadcasting C. surfing D. streaming</p><p>54. A method whereby one can connect to a remote computer and transfer files to their own microcomputer's hard disk via TCP/IP over the internet is called ______. A. NetBEUI B. FTP C. ARAP D. SLIP</p><p>55. Which of the following is an FTP client program? A. Cute B. Put C. Grab D. FTP net</p><p>2-11 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>56. With ______, online participants have a typed discussion while staying online at the same time. A. real-time chat B. blogs C. telnet D. newsgroups</p><p>57. Web logs made by various users that are also accessible to others are called ______. A. real-time chat B. blogs C. telnet D. applets</p><p>58. RSS newsreaders are also known as ______. A. attachments B. aggregators C. podcasters D. webcasts</p><p>59. To access a newsgroup, a(n) ______program is needed. A. browser B. applet C. newsreader D. chat</p><p>60. Which of the following is a person-to-person auction site? A. www.acponline.org B. www.ebay.com C. www.onSale.com D. www.thirdage.com</p><p>2-12 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>61. Trading, banking, and e-money can be classified as ______. A. online finance B. online job-hunting C. online matchmaking D. online auctioning</p><p>62. Forging of an email sender name so that the message appears to have originated from someone or somewhere other than the actual source is called ______. A. spoofing B. phishing C. pharming D. spyware</p><p>63. Adware is also called ______. A. cookies B. spam C. pop-up generators D. None of these</p><p>64. One type of spyware is ______. A. browser hijackers B. search hijackers C. key loggers D. All of these</p><p>2-13 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>True / False Questions</p><p>65. Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of time. True False</p><p>66. The wired or wireless means of connecting to the internet is called a physical connection. True False</p><p>67. Bps stands for bandwidth per second. True False</p><p>68. One kilobit per second is the same as 1 million bits per second. True False</p><p>69. Mps stands for megabits per second. True False</p><p>70. The term gigabit refers to 1 billion bits per second. True False</p><p>71. Upload is the transmission of data from a remote computer to a local computer. True False</p><p>72. Download is the transmission of data from a local computer to a remote computer. True False</p><p>2-14 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>73. Integrated Services Digital Network (ISDN) consists of hardware and software that allows voice, video, and data to be communicated over traditional copper-wire telephone lines. True False</p><p>74. Digital subscriber line (DSL) uses satellite technology to transmit data in megabits per second. True False</p><p>75. A T1 line is essentially a traditional trunk line that carries 24 normal telephone circuits and has a transmission rate of 1.5 Mbps. True False</p><p>76. A cable modem connects a personal computer to a cable-TV system that offers an internet connection. True False</p><p>77. A communications satellite, a space station that transmits radio waves called microwaves from earth-based stations, can be used to retrieve information from the internet. True False</p><p>78. Kilobits per second are faster than megabits per second. True False</p><p>79. The transmission of the latest pinball game off a subscriber network to a home computer is an example of an upload. True False</p><p>2-15 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>80. The transmission of credit information to order something online is an example of an upload. True False</p><p>81. A cable modem is an example of a physical connection to the internet. True False</p><p>82. Cable modem lines are shared with other cable users in a particular area and can be slower during peak use periods. True False</p><p>83. You can have a cable modem connection even if there is no cable television available in your area. True False</p><p>84. The primary advantage of DSL is that it is always on and its transmission rate is consistent. True False</p><p>85. The primary advantage of a T1 line is its affordability. True False</p><p>86. A DSL line can be installed anywhere as long as the user has a telephone line. True False</p><p>87. ISP stands for internet service provider. True False</p><p>2-16 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>88. An internet service provider (ISP) provides users with access to the internet. True False</p><p>89. To log on or make connection to a remote computer, first enter the password and then the user name or user ID. True False</p><p>90. A domain is simply a location on the internet. True False</p><p>91. With instant messaging, any user on a given email system can send a message and have it pop up instantly on the screen of anyone else logged onto that system. True False</p><p>92. A listserv is an automatic mailing list server that sends email to subscribers who regularly participate in discussion topics. True False</p><p>93. Guides to appropriate online behavior are called netiquette. True False</p><p>94. Most online groups post frequently asked questions (FAQs) that explain expected norms of online behavior for a particular group. True False</p><p>95. Spamming is writing an online message that uses derogatory, obscene, or inappropriate language. True False</p><p>2-17 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>96. Use of all-capital letters on the internet is considered appropriate online behavior. True False</p><p>97. Emoticons are keyboard-produced pictorial representations of expressions. True False</p><p>98. Flaming refers to unsolicited email in the form of advertising or chain letters. True False</p><p>99. Some commonly used top-level domains are .net, .com, .gov, and .edu. True False</p><p>100. Many viruses ride along with email attachments. True False</p><p>101. Instant messaging can be used to post advertisements on computer screens. True False</p><p>102. It is important to type email addresses exactly as they appear. True False</p><p>103. Emails can be organized with instant organizers called routers to sort emails based on certain criteria, such as the sender's name or the mailing list. True False</p><p>2-18 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace 104. URL is the website's unique address. True False</p><p>2-19 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>105. HTML is the set of special instructions that are used to specify document structure, formatting, and links to other documents. True False</p><p>106. A website is the location of a web domain name in a computer somewhere on the internet. True False</p><p>107. A browser is a document on the World Wide Web that can include text, pictures, sound, and video. True False</p><p>108. The first page seen at a website is called the community page. True False</p><p>109. A portal is software that enables users to view web pages and to jump from one page to another. True False</p><p>110. A URL is a string of characters that points to a specific piece of information on the web. True False</p><p>111. HyperText Transfer Protocol or HTTP refers to the communications rules that allow browsers to connect with web servers. True False</p><p>2-20 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace 112. Radio buttons are little circles located in front of various options, selecting an option with the mouse places a dot in the corresponding circle. True False</p><p>2-21 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>113. Scroll arrows, small up/down and left/right arrows, can be used to move the screen to see the rest of the web page. True False</p><p>114. A frame is an independently controllable section of a web page. True False</p><p>115. Search engines are websites that group together in one convenient location popular features such as search tools, email, electronic commerce, and discussion groups. True False</p><p>116. A subject directory allows you to search for information by selecting lists of categories or topics. True False</p><p>117. Search engines are programs that enable you to ask questions or use keywords to help locate information on the web. True False</p><p>118. A web portal is a program that adds a specific feature to a browser, allowing it to play or view certain files. True False</p><p>119. A metasearch engine allows you to search for information by typing one or more keywords, and the search engine then displays a list of web pages, or "hits," that contain those key words. True False</p><p>2-22 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>120. Plug-ins are also called players and viewers. True False</p><p>121. RSS newsreaders and RSS aggregators are the same thing. True False</p><p>122. Applets are small programs that can be quickly downloaded and run by most browsers. True False</p><p>123. Spam consists of little text files left on your hard disk by some websites you visit. True False</p><p>124. Applets are written in Java, a complex programming language that enables programmers to create animated and interactive web pages. True False</p><p>125. Streaming video is the rapid sequencing of still images to create the appearance of motion, such as in a cartoon. True False</p><p>126. In pharming, thieves implant malicious software on a victim's computer that redirects the user to an impostor web page even when the individual types the correct address into his or her browser. True False</p><p>127. Streaming video is the process of transferring data in a continuous flow so a file can be viewed before the end of the file is sent. True False</p><p>2-23 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>128. Streaming audio allows you to listen to a file while the data is still being downloaded to your computer. True False</p><p>129. Pull technology automatically downloads information to your computer. True False</p><p>130. Webcasting sends customized text, video, and audio automatically on a regular basis. True False</p><p>131. Internet telephony is the method of using the internet to make a phone call, either one-to- one or for audio conferencing. True False</p><p>Fill in the Blank Questions</p><p>132. The type of data transmission that allows only one signal at a time is called ______transmission. ______</p><p>133. When several signals can be transmitted at once, it is called ______transmission. ______</p><p>134. The wired or wireless means of connecting to the internet is called a(n) ______connection. ______</p><p>2-24 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>135. A device that sends and receives data over telephone lines to and from computers is called a(n) ______. ______</p><p>136. The device that connects a personal computer to a cable-TV system that offers an internet connection is called a(n) ______. ______</p><p>137. A space station that transmits radio waves from earth-based stations is called a ______. ______</p><p>138. The radio waves transmitted from a communications satellite are called ______. ______</p><p>139. Data is transmitted in characters or collections of ______. ______</p><p>140. The minimum speed needed for visiting websites with graphics is ______. ______</p><p>141. The speed of a modem that is 28,800 bps can be expressed as ______Kbps. ______</p><p>2-25 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace 142. One Gbps is approximately 1 ______bits per second. ______</p><p>2-26 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>143. Downloading is the transmission of data from a(n) ______computer to a ______computer. ______</p><p>144. Transmitting data from a local PC to a website being constructed by a user can be termed as a(n) ______. ______</p><p>145. A modem that uses telephone lines to transmit data generally uses a(n) ______connection. ______</p><p>146. Communications satellites transmit data at a rate of 512–1500 ______. ______</p><p>147. The internet service provider's (ISP's) local access point for a particular area is its ______. ______</p><p>148. The internet's high-speed, high-capacity communication lines are the ______. ______</p><p>149. A collection of modems and other equipment in a local area is called a ______. ______</p><p>2-27 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>150. When two modems connect to each other at a single ISP location, the process is called ______. ______</p><p>151. Every computer on the internet has a(n) ______address. ______</p><p>152. A set of rules that computers must follow to transmit data electronically is called ______. ______</p><p>153. The protocol that enables all computers to use data transmitted on the internet is called ______. ______</p><p>154. To send data over the internet, TCP/IP breaks data into smaller blocks called ______. ______</p><p>155. The group established to regulate internet domain names is ______. ______</p><p>156. The ______database returns the name and address of any domain name entered. ______</p><p>2-28 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>157. The ______.is the organizational home for groups responsible for internet infrastructure standards. ______</p><p>158. To avoid making their customers pay long-distance phone charges to connect, ISPs provide each customer with a ______. ______</p><p>159. Internet ______form the equivalent of an interstate highway system. ______</p><p>160. An IP address consists of four sets of numbers between ______and ______. ______</p><p>161. An IP address consists of four sets of numbers separated by ______. ______</p><p>162. Each time a user connects to an ISP, the ISP will assign the computer a new IP address for that session called a ______address. ______</p><p>163. ISPs that don't run their own backbones connect to an internet backbone through a ______. ______</p><p>2-29 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>164. Network access points (NAPs) are owned by a ______, a large communications company. ______</p><p>165. To facilitate more efficient routing of data back and forth in the internet, by providing more backbone access locations, ______were introduced. ______</p><p>166. The ______part in TCP/IP is used to send data packets across the internet to their final destination. ______</p><p>167. In TCP/IP, the ______part is used to reassemble the packets in the correct order. ______</p><p>168. Incoming mail is usually stored on an ISP's server called a ______. ______</p><p>169. Outgoing mail is sent to a ______server. ______</p><p>170. A location on the internet is called a ______. ______</p><p>2-30 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace 171. In an email address, the first section, called the ______identifies who is at the address. ______</p><p>2-31 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>172. The second section of an email address, located after the "@" symbol, which tells the location and type of address, is called the ______. ______</p><p>173. The user name and domain name in an email address are linked by the ______character. ______</p><p>174. With ______, any user on a given mail system can send a message and have it pop up instantly on anyone's screen who is logged on to the system. ______</p><p>175. An automatic mailing list server that sends email to subscribers who regularly participate in discussion topics is called ______. ______</p><p>176. Appropriate online behavior can also be called ______. ______</p><p>177. Writing online messages that uses derogatory, obscene, or inappropriate language is called ______. ______</p><p>178. Keyboard-produced pictorial representations of expressions are called ______. ______</p><p>2-32 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>179. Instant organizers that sort mail on the basis of the name of the sender, and put particular emails into one folder, are called ______. ______</p><p>180. Unsolicited email, or junk mail, is called ______. ______</p><p>181. The domain abbreviation for a military organization website is ______. ______</p><p>182. The domain abbreviation for an educational or research institution website is ______. ______</p><p>183. An internet network resources website would typically have a domain abbreviation like ______. ______</p><p>184. A .gov domain abbreviation would indicate that the website is a ______site. ______</p><p>185. Viruses can ride along with emails as ______files. ______</p><p>2-33 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace 186. ______is the forgery of an email name so that the message appears to have originated from someone or somewhere other than the actual source. ______</p><p>2-34 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>187. Use of all-capital letters on the internet is akin to ______. ______</p><p>188. ______are a form of online advertising in which, when you visit certain websites, a new window opens to display advertisement. ______</p><p>189. Information available on the internet can be accessed using software called a(n) ______. ______</p><p>190. Documents scattered across many internet sites are directly linked with ______. ______</p><p>191. Sets of instructions that are used in HTML to specify document structure and formatting are called ______. ______</p><p>192. A computer with a domain name is called a ______. ______</p><p>193. The welcome page that identifies the website and contains links to other pages at the site is called a ______. ______</p><p>2-35 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace 194. A string of characters that points to a specific piece of information anywhere on the web is called a ______. ______</p><p>2-36 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>195. Little circles located in front of various options are called ______. ______</p><p>196. Little text files left on the hard disk by some websites visited by the user are called ______. ______</p><p>197. An independently controllable section of a web page is called a ______. ______</p><p>198. The subject word or words of the topic one wishes to search for on the web is called a ______. ______</p><p>199. The software used to search for a topic with the help of a keyword provided by the user is called a ______. ______</p><p>200. Small Java programs that can be quickly downloaded and run by most browsers are called ______. ______</p><p>201. Applets are written in a programming language called ______. ______</p><p>2-37 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>202. The rapid sequencing of still images to create the appearance of motion is called ______. ______</p><p>203. The process of transferring data in a continuous flow such that the file can be viewed even before the end of the file is sent is called ______. ______</p><p>204. The technology that causes software to automatically download information to a computer is called ______. ______</p><p>205. Webcasting companies are also called ______. ______</p><p>206. Using the net to make phone calls, either one to one or for audioconferencing, is called ______. ______</p><p>207. FTP files can be downloaded using either a web browser or a special ______program. ______</p><p>208. A worldwide public network of servers that can be accessed through the internet is called ______. ______</p><p>2-38 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>209. A program included with most browsers that allows access to newsgroups is called a ______. ______</p><p>210. ______can record each character you type and transmit their information to someone else on the internet, making it possible for strangers to learn your passwords and other information. ______</p><p>211. Participants have a typed "chat" while online at the same time, using ______. ______</p><p>212. Blogs are short for ______. ______</p><p>213. Conducting business activities online is called ______. ______</p><p>214. Goods, such as music, that can be downloaded directly from the retailer's site are called ______. ______</p><p>215. Goods that can be viewed and priced online, but are then shipped to buyers by mail or any other physical mode, are called ______. ______</p><p>2-39 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>216. The electronic sales or exchange of goods and services directly between companies, cutting out intermediaries is called ______commerce. ______</p><p>217. ______intercept your legitimate search requests made to real search engines and return results from phony search services designed to send you to sites they run. ______</p><p>Essay Questions</p><p>218. What is the difference between baseband transmission and broadband transmission? </p><p>219. What is a T1 line? </p><p>220. What is the difference between download and upload? </p><p>2-40 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>221. State the principal disadvantage of using a telephone modem to connect to the internet? </p><p>222. State the advantages and disadvantages of using a digital subscriber line (DSL) service. </p><p>223. What are the three things needed to gain access to the internet? </p><p>224. List some means of internet connection? </p><p>2-41 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>225. What is an internet service provider (ISP)? </p><p>226. Briefly describe a point-of-presence or POP. </p><p>227. What is an IP address? </p><p>228. What is Transmission Control Protocol/Internet Protocol (TCP/IP)? </p><p>2-42 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>229. What is the Internet Corporation for Assigned Names and Numbers (ICANN)? </p><p>230. What's the difference between a keyword index type of search engine and a subject directory type of search engine? </p><p>231. List the drawbacks of instant messaging (IM). </p><p>232. Describe what an RSS newsreader is. </p><p>2-43 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>233. How can a user subscribe to a listserv? </p><p>234. List some rules of netiquette? </p><p>235. What is a web portal? </p><p>236. What are the four types of web search tools available? </p><p>2-44 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace</p><p>237. How would you distinguish spoofing, phishing, and pharming? </p><p>2-45 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>Multiple Choice Questions</p><p>1. (p. 52) An expression for how much data can be sent through a communications channel in a given amount of time is referred to as ______. A. connectivity B. dial-up C. bandwidth D. download</p><p>Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of time.</p><p>Difficulty: 1</p><p>2. (p. 52) Generally, a very high-speed internet connection is referred to as ______. A. broadband B. dial-up C. bandwidth D. upload</p><p>Broadband refers to a very high-speed internet connection.</p><p>Difficulty: 1</p><p>3. (p. 52) The wired or wireless means of connecting a computer to the internet is called a ______. A. broadband B. physical connection C. dial-up D. bandwidth</p><p>The wired or wireless means of connecting a computer to the internet is called a physical connection.</p><p>Difficulty: 1</p><p>2-46 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>4. (p. 52) Bps stands for ______. A. bytes per second B. bits per second C. bandwidth per second D. broadband per second</p><p>Bps stands for bits per second.</p><p>Difficulty: 1</p><p>5. (p. 53) Megabits per second are ______. A. 1 million bits per second B. 10,000 bits per second C. 1,000 bits per second D. 100 bits per second</p><p>Faster means of connection are measured in megabits per second, or Mbps 1 million bits per second.</p><p>Difficulty: 1</p><p>6. (p. 53) Gigabits per second are ______. A. 1 hundred bits per second B. 1 thousand bits per second C. 1 million bits per second D. 1 billion bits per second</p><p>1 Gbps is 1 billion bits per second.</p><p>Difficulty: 1</p><p>2-47 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>7. (p. 53) The transmission of data from a remote computer to a local computer is referred to as ______. A. upload B. download C. broadband D. bandwidth</p><p>Download is the transmission of data from a remote computer to a local computer.</p><p>Difficulty: 1</p><p>8. (p. 53) The transmission of data from a local computer to a remote computer is called ______. A. upload B. download C. broadband D. bandwidth</p><p>Upload is the transmission of data from a local computer to a remote computer.</p><p>Difficulty: 1</p><p>9. (p. 55) What consists of hardware and software and allows voice, video, and data to be communicated over traditional copper-wire telephone lines? A. ISDN B. cable modem C. communications satellite D. bandwidth</p><p>ISDN sends digital signals over POTS (plain old telephone system) lines.</p><p>Difficulty: 1</p><p>2-48 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>10. (p. 55) The internet connection that uses regular phone lines to transmit data in megabits per second is ______. A. T1 line B. cable modem C. DSL line D. communications satellite</p><p>DSL (digital subscriber line) uses regular phone lines, a DSL modem, and special technology to transmit data in megabits per second.</p><p>Difficulty: 1</p><p>11. (p. 56) Which traditional trunk line carries 24 normal telephone circuits and has a transmission rate of 1.5 Mbps? A. T1 line B. cable modem C. DSL line D. communications satellite</p><p>Generally, T1 lines are leased by corporate, government, and academic sites.</p><p>Difficulty: 1</p><p>12. (p. 56) What connects a personal computer to a cable-TV system that offers an internet connection? A. T1 line B. cable modem C. DSL line D. communications satellite</p><p>Like a DSL connection, a cable modem is always on.</p><p>Difficulty: 1</p><p>2-49 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>13. (p. 57) A space station that transmits radio waves called microwaves from earth-based stations is called a ______. A. T1 line B. cable modem C. DSL line D. communications satellite</p><p>Communications satellite transmits radio waves called microwaves from earth-based stations.</p><p>Difficulty: 1</p><p>14. (p. 56) The method of going online that requires the user to be within 3.3 miles of a phone company central switching office is ______. A. dial-up modem B. DSL C. T1 line D. satellite</p><p>One big drawback to DSL is that one has to live within 3.3 miles of a phone company central switching office, because the access speed and reliability degrade with distance.</p><p>Difficulty: 2</p><p>15. (p. 56) The line most commonly used by corporate, government, and academic sites is ______. A. DSL B. T1 line C. satellite D. ISDN</p><p>Generally, T1 lines are leased by corporate, government, and academic sites.</p><p>Difficulty: 2</p><p>2-50 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>16. (p. 55, 56) Which of the following is NOT an advantage of DSL? A. fast download B. connection always on C. consistent transmission rate D. universal availability</p><p>DSL is not universally available.</p><p>Difficulty: 3</p><p>17. (p. 56) Which of the following is NOT an advantage of a T1 line? A. affordability B. high speed transmission C. 24 separate circuits of 64 kbps each D. supports many users</p><p>T1 lines have very expensive installation and monthly costs.</p><p>Difficulty: 3</p><p>18. (p. 53) Which of the following is NOT an example of a download? A. Saving pictures from the internet to your hard drive. B. Storing a map for your vacation from the internet to your hard drive. C. Saving a presentation to a CD. D. Saving a program from an internet site to your hard drive.</p><p>Saving a presentation to a CD is not an example of a download.</p><p>Difficulty: 1</p><p>2-51 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>19. (p. 53) Which of the following is NOT an example of an upload? A. Sending a photograph as an email attachment. B. Saving your favorite music videos from a music website to your hard drive. C. Sending a spreadsheet as an email attachment. D. Submitting a term paper to an instructor online.</p><p>Saving music videos would be downloading, not uploading.</p><p>Difficulty: 1</p><p>20. (p. 60) Using a user name and password, the ISP will allow the user to connect or ______. A. log on B. download C. upload D. log out</p><p>Using a user name and password allows the user to make a connection to the remote computer.</p><p>Difficulty: 1</p><p>21. (p. 58) ISP stands for ______. A. internet select provider B. internet service provider C. internet serial provider D. internet service pusher</p><p>ISP stands for internet service provider.</p><p>Difficulty: 1</p><p>2-52 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>22. (p. 76) A search engine that allows you to search several search engines simultaneously is called a ______. A. megasearch engine. B. hypersearch engine. C. metasearch engine. D. none of these.</p><p>A metasearch engine allows you to search several search engines simultaneously.</p><p>Difficulty: 1</p><p>23. (p. 90) An automatic email mailing list of people who regularly participate in discussion topics are called ______. A. attachments B. instant messaging C. listserv D. spam</p><p>Difficulty: 1</p><p>24. (p. 85, 86) If you were emailing a term paper and wanted to maintain its formatting, it would be sent as a(n) ______. A. regular email B. instant message C. listserv message D. attachment</p><p>Attachments are files sent along with email. This allows for the attachments to retain formatting.</p><p>Difficulty: 2</p><p>2-53 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>25. (p. 67, 68) The .gov, .com, .net, and .edu extensions are examples of ______. A. emoticons B. FAQs C. top-level domains D. URLs</p><p>The top-level domain is a three-letter extension that describes the domain type.</p><p>Difficulty: 2</p><p>26. (p. 86) Any user on a given email system can send a message and have it pop up instantly on the screen of anyone else logged onto that system using ______. A. attachments B. instant messaging C. list-serves D. spam</p><p>The instant messaging service is popularly also known as</p><p>Difficulty: 3</p><p>27. (p. 91) Which of the following is NOT an example of good netiquette? A. Consult the frequently asked questions (FAQs). B. Don't SHOUT. C. Don't send large file attachments, unless requested. D. When replying, send the entire original message for reference.</p><p>When replying, quote only the relevant section to save the recipient the effort of wading through lots of text to find the reference.</p><p>Difficulty: 3</p><p>2-54 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>28. (p. 91) Which of the following is NOT an example of flaming? A. a lie B. an ethnic joke C. profanity D. a sexist comment</p><p>As long as the lie does not include derogatory, obscene, or inappropriate language, it is not flaming.</p><p>Difficulty: 2</p><p>29. (p. 100) In terms of privacy, email is like ______. A. a sealed letter B. an insured package C. a postcard D. a notarized document</p><p>Anyone can pick up and read a postcard, and chances are any number of people can read an email.</p><p>Difficulty: 2</p><p>30. (p. 100) An uninvited email solicitation to participate in a money-making scheme is an example of ______. A. flaming B. spam C. netiquette D. list-serve</p><p>Spam is unsolicited junk email.</p><p>Difficulty: 2</p><p>2-55 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>31. (p. 90) If you wish to be part of an online discussions on a favorite topic of interest, you would subscribe to a(n) ______. A. instant message service B. listserv C. spam tracking D. online group</p><p>List-serves by definition provide this service.</p><p>Difficulty: 2</p><p>32. (p. 69) Connections to other documents or web pages that contain related information are called ______links. A. web portal B. multimedia C. URL D. hypertext</p><p>Hypertext links are connections to other documents or web pages that contain related information; a word or phrase in one document becomes a connection to a document in a different place.</p><p>Difficulty: 1</p><p>33. (p. 68) The set of special instructions that are used to specify document structure, formatting, and links to other multimedia documents is called ______. A. HTML B. hypertext C. multimedia D. web portal</p><p>HTML stands for HyperText Markup Language.</p><p>Difficulty: 1</p><p>2-56 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>34. (p. 66) A computer with a domain name is called a ______. A. web page B. website C. home D. web portal</p><p>The website is the location of a web domain name in a computer somewhere on the internet.</p><p>Difficulty: 1</p><p>35. (p. 66) The location on a particular computer on the World Wide Web that has a unique address is called a ______. A. home page B. web page C. website D. web portal</p><p>A computer with a domain name is called a website.</p><p>Difficulty: 1</p><p>36. (p. 60) A secret word or string of characters that allows you to log on to a remote computer is called a ______. A. password B. website C. URL D. UserID</p><p>The documents on a website that can include text, pictures, sound, and video are called web pages.</p><p>Difficulty: 1</p><p>2-57 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>37. (p. 66) The first page seen at a website is called the ______. A. community page B. home page C. browser D. protocol</p><p>The home page acts as the welcome page of the website; it identifies the website and contains links to other pages at the site.</p><p>Difficulty: 1</p><p>38. (p. 64) Software that enables users to find and access the various parts of the web is called a ______. A. home page B. website C. browser D. web page</p><p>Browsers are software for connecting to websites.</p><p>Difficulty: 1</p><p>39. (p. 66) A string of characters that points to a specific piece of information on the web is called the ______. A. URL B. HTTP C. protocol D. browser</p><p>URLs are web page addresses.</p><p>Difficulty: 1</p><p>2-58 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>40. (p. 67) A set of communications rules for exchanging information is called a ______. A. web browser B. HTML C. URL D. protocol</p><p>Protocols allow web browsers to communicate with web servers.</p><p>Difficulty: 1</p><p>41. (p. 67) The communications rules or protocols that allow browsers to connect with web servers is ______. A. HTTP B. HTML C. Java D. URL</p><p>Most browsers assume that all web addresses begin with http://.</p><p>Difficulty: 1</p><p>42. (p. 72) Little circles located in front of various options, which can be selected with the mouse, are called ______. A. hyperlinks B. radio buttons C. text boxes D. web portals</p><p>Selecting an option with the mouse places a dot in the corresponding circle.</p><p>Difficulty: 1</p><p>2-59 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>43. (p. 72) An independently controllable section of a web age is called a ______. A. hyperlink B. web site C. frame D. window</p><p>A web page designer can divide a page into separate frames, each with different features or options.</p><p>Difficulty: 1</p><p>44. (p. 73) Websites that group together in one convenient location popular features such as online shopping malls, email support, community forums, current news and weather are called ______. A. home pages B. browsers C. search engines D. web portals</p><p>Portals can be customized or personalized to fit your interests.</p><p>Difficulty: 1</p><p>45. (p. 75) Which of the following provides lists of several websites classified by topic? A. web portal B. subject directory C. metasearch engine D. browser</p><p>A subject directory provides lists of several categories of websites classified by topic.</p><p>Difficulty: 1</p><p>2-60 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>46. (p. 74) The subject word or words of the topic you wish to find while using a search engine is called the ______. A. directory B. URL C. keyword D. web portal</p><p>The results of your keyword search will be displayed in a summary of documents containing the keyword you typed.</p><p>Difficulty: 1</p><p>47. (p. 75) Which of the following can be used to locate information on the web by asking questions or using keywords? A. search engines B. home pages C. community pages D. URLs</p><p>When you use a keyword to search for a topic, you are using a piece of software known as a search engine.</p><p>Difficulty: 1</p><p>48. (p. 93) A program that adds a specific feature to a browser, allowing it to play or view certain files is a ______. A. script B. plug-in C. tag D. cookie</p><p>A program that adds a specific feature to a browser, allowing it to play or view certain files is called a plug-in.</p><p>Difficulty: 1</p><p>2-61 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>49. (p. 93) Plug-ins are also called ______. A. players B. viewers C. browsers D. Both A and B</p><p>A plug-in is also called a player or a viewer.</p><p>Difficulty: 1</p><p>50. (p. 93, 94) Small Java programs that can be quickly downloaded and run by most browsers are called ______. A. cookies B. applets C. active X D. hypertext</p><p>Java applets enhance web pages by playing music, displaying graphics and animation, and providing interactive games.</p><p>Difficulty: 1</p><p>51. (p. 94) The rapid sequencing of still images to create the appearance of motion is called a(n) ______. A. animation B. hyperlink C. script D. applet</p><p>Animation is used in online videogames as well as in moving banners displaying sports scores or stock prices.</p><p>Difficulty: 1</p><p>2-62 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>52. (p. 95) The technology in which software automatically downloads information to your computer is called ______. A. pull technology B. download C. push technology D. upload</p><p>Push technology allows software to automatically download information onto a computer.</p><p>Difficulty: 1</p><p>53. (p. 95) The technology in which customized text, audio, and video are sent automatically to the user on a regular basis is called ______. A. webcasting B. broadcasting C. surfing D. streaming</p><p>Webcasting is an example of push technology.</p><p>Difficulty: 1</p><p>54. (p. 88) A method whereby one can connect to a remote computer and transfer files to their own microcomputer's hard disk via TCP/IP over the internet is called ______. A. NetBEUI B. FTP C. ARAP D. SLIP</p><p>FTP is used to transfer files between computers with different operating systems.</p><p>Difficulty: 1</p><p>2-63 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>55. (p. 88) Which of the following is an FTP client program? A. Cute B. Put C. Grab D. FTP net</p><p>FTP client programs are special software that enables the download of FTP files.</p><p>Difficulty: 2</p><p>56. (p. 90) With ______, online participants have a typed discussion while staying online at the same time. A. real-time chat B. blogs C. telnet D. newsgroups</p><p>A chat is just like a telephone conversation except that messages are typed rather than spoken.</p><p>Difficulty: 1</p><p>57. (p. 96) Web logs made by various users that are also accessible to others are called ______. A. real-time chat B. blogs C. telnet D. applets</p><p>Web logs made by various users that are also accessible to others are called blogs.</p><p>Difficulty: 1</p><p>2-64 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>58. (p. 96) RSS newsreaders are also known as ______. A. attachments B. aggregators C. podcasters D. webcasts</p><p>RSS newsreaders, or RSS aggregators, are programs that scour the web, sometimes hourly or more frequently, and pull together in one place web from several websites.</p><p>Difficulty: 1</p><p>59. (p. 89) To access a newsgroup, a(n) ______program is needed. A. browser B. applet C. newsreader D. chat</p><p>To access a newsgroup, a newsreader program is needed.</p><p>Difficulty: 3</p><p>60. (p. 97) Which of the following is a person-to-person auction site? A. www.acponline.org B. www.ebay.com C. www.onSale.com D. www.thirdage.com www.ebay.com is a person-to-person auction site.</p><p>Difficulty: 2</p><p>2-65 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>61. (p. 97) Trading, banking, and e-money can be classified as ______. A. online finance B. online job-hunting C. online matchmaking D. online auctioning</p><p>Trading, banking, and e-money are examples of online finance.</p><p>Difficulty: 1</p><p>62. (p. 102) Forging of an email sender name so that the message appears to have originated from someone or somewhere other than the actual source is called ______. A. spoofing B. phishing C. pharming D. spyware</p><p>Spoofing is the forgery of an email sender name so that the message appears to have originated from someone or somewhere other than the actual source.</p><p>Difficulty: 1</p><p>63. (p. 103) Adware is also called ______. A. cookies B. spam C. pop-up generators D. None of these</p><p>Adware, or pop-up generators, is a kind of spyware that tracks web searching or online buying so that marketers can send you targeted and unsolicited pop-up and other ads.</p><p>Difficulty: 1</p><p>2-66 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>64. (p. 103) One type of spyware is ______. A. browser hijackers B. search hijackers C. key loggers D. All of these</p><p>Spyware includes adware, browser hijackers, search hijackers, and key loggers.</p><p>Difficulty: 2</p><p>True / False Questions</p><p>65. (p. 52) Bandwidth is an expression of how much data can be sent through a communications channel in a given amount of time. TRUE</p><p>Difficulty: 1</p><p>66. (p. 52) The wired or wireless means of connecting to the internet is called a physical connection. TRUE</p><p>Difficulty: 1</p><p>67. (p. 52) Bps stands for bandwidth per second. FALSE</p><p>Difficulty: 1</p><p>68. (p. 52) One kilobit per second is the same as 1 million bits per second. FALSE</p><p>Difficulty: 1</p><p>2-67 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>69. (p. 53) Mps stands for megabits per second. FALSE</p><p>Difficulty: 1</p><p>70. (p. 53) The term gigabit refers to 1 billion bits per second. TRUE</p><p>Difficulty: 1</p><p>71. (p. 53) Upload is the transmission of data from a remote computer to a local computer. FALSE</p><p>Difficulty: 1</p><p>72. (p. 53) Download is the transmission of data from a local computer to a remote computer. FALSE</p><p>Difficulty: 1</p><p>73. (p. 55) Integrated Services Digital Network (ISDN) consists of hardware and software that allows voice, video, and data to be communicated over traditional copper-wire telephone lines. TRUE</p><p>Difficulty: 1</p><p>74. (p. 55) Digital subscriber line (DSL) uses satellite technology to transmit data in megabits per second. FALSE</p><p>Difficulty: 1</p><p>2-68 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>75. (p. 56) A T1 line is essentially a traditional trunk line that carries 24 normal telephone circuits and has a transmission rate of 1.5 Mbps. TRUE</p><p>Difficulty: 1</p><p>76. (p. 56) A cable modem connects a personal computer to a cable-TV system that offers an internet connection. TRUE</p><p>Difficulty: 1</p><p>77. (p. 57) A communications satellite, a space station that transmits radio waves called microwaves from earth-based stations, can be used to retrieve information from the internet. TRUE</p><p>Difficulty: 1</p><p>78. (p. 52, 53) Kilobits per second are faster than megabits per second. FALSE</p><p>Difficulty: 1</p><p>79. (p. 53) The transmission of the latest pinball game off a subscriber network to a home computer is an example of an upload. FALSE</p><p>Difficulty: 2</p><p>2-69 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>80. (p. 53) The transmission of credit information to order something online is an example of an upload. TRUE</p><p>Difficulty: 2</p><p>81. (p. 56) A cable modem is an example of a physical connection to the internet. TRUE</p><p>Difficulty: 1</p><p>82. (p. 56) Cable modem lines are shared with other cable users in a particular area and can be slower during peak use periods. TRUE</p><p>Difficulty: 2</p><p>83. (p. 56) You can have a cable modem connection even if there is no cable television available in your area. FALSE</p><p>Difficulty: 3</p><p>84. (p. 55) The primary advantage of DSL is that it is always on and its transmission rate is consistent. TRUE</p><p>Difficulty: 3</p><p>2-70 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key 85. (p. 56) The primary advantage of a T1 line is its affordability. FALSE</p><p>Difficulty: 1</p><p>2-71 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>86. (p. 56) A DSL line can be installed anywhere as long as the user has a telephone line. FALSE</p><p>Difficulty: 3</p><p>87. (p. 58) ISP stands for internet service provider. TRUE</p><p>Difficulty: 1</p><p>88. (p. 58) An internet service provider (ISP) provides users with access to the internet. TRUE</p><p>Difficulty: 1</p><p>89. (p. 60) To log on or make connection to a remote computer, first enter the password and then the user name or user ID. FALSE</p><p>Difficulty: 2</p><p>90. (p. 67) A domain is simply a location on the internet. TRUE</p><p>Difficulty: 1</p><p>91. (p. 86) With instant messaging, any user on a given email system can send a message and have it pop up instantly on the screen of anyone else logged onto that system. TRUE</p><p>Difficulty: 1</p><p>2-72 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>92. (p. 90) A listserv is an automatic mailing list server that sends email to subscribers who regularly participate in discussion topics. TRUE</p><p>Difficulty: 1</p><p>93. (p. 91) Guides to appropriate online behavior are called netiquette. TRUE</p><p>Difficulty: 1</p><p>94. (p. 91) Most online groups post frequently asked questions (FAQs) that explain expected norms of online behavior for a particular group. TRUE</p><p>Difficulty: 1</p><p>95. (p. 100) Spamming is writing an online message that uses derogatory, obscene, or inappropriate language. FALSE</p><p>Difficulty: 1</p><p>96. (p. 91) Use of all-capital letters on the internet is considered appropriate online behavior. FALSE</p><p>Difficulty: 1</p><p>97. (p. 91) Emoticons are keyboard-produced pictorial representations of expressions. TRUE</p><p>Difficulty: 1</p><p>2-73 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>98. (p. 91) Flaming refers to unsolicited email in the form of advertising or chain letters. FALSE</p><p>Difficulty: 1</p><p>99. (p. 83) Some commonly used top-level domains are .net, .com, .gov, and .edu. TRUE</p><p>Difficulty: 2</p><p>100. (p. 86) Many viruses ride along with email attachments. TRUE</p><p>Difficulty: 3</p><p>101. (p. 86) Instant messaging can be used to post advertisements on computer screens. FALSE</p><p>Difficulty: 2</p><p>102. (p. 83) It is important to type email addresses exactly as they appear. TRUE</p><p>Difficulty: 2</p><p>103. (p. 85) Emails can be organized with instant organizers called routers to sort emails based on certain criteria, such as the sender's name or the mailing list. FALSE</p><p>Difficulty: 2</p><p>2-74 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>104. (p. 66) URL is the website's unique address. TRUE</p><p>Difficulty: 1</p><p>105. (p. 68) HTML is the set of special instructions that are used to specify document structure, formatting, and links to other documents. TRUE</p><p>Difficulty: 1</p><p>106. (p. 66) A website is the location of a web domain name in a computer somewhere on the internet. TRUE</p><p>Difficulty: 1</p><p>107. (p. 64) A browser is a document on the World Wide Web that can include text, pictures, sound, and video. FALSE</p><p>Difficulty: 1</p><p>108. (p. 66) The first page seen at a website is called the community page. FALSE</p><p>Difficulty: 1</p><p>2-75 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key 109. (p. 73) A portal is software that enables users to view web pages and to jump from one page to another. FALSE</p><p>Difficulty: 1</p><p>2-76 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>110. (p. 66) A URL is a string of characters that points to a specific piece of information on the web. TRUE</p><p>Difficulty: 1</p><p>111. (p. 67) HyperText Transfer Protocol or HTTP refers to the communications rules that allow browsers to connect with web servers. TRUE</p><p>Difficulty: 1</p><p>112. (p. 72) Radio buttons are little circles located in front of various options, selecting an option with the mouse places a dot in the corresponding circle. TRUE</p><p>Difficulty: 1</p><p>113. (p. 72) Scroll arrows, small up/down and left/right arrows, can be used to move the screen to see the rest of the web page. TRUE</p><p>Difficulty: 1</p><p>114. (p. 72) A frame is an independently controllable section of a web page. TRUE</p><p>Difficulty: 1</p><p>2-77 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>115. (p. 75) Search engines are websites that group together in one convenient location popular features such as search tools, email, electronic commerce, and discussion groups. FALSE</p><p>Difficulty: 1</p><p>116. (p. 75) A subject directory allows you to search for information by selecting lists of categories or topics. TRUE</p><p>Difficulty: 1</p><p>117. (p. 75) Search engines are programs that enable you to ask questions or use keywords to help locate information on the web. TRUE</p><p>Difficulty: 1</p><p>118. (p. 73) A web portal is a program that adds a specific feature to a browser, allowing it to play or view certain files. FALSE</p><p>Difficulty: 1</p><p>119. (p. 76) A metasearch engine allows you to search for information by typing one or more keywords, and the search engine then displays a list of web pages, or "hits," that contain those key words. FALSE</p><p>Difficulty: 1</p><p>2-78 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>120. (p. 93) Plug-ins are also called players and viewers. TRUE</p><p>Difficulty: 1</p><p>121. (p. 96) RSS newsreaders and RSS aggregators are the same thing. TRUE</p><p>Difficulty: 1</p><p>122. (p. 93, 94) Applets are small programs that can be quickly downloaded and run by most browsers. TRUE</p><p>Difficulty: 1</p><p>123. (p. 100) Spam consists of little text files left on your hard disk by some websites you visit. FALSE</p><p>Difficulty: 1</p><p>124. (p. 94) Applets are written in Java, a complex programming language that enables programmers to create animated and interactive web pages. TRUE</p><p>Difficulty: 1</p><p>125. (p. 94) Streaming video is the rapid sequencing of still images to create the appearance of motion, such as in a cartoon. FALSE</p><p>Difficulty: 1</p><p>2-79 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>126. (p. 102) In pharming, thieves implant malicious software on a victim's computer that redirects the user to an impostor web page even when the individual types the correct address into his or her browser. TRUE</p><p>Difficulty: 2</p><p>127. (p. 94) Streaming video is the process of transferring data in a continuous flow so a file can be viewed before the end of the file is sent. TRUE</p><p>Difficulty: 1</p><p>128. (p. 95) Streaming audio allows you to listen to a file while the data is still being downloaded to your computer. TRUE</p><p>Difficulty: 1</p><p>129. (p. 95) Pull technology automatically downloads information to your computer. FALSE</p><p>Difficulty: 1</p><p>130. (p. 95) Webcasting sends customized text, video, and audio automatically on a regular basis. TRUE</p><p>Difficulty: 1</p><p>2-80 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>131. (p. 92) Internet telephony is the method of using the internet to make a phone call, either one-to-one or for audio conferencing. TRUE</p><p>Difficulty: 1</p><p>Fill in the Blank Questions</p><p>132. (p. 52) The type of data transmission that allows only one signal at a time is called ______transmission. baseband</p><p>Difficulty: 2</p><p>133. (p. 52) When several signals can be transmitted at once, it is called ______transmission. broadband</p><p>Difficulty: 2</p><p>134. (p. 52) The wired or wireless means of connecting to the internet is called a(n) ______connection. physical</p><p>Difficulty: 2</p><p>135. (p. 53) A device that sends and receives data over telephone lines to and from computers is called a(n) ______. modem</p><p>Difficulty: 1</p><p>2-81 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>136. (p. 56) The device that connects a personal computer to a cable-TV system that offers an internet connection is called a(n) ______. cable modem</p><p>Difficulty: 1</p><p>137. (p. 57) A space station that transmits radio waves from earth-based stations is called a ______. communications satellite</p><p>Difficulty: 1</p><p>138. (p. 57) The radio waves transmitted from a communications satellite are called ______. microwaves</p><p>Difficulty: 1</p><p>139. (p. 52) Data is transmitted in characters or collections of ______. bits</p><p>Difficulty: 2</p><p>140. (p. 52) The minimum speed needed for visiting websites with graphics is ______. 28,800 bps</p><p>Difficulty: 2</p><p>2-82 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>141. (p. 52) The speed of a modem that is 28,800 bps can be expressed as ______Kbps. 28.8</p><p>Difficulty: 2</p><p>142. (p. 53) One Gbps is approximately 1 ______bits per second. billion</p><p>Difficulty: 2</p><p>143. (p. 53) Downloading is the transmission of data from a(n) ______computer to a ______computer. remote; local</p><p>Difficulty: 2</p><p>144. (p. 53) Transmitting data from a local PC to a website being constructed by a user can be termed as a(n) ______. upload</p><p>Difficulty: 2</p><p>145. (p. 53) A modem that uses telephone lines to transmit data generally uses a(n) ______connection. dial-up</p><p>Difficulty: 2</p><p>2-83 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>146. (p. 57) Communications satellites transmit data at a rate of 512–1500 ______. Kbps</p><p>Difficulty: 2</p><p>147. (p. 61) The internet service provider's (ISP's) local access point for a particular area is its ______. POP; point of presence</p><p>Difficulty: 1</p><p>148. (p. 62) The internet's high-speed, high-capacity communication lines are the ______. backbone</p><p>Difficulty: 1</p><p>149. (p. 61) A collection of modems and other equipment in a local area is called a ______. POP; point-of-presence</p><p>Difficulty: 1</p><p>150. (p. 62) When two modems connect to each other at a single ISP location, the process is called ______. handshaking</p><p>Difficulty: 2</p><p>2-84 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>151. (p. 63) Every computer on the internet has a(n) ______address. IP; Internet Protocol</p><p>Difficulty: 1</p><p>152. (p. 62) A set of rules that computers must follow to transmit data electronically is called ______. protocol</p><p>Difficulty: 1</p><p>153. (p. 62) The protocol that enables all computers to use data transmitted on the internet is called ______. TCP/IP; Transmission Control Protocol/Internet Protocol</p><p>Difficulty: 1</p><p>154. (p. 62) To send data over the internet, TCP/IP breaks data into smaller blocks called ______. packets</p><p>Difficulty: 1</p><p>155. (p. 63) The group established to regulate internet domain names is ______. ICANN; Internet Corporation for Assigned Names & Numbers</p><p>Difficulty: 1</p><p>2-85 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>156. (p. 64) The ______database returns the name and address of any domain name entered. Whosis</p><p>Difficulty: 3</p><p>157. (p. 63) The ______.is the organizational home for groups responsible for internet infrastructure standards. ISOC; Internet Society</p><p>Difficulty: 3</p><p>158. (p. 61) To avoid making their customers pay long-distance phone charges to connect, ISPs provide each customer with a ______. point of presence</p><p>Difficulty: 3</p><p>159. (p. 62) Internet ______form the equivalent of an interstate highway system. backbones</p><p>Difficulty: 2</p><p>160. (p. 63) An IP address consists of four sets of numbers between ______and ______. 0; 255</p><p>Difficulty: 3</p><p>2-86 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>161. (p. 63) An IP address consists of four sets of numbers separated by ______. decimals</p><p>Difficulty: 2</p><p>162. (p. 63) Each time a user connects to an ISP, the ISP will assign the computer a new IP address for that session called a ______address. dynamic IP</p><p>Difficulty: 3</p><p>163. (p. 61) ISPs that don't run their own backbones connect to an internet backbone through a ______. NAP; network access point</p><p>Difficulty: 2</p><p>164. (p. 61) Network access points (NAPs) are owned by a ______, a large communications company. NSP' network service provider</p><p>Difficulty: 2</p><p>165. (p. 62) To facilitate more efficient routing of data back and forth in the internet, by providing more backbone access locations, ______were introduced. PNAPs; Private/Peer NAPs; miniNAPs</p><p>Difficulty: 2</p><p>2-87 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>166. (p. 62) The ______part in TCP/IP is used to send data packets across the internet to their final destination. IP; Internet Protocol</p><p>Difficulty: 3</p><p>167. (p. 62, 63) In TCP/IP, the ______part is used to reassemble the packets in the correct order. TCP</p><p>Difficulty: 3</p><p>168. (p. 81) Incoming mail is usually stored on an ISP's server called a ______. mail server</p><p>Difficulty: 1</p><p>169. (p. 81) Outgoing mail is sent to a ______server. SMTP; Simple Mail Transfer Protocol</p><p>Difficulty: 2</p><p>170. (p. 67) A location on the internet is called a ______. domain</p><p>Difficulty: 1</p><p>2-88 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key 171. (p. 83) In an email address, the first section, called the ______identifies who is at the address. user name; user ID</p><p>Difficulty: 1</p><p>2-89 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>172. (p. 83) The second section of an email address, located after the "@" symbol, which tells the location and type of address, is called the ______. domain name</p><p>Difficulty: 1</p><p>173. (p. 83) The user name and domain name in an email address are linked by the ______character. @; at; at the rate</p><p>Difficulty: 1</p><p>174. (p. 86) With ______, any user on a given mail system can send a message and have it pop up instantly on anyone's screen who is logged on to the system. IM; instant messaging</p><p>Difficulty: 1</p><p>175. (p. 90) An automatic mailing list server that sends email to subscribers who regularly participate in discussion topics is called ______. listserv</p><p>Difficulty: 1</p><p>176. (p. 91) Appropriate online behavior can also be called ______. netiquette</p><p>Difficulty: 1</p><p>2-90 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>177. (p. 91) Writing online messages that uses derogatory, obscene, or inappropriate language is called ______. flaming</p><p>Difficulty: 1</p><p>178. (p. 91) Keyboard-produced pictorial representations of expressions are called ______. emoticons</p><p>Difficulty: 1</p><p>179. (p. 85) Instant organizers that sort mail on the basis of the name of the sender, and put particular emails into one folder, are called ______. filters</p><p>Difficulty: 2</p><p>180. (p. 100) Unsolicited email, or junk mail, is called ______. spam</p><p>Difficulty: 1</p><p>181. (p. 67) The domain abbreviation for a military organization website is ______. .mil</p><p>Difficulty: 2</p><p>2-91 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>182. (p. 67) The domain abbreviation for an educational or research institution website is ______. .edu</p><p>Difficulty: 1</p><p>183. (p. 67) An internet network resources website would typically have a domain abbreviation like ______. .net</p><p>Difficulty: 1</p><p>184. (p. 67) A .gov domain abbreviation would indicate that the website is a ______site. government; government agency; government bureau</p><p>Difficulty: 1</p><p>185. (p. 86) Viruses can ride along with emails as ______files. attached; attachment</p><p>Difficulty: 2</p><p>186. (p. 102) ______is the forgery of an email name so that the message appears to have originated from someone or somewhere other than the actual source. Spoofing</p><p>Difficulty: 1</p><p>2-92 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>187. (p. 91) Use of all-capital letters on the internet is akin to ______. shouting</p><p>Difficulty: 1</p><p>188. (p. 103) ______are a form of online advertising in which, when you visit certain websites, a new window opens to display advertisement. Pop-up ads</p><p>Difficulty: 1</p><p>189. (p. 64) Information available on the internet can be accessed using software called a(n) ______. browser</p><p>Difficulty: 1</p><p>190. (p. 68) Documents scattered across many internet sites are directly linked with ______. hyperlinks; hypertext links</p><p>Difficulty: 2</p><p>191. (p. 68) Sets of instructions that are used in HTML to specify document structure and formatting are called ______. tags; markups</p><p>Difficulty: 2</p><p>2-93 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>192. (p. 66) A computer with a domain name is called a ______. site; website</p><p>Difficulty: 3</p><p>193. (p. 66) The welcome page that identifies the website and contains links to other pages at the site is called a ______. home page</p><p>Difficulty: 1</p><p>194. (p. 66) A string of characters that points to a specific piece of information anywhere on the web is called a ______. URL; Uniform Resource Locator</p><p>Difficulty: 1</p><p>195. (p. 72) Little circles located in front of various options are called ______. radio buttons</p><p>Difficulty: 1</p><p>196. (p. 102) Little text files left on the hard disk by some websites visited by the user are called ______. cookies</p><p>Difficulty: 1</p><p>2-94 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>197. (p. 72) An independently controllable section of a web page is called a ______. frame</p><p>Difficulty: 1</p><p>198. (p. 74) The subject word or words of the topic one wishes to search for on the web is called a ______. keyword</p><p>Difficulty: 1</p><p>199. (p. 75) The software used to search for a topic with the help of a keyword provided by the user is called a ______. search engine</p><p>Difficulty: 1</p><p>200. (p. 93, 94) Small Java programs that can be quickly downloaded and run by most browsers are called ______. applets</p><p>Difficulty: 1</p><p>201. (p. 94) Applets are written in a programming language called ______. Java</p><p>Difficulty: 1</p><p>2-95 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>202. (p. 94) The rapid sequencing of still images to create the appearance of motion is called ______. animation</p><p>Difficulty: 1</p><p>203. (p. 94) The process of transferring data in a continuous flow such that the file can be viewed even before the end of the file is sent is called ______. streaming video</p><p>Difficulty: 1</p><p>204. (p. 95) The technology that causes software to automatically download information to a computer is called ______. push technology</p><p>Difficulty: 1</p><p>205. (p. 95) Webcasting companies are also called ______. subscription services</p><p>Difficulty: 2</p><p>206. (p. 92) Using the net to make phone calls, either one to one or for audioconferencing, is called ______. internet telephony</p><p>Difficulty: 1</p><p>2-96 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>207. (p. 88) FTP files can be downloaded using either a web browser or a special ______program. FTP client</p><p>Difficulty: 3</p><p>208. (p. 89) A worldwide public network of servers that can be accessed through the internet is called ______. Usenet</p><p>Difficulty: 1</p><p>209. (p. 89) A program included with most browsers that allows access to newsgroups is called a ______. newsreader</p><p>Difficulty: 1</p><p>210. (p. 104) ______can record each character you type and transmit their information to someone else on the internet, making it possible for strangers to learn your passwords and other information. Key loggers</p><p>Difficulty: 1</p><p>211. (p. 90) Participants have a typed "chat" while online at the same time, using ______. RTC; real-time chat</p><p>Difficulty: 1</p><p>2-97 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>212. (p. 96) Blogs are short for ______. web logs</p><p>Difficulty: 1</p><p>213. (p. 97) Conducting business activities online is called ______. electronic commerce; e-commerce</p><p>Difficulty: 1</p><p>214. (p. 97) Goods, such as music, that can be downloaded directly from the retailer's site are called ______. soft goods</p><p>Difficulty: 2</p><p>215. (p. 97) Goods that can be viewed and priced online, but are then shipped to buyers by mail or any other physical mode, are called ______. hard goods</p><p>Difficulty: 2</p><p>216. (p. 97) The electronic sales or exchange of goods and services directly between companies, cutting out intermediaries is called ______commerce. B2B; business-to-business</p><p>Difficulty: 1</p><p>2-98 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>217. (p. 103) ______intercept your legitimate search requests made to real search engines and return results from phony search services designed to send you to sites they run. Search hijackers</p><p>Difficulty: 2</p><p>Essay Questions</p><p>218. (p. 52) What is the difference between baseband transmission and broadband transmission? </p><p>Baseband transmission allows data transmission at only one signal at a time, whereas in broadband transmission, several signals can be transmitted at once.</p><p>Difficulty: 1</p><p>219. (p. 56) What is a T1 line? </p><p>A T1 line is a trunk line that carries 24 normal telephone circuits and has a transmission rate of 1.5 Mbps. They are generally leased by corporate, government, and academic sites.</p><p>Difficulty: 1</p><p>220. (p. 53) What is the difference between download and upload? </p><p>Download is the transmission of data from a remote computer to a local computer, as from a website to the PC. Upload is the transmission of data from a local computer to a remote computer, as from the local PC to a website that is, say, being constructed.</p><p>Difficulty: 1</p><p>2-99 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>221. (p. 54) State the principal disadvantage of using a telephone modem to connect to the internet? </p><p>One disadvantage of a telephone modem is that while a user is online, the user won't use that phone line to make voice calls unless special equipment is installed. In addition, people who try to call the user while the modem is being used will get a busy signal.</p><p>Difficulty: 2</p><p>222. (p. 55, 56) State the advantages and disadvantages of using a digital subscriber line (DSL) service. </p><p>An advantage of using DSL is that it is always on and, unlike cable, its transmission rate is relatively consistent. Also, one can talk on the phone and send data at the same time. The disadvantage is that one has to live within 3.3 miles of a phone company central switching office, because the access speed and reliability degrade with distance.</p><p>Difficulty: 2</p><p>223. (p. 50) What are the three things needed to gain access to the internet? </p><p>To access the internet, the user would need three things: a. An access device, such as a personal computer with a modem b. A physical connection, such as a telephone line c. An internet access provider</p><p>Difficulty: 2</p><p>2-100 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>224. (p. 52) List some means of internet connection? </p><p>Some of the principal means of internet connection are: a. telephone (dialup) modem b. high-speed phone lines–ISDN, DSL, and T1 c. cable modem d. wireless–satellite</p><p>Difficulty: 3</p><p>225. (p. 58) What is an internet service provider (ISP)? </p><p>An internet service provider (ISP) is a local, regional, or national organization that provides access to the internet.</p><p>Difficulty: 1</p><p>226. (p. 61) Briefly describe a point-of-presence or POP. </p><p>A point-of-presence (POP) is a collection of modems and other equipment in a local area. The user, when subscribing to an ISP, is given local telephone numbers for the ISP's POP. So, when the user connects to the ISP, the POP acts as a local gateway to the ISP's network.</p><p>Difficulty: 3</p><p>227. (p. 63) What is an IP address? </p><p>An IP address uniquely identifies every computer and device connected to the internet.</p><p>Difficulty: 3</p><p>2-101 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>228. (p. 62) What is Transmission Control Protocol/Internet Protocol (TCP/IP)? </p><p>The protocol that enables all computers to use data transmitted on the internet is called Transmission Control Protocol/Internet Protocol, or TCP/IP.</p><p>Difficulty: 2</p><p>229. (p. 63, 64) What is the Internet Corporation for Assigned Names and Numbers (ICANN)? </p><p>The Internet Corporation for Assigned Names and Numbers (ICANN) is a global, private- sector, nonprofit corporation that was established to regulate human-friendly internet domain names–those addresses ending with .com, .org, .net, and so on, that overlie IP addresses and identify the website type.</p><p>Difficulty: 2</p><p>230. (p. 75) What's the difference between a keyword index type of search engine and a subject directory type of search engine? </p><p>A keyword index allows you to search for information by typing one or more keywords, and the search engine then displays a list of web pages, or "hits," that contain those key words. A subject directory allows you to search for information by selecting lists of categories or topics, such as "Business and Commerce" or "Art and Humanities."</p><p>Difficulty: 2</p><p>231. (p. 88) List the drawbacks of instant messaging (IM). </p><p>Some of the drawbacks of IM are as follows: a. Lack of privacy b. Lack of common standards c. Wastage of time when there is work to be done</p><p>Difficulty: 2</p><p>2-102 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>232. (p. 96) Describe what an RSS newsreader is. </p><p>An RSS newsreader is a program that scours the web, sometimes hourly or more frequently, and pulls together in one place web "feeds" from several websites.</p><p>Difficulty: 2</p><p>233. (p. 90) How can a user subscribe to a listserv? </p><p>To subscribe to a listserv, the user must send an email to the list-server moderator and ask to become a member. After this is done, the user will automatically receive email messages from anyone who responds to the server.</p><p>Difficulty: 3</p><p>234. (p. 91, 92) List some rules of netiquette? </p><p>Some rules of netiquette are as follows: a. Consult Frequently Asked Questions or FAQs. b. Avoid flaming. c. Avoid use of all-capital letters unless they are required for emphasis. d. Be careful with jokes. e. Avoid sloppiness, but avoid criticizing others' sloppiness. f. Don't send huge file attachments, unless requested. g. When replying, quote only the relevant portion. h. Don't "overforward" or automatically forward emails to other people without checking if the contents are true and appropriate.</p><p>Difficulty: 3</p><p>2-103 Chapter 002 THE INTERNET & THE WORLD WIDE WEB Exploring Cyberspace Key</p><p>235. (p. 73) What is a web portal? </p><p>A web portal is a type of gateway website that offers a broad array of resources and services, online shopping malls, email support, current news and weather, stock quotes, travel information, and links to other popular subject categories.</p><p>Difficulty: 1</p><p>236. (p. 75, 76) What are the four types of web search tools available? </p><p>The four types of web search tools are: a. Keyword indexes b. Subject directories c. Metasearch engines d. Specialized search engines</p><p>Difficulty: 2</p><p>237. (p. 102) How would you distinguish spoofing, phishing, and pharming? </p><p>Spoofing is the forgery of an email sender name so that the message appears to have originated from someone or somewhere other than the actual source. Phishing is (1) the sending of a forged email that (2) directs recipients to a replica of an existing web page, both of which pretend to belong to a legitimate company. The purpose of the fraudulent sender is to "phish" for, or entice, people to share, their personal, financial, or password data. In pharming, thieves implant malicious software on a victim's computer that redirects the user to an impostor web page even when the individual types the correct address into his or her browser.</p><p>Difficulty: 3</p><p>2-104</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    104 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us