978-0077507985 Test Bank Chapter 10

subject Type Homework Help
subject Pages 9
subject Words 2809
subject Authors Stanley Baran

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 10: The Internet and Social Media
Chapter 10: The Internet and Social Media
Test Questions
1. The global network of interconnected computers that communicate freely and share and
exchange information is called the
a. Information Superhighway.
b. protocol.
c. World Wide Web.
d. Internet.
2. The “originator of the computer” was _____________, an Englishman, who in 1836 produced
designs for a “computer” that could conduct algebraic computations using stored memory and
punch cards for input and output.
a. John Napier
b. Blaise Pascal
c. Gottfried Leibnitz
d. Charles Babbage
3. The first electronic digital computer, _____________, was developed by the British during
World War II to help break the German’s secret code.
a. ENIAC
b. UNIVAC
c. Colossus
d. ARPA
4. Computers that reduce information to a code made up of the digits 1 and 0 for storage and
manipulation use a _____________ code.
a. abacus
b. binary
c. plenary
d. primary
5. The first “full-service” electronic computer, _____________, was based on the work of Iowa
State University’s John V. Atanasoff and introduced by scientists John Mauchly and John
Presper Eckert of the University of Pennsylvania in 1946.
a. ENIAC
b. UNIVAC
c. Colossus
d. ARPA
page-pf2
Baran: Introduction to Mass Communication: Media Literacy and Culture, 9e TB-10 | 2
© 2017 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or
distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in
whole or part.
6. The first successful commercial computer, used by the Census Bureau in 1951, was
a. ENIAC.
b. UNIVAC.
c. Colossus.
d. ARPANET.
7. In 1962, _____________ of the Rand Corporation proposed a packet-switching system that
would allow the military to maintain command over its missiles and planes in the event of a
nuclear attack. It is the basis of what we know today as the Internet.
a. John Mauchly
b. Paul Allen
c. Paul Baran
d. Steve Jobs
8. Computers that link individual personal computer users to the Internet are called
a. terminals.
b. mainframes.
c. ARPANET.
d. hosts.
9. The development of the _____________with its small size, absence of heat, and low
costmade personal computers possible.
a. terminal
b. microcomputer
c. vacuum tube
d. semiconductor
10. The Apple II personal computer was developed by
a. Steve Jobs and Stephen Wozniak.
b. Bill Gates and Paul Allen.
c. Paul Baran and Paul Allen.
d. Steven Bellovin and Vinton Cerf.
11. The “network of networks,” consisting of LANs (Local Area Networks—networks connecting
two or more computers, usually within the same building) and WANs (Wide Area Networks
networks that connect several LANs in different locations), is called the
a. provider.
b. World Wide Web.
c. Internet.
d. host.
page-pf3
Baran: Introduction to Mass Communication: Media Literacy and Culture, 9e TB-10 | 3
© 2017 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or
distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in
whole or part.
12. Websites that function as online communities of users are called
a. listservs.
b. VoIP.
c. Usenet.
d. social networking sites.
13. A _____________ is a personal Web page that comments on the news and provides links to
stories that back up the commentary with evidence.
a. dialog
b. blog
c. usenet
d. listserv
14. The most well known and arguably the most effective ______ Web site is MoveOn.org.
a. commercial
b. spam-free
c. blogging
d. activist
15. The availability of trustworthy _____________coding and decodingtechnologies that
make online use of credit and bank card numbers, addresses, social security numbers, and
other sensitive information safer for both seller and buyer has fueled interest in the Internet
as a place to do business.
a. Web-lock
b. encryption
c. Net filter
d. scanner
16. Proponents of Internet freedom see its _____________ as providing protection for unpopular
expression; proponents of greater Internet control see it as the Internet’s greatest danger.
a. anonymity
b. reach
c. breadth
d. low cost
17. According to long-time New Yorker columnist A. J. Liebling, freedom of the press is
guaranteed to
a. all.
b. the media literate.
c. those who own the presses.
d. citizens in a democracy.
page-pf4
Baran: Introduction to Mass Communication: Media Literacy and Culture, 9e TB-10 | 4
whole or part.
18. The dual-factor model of social media use claims our engagement with social media is
motivated by the need to belong and the need
a. for self-esteem.
b. for self-presentation.
c. to staying current.
d. to not miss out.
19. The idea that we use social media to communicate our actual identities is the
a. dual factor model of social media use.
b. fear of missing out.
c. idealized virtual identity hypothesis.
d. extended real-life hypothesis.
20. The idea that social media users tend to show idealized characteristics that don’t represent
who they are is
a. extended real-life hypothesis..
b. idealized virtual identity hypothesis.
c. fear of missing out.
d. dual factor model of social media use.
21. People who have never known a world without the Internet are known as
a. baby boomers.
b. Generation X.
c. Generation Y.
d. digital natives.
22. Computer stations connected to large, centralized mainframes or minicomputers are called
a. personal computers.
b. terminals.
c. microcomputers.
d. LANs.
23. The software that tells a computer how to work is called its
a. microprocessor.
b. MITS.
c. WAN.
d. operating system.
24. Sensing that the future of computing was in personal computers and that computers’ power
would reside not in their size but in the software that ran them, _____________ dropped out
of Harvard University in 1975 and, with his friend _____________, founded Microsoft
Corporation.
page-pf5
Chapter 10: The Internet and Social Media
Baran: Introduction to Mass Communication: Media Literacy and Culture, 9e TB-10 | 5
whole or part.
a. Steve Jobs; Stephen Wozniak
b. Bill Gates; Paul Allen
c. Paul Baran; Paul Allen
d. Steven Bellovin; Vinton Cerf
25. The heart of the Web lies in the _____________ (common communication rules and
languages) that define its use.
a. software
b. operating systems
c. protocols
d. search engines
26. Telephone over the Internet in which voice messages are transmitted in digital packets is
a. IM.
b. Web telephony.
c. routing.
d. VoIP.
27. Each file or directory on the Internet (that is, on the host computer connected to the Internet)
is designated by an address, called its
a. Packet Locating Number (PLN).
b. Uniform Resource Locator (URL).
c. Local Area Network (LAN).
d. Internet Information Locator (IIL).
28. Finding information on the Web is easy thanks to _____________, which provide on-screen
menus, making navigation of the Web as simple as pointing and clicking.
a. software links
b. operating systems
c. protocols
d. search engines
referred to as
a. commodification of information.
b. fair use.
c. blogs.
d. listservs.
30. _____ is identifying code placed on a computer by a website without permission or
notification.
a. A cybersnoop
b. Spyware
page-pf6
Chapter 10: The Internet and Social Media
Baran: Introduction to Mass Communication: Media Literacy and Culture, 9e TB-10 | 6
whole or part.
c. A link
d. Censorware
31. Privacy in the global village has two important dimensions: the use of personal information
people willingly give online and the protection of
a. communication people wish to keep private.
b. credit card information.
c. important business/customer data.
d. hard discs from snooping software.
32. _____________ is the massive collection, distillation, and distribution of consumer data
willingly given by consumers.
a. Direct marketing
b. Authorized data sale
c. Dataveillance
d. Clipping
33. The electronic tracking of the choices people make when they are surfing the Net is their
a. click stream.
b. MUD.
c. cybertrail.
d. cookie.
34. The widening disparity between the communication technology haves and have-nots is
referred to as
a. flat rate billing.
b. the information gap.
c. the information slow lane.
d. the technology gap.
35. The lack of technological access among people of color, the poor, the disabled, and those
living in rural areas is called the
a. information gap.
b. digital divide.
c. information slow lane.
d. technology gap.
36. _____________ is a form of technologically imposed censorship, in which people without the
new communication technology have diminished access to the information it makes available.
a. Cyberdemocracy
b. The information gap
c. The Information slow lane
page-pf7
Chapter 10: The Internet and Social Media
Baran: Introduction to Mass Communication: Media Literacy and Culture, 9e TB-10 | 7
whole or part.
d. The technology gap
37. The intensity of the online world can sometimes trigger ____________ in teens.
a. Facebook depression.
b. social isolation.
c. Facebook envy.
d. fear of missing out.
38. _____________, the requirement that all ISPs
allow the free and equal flow of all web traffic, is at the center of the fight over SOPA (Stop
Online Piracy Act) and the PIPA (Protect Intellectual Property Act).
a. Network neutrality
b. Opt-out
c. Opt-in
d. Consumer Privacy Bill of Rights
39. Resenting the positive posts of friends on social media is known as
a. social isolation.
b. peer pressure.
c. Facebook envy.
d. Facebook depression
40. In 2012, the Internet industry and federal government responded to users’ fear for their
personal privacy with ________________,voluntary guidelines asking sites to place a “do
not track” button on their Web pages.
a. network neutrality
b. the Protect Intellectual Property Act
c. the Stop Online Piracy Act
d. the Consumer Privacy Bill of Rights
41. Facebook depression is not recognized by the American Academy of Pediatrics.
42. The “originator of the computer” is considered to be German Gottfried Leibnitz.
43. The first successful commercial computer, used in the 1950s by the Census Bureau, was
page-pf8
Chapter 10: The Internet and Social Media
UNIVAC.
44. Personal computer, microcomputer, and terminal are all synonymous.
45. Tim Berners-Lee developed the hypertext transfer protocol (HTTP).
46. Software programs loaded onto users’ computers and used to download and view Web files
are known as browsers.
47. The massive collection and distillation of consumer data is referred to as dataveillance.
48. When people go online, the click streams they leave provide them with privacy protection.
49. Although some critics see the Internet as possibly harmful to the democratic process, more
traditional mediaradio, for examplewere universally hailed as bringing more people into
the political process.
50. There is little doubt that municipal Wi-Fi is a fundamental right that should be available to all
citizens.
51. Fear of missing out (FOMO) is also known as Facebook envy.
52. It is illegal for social media Web pages to collect personal information.
53. What does it mean to say that media are extensions of our bodies? Give an example.
page-pf9
Baran: Introduction to Mass Communication: Media Literacy and Culture, 9e TB-10 | 9
© 2017 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or
distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in
whole or part.
54. What is the significance of Colossus, ENIAC, and UNIVAC?
55. What are the Five Internet Freedoms? Briefly describe each.
56. Distinguish between LANs and WANs.
57. People using the World Wide Web encounter hosts, URLs, browsers, search engines, and
home pages. Define each of these terms.
58. How has the introduction of new computer technologies changed the issue of privacy in mass
communication?
59. Why is it inaccurate to speak of the Internet’s audience?
60. What are the primary arguments for and against concern over the digital divide?
61. How do the technology gap and information gap differ? How are they related?
62. What does A. J. Liebling mean when he says that freedom of the press is guaranteed only to
those who own the presses?
page-pfa

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.