Chapter 1 Which of the following high-speed Internet connections

subject Type Homework Help
subject Pages 9
subject Words 2197
subject Authors Misty E. Vermaat

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Name:
Class:
Date:
1. Which of the following entails having the knowledge and understanding of computers, mobile devices, the Internet, and
related technologies?
a.
digital literacy
b.
digital intimacy
c.
digital legitimacy
d.
digital intelligence
2. In which gesture do you quickly touch and release one finger two times?
a.
double-pinch
b.
double-stretch
c.
double-tap
d.
double-hold
3. Which of the following conveys meaning and is useful to users?
a.
data
b.
information
c.
input
d.
output
4. In which of the following mouse operations do you move the mouse until the pointer is positioned on the item of
choice?
a.
point
b.
click
c.
right-click
d.
drag
5. What is the definition of a website?
a.
a collection of related webpages
b.
the location from which a webpage originates
c.
the source of a webpage
d.
an author of a webpage
page-pf2
Name:
Class:
Date:
6. Which of the following is NOT one of the widely used browsers?
a.
Firefox
b.
Safari
c.
Windows Explorer
d.
Google Chrome
7. Which of the following is NOT an example of malware?
a.
adware
b.
vaporware
c.
rootkits
d.
zombies
8. Which of the following is a specification that enables web content to be distributed to subscribers?
a.
VoIP
b.
GPS
c.
RSS
d.
FTP
9. Which kind of device is hardware capable of transferring items from computers and devices to transmission media and
vice versa?
a.
transfer device
b.
communications device
c.
integrated device
d.
embedded device
10. What term is used to illustrate the gap between those with and those without access to technology?
a.
digital divide
b.
mobile stratification
c.
technology caste system
d.
none of the above
11. Which of the following category of users works on a computer while away from a main office, home office, or
page-pf3
Name:
Class:
Date:
school?
a.
SOHO
b.
power
c.
mobile
d.
key
12. Which kind of user requires the capabilities of a powerful computer?
a.
SOHO
b.
power
c.
mobile
d.
key
13. Which of the following oversees research for the Internet?
a.
ARPANET
b.
NSFnet
c.
NASA
d.
World Wide Web Consortium (W3C)
14. Which of the following high-speed Internet connections use an antenna on a house or business to communicate with a
tower location via radio signals?
a.
satellite
b.
FTTP
c.
fixed wireless
d.
DSL
15. Which of the following allows access to high-speed Internet services through the cable television network?
a.
cable transceiver
b.
cable modem
c.
cable receiver
d.
cable dialer
16. What separates the components of a domain name?
a.
spaces
b.
apostrophes
page-pf4
Name:
Class:
Date:
c.
commas
d.
periods
17. What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites?
a.
spoofing
b.
pop-up
c.
proxy
d.
phishing
18. Which of the following consists of a worldwide collection of electronic documents?
a.
blogworld
b.
web
c.
Internet
d.
both b and c
19. A search engine displays a list of webpage names that contain the search text. What is the term for that list?
a.
keywords
b.
icons
c.
hits
d.
pulls
20. Which of the following is a website that offers a variety of Internet services from a single, convenient location?
a.
portal
b.
keyframe
c.
extraction
d.
powerpoint
21. Which of the following is the development and maintenance of webpages?
a.
web distribution
b.
web publishing
c.
web convergence
d.
e-commerce
page-pf5
Name:
Class:
Date:
22. Which of the following terms refers to any application that combines text with graphics, animation, audio, video,
and/or virtual reality?
a.
portal
b.
web app
c.
multimedia
d.
Java applet
23. Which of the following occurs when one consumer sells directly to another consumer, such as in an online auction?
a.
consumer-to-business (C2B) e-commerce
b.
business-to-consumer (B2C) e-commerce
c.
consumer-to-consumer (C2C) e-commerce
d.
business-to-business (B2B) e-commerce
24. What is the term for the transmission of messages and files via a computer network?
a.
email
b.
DSL
c.
FTP
d.
C2C
25. Which of the following terms includes speakers, webcams, and printers as examples?
a.
peripherals
b.
integrated systems
c.
ports
d.
embedded computers
26. Which of the following is an example of an operating system?
a.
C++
b.
C#
c.
Windows
d.
Visual Basic
page-pf6
Name:
Class:
Date:
27. Which of the following is not a part of a server?
a.
processor
b.
network connections
c.
storage
d.
bundled software
28. What term describes a POS terminal that is able to update inventory at geographically separate locations?
a.
Internet capable
b.
POS mobility
c.
digital encapsulation
d.
ATM facility
29. Which of the following kinds of computing refers to an environment of servers that house and provide access to
resources users access through the Internet?
a.
disperse
b.
cloud
c.
digital
d.
liberated
30. Which of the following is an example of a mobile device?
a.
supercomputers
b.
installed media modems
c.
smartphones
d.
servers
31. Which of the following is held with both hands and controls the movement and actions of players or objects in video
games or computer games?
a.
joystick
b.
dance pad
c.
gamepad
d.
balance board
page-pf7
Name:
Class:
Date:
32. Which of the following is a special-purpose computer that functions as a component in a larger product?
a.
hard-coded computer
b.
embedded computer
c.
soft computer
d.
indexed computer
33. Which of the following is the process of initiating contact between two Bluetooth devices and allowing them to
communicate with each other?
a.
streamlining
b.
discovering
c.
docking
d.
pairing
34. Which of the following kinds of UPS always runs off a battery?
a.
offline UPS
b.
UPS utility
c.
standby UPS
d.
online UPS
35. Which of the following occurs when the electrical supply or voltage drops, often defined as more than five percent
below the normal volts?
a.
undervoltage
b.
power surge
c.
overvoltage
d.
online surge
36. Which of the following is NOT a likely complaint of someone who spends his or her workday using the computer?
a.
lower back pain
b.
emotional fatigue
c.
high blood pressure
d.
muscle fatigue
page-pf8
Name:
Class:
Date:
37. What kind of software consists of programs designed to make users more productive and/or assist them with personal
tasks?
a.
application
b.
utility
c.
operating
d.
system
38. Windows, Mac OS, and which other operating system constitute three popular personal computer operating systems?
a.
DOS
b.
Linux
c.
Amazon
d.
Internet Explorer
39. You compose a new song and you now have exclusive rights to sell your song. Of which of the following is this an
example?
a.
trademarking
b.
intellectual publication
c.
private domain
d.
copyright
40. Which kind of software can be distributed by anyone to others at no cost?
a.
Freeware
b.
Public-domain
c.
Shareware
d.
Open source software
41. What is the term for a square-shaped coded graphic that corresponds to a web address or other information?
a.
ISBN code
b.
bar code
c.
USPS code
d.
QR code
page-pf9
Name:
Class:
Date:
42. Which of the following kinds of software provides a means for sharing, distributing, and searching through documents
by converting them into a format that can be viewed by any user?
a.
tax preparation
b.
business
c.
document management
d.
accounting
43. What kind of software helps users of all skill levels create web pages that include graphics, video, audio, animation,
and other special effects?
a.
website management
b.
website authoring
c.
website publishing
d.
website editing
44. You have a variety of helpful apps on your smartphone, including ones that allow you to remotely start your car or
calculate a restaurant tip. In which of the following categories do these apps fall?
a.
lifestyle
b.
entertainment
c.
assistive
d.
convenience
45. What is the real-time exchange of messages, files, audio, and/or video with another online user called?
a.
text messaging
b.
chat
c.
mobile inter-communication exchange
d.
instant messaging
46. Which of the following tools searches for and removes unnecessary files?
a.
disk defragmenter
b.
uninstaller
c.
disk cleanup
d.
file manager
page-pfa
Name:
Class:
Date:
47. Which of the following kinds of file utilities shrink the size of a file(s)?
a.
unit
b.
file compression
c.
matrix
d.
conversion
48. What is the term for a specific named location on your hard disk that is used for holding files?
a.
file manager
b.
safe spot
c.
folder
d.
index
49. Which of the following is any event or action that could cause a loss of or damage to computer hardware, software,
data, information, or processing capability?
a.
digital security risk
b.
information liability
c.
technical terrorism
d.
network compromise
50. Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following, or programs that act
without a user’s knowledge and deliberately alter the computer’s operations?
a.
malware
b.
untrusted sources
c.
threats
d.
cybermalls
51. Into which of the following kinds of ports do external fingerprint readers plug?
a.
parallel
b.
MIDI
c.
USB
d.
serial
page-pfb
Name:
Class:
Date:
52. Which kind of license is a legal agreement that allows multiple users to access the software on the server
simultaneously?
a.
site
b.
network
c.
distributed
d.
multipurpose
53. Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a
volume discount?
a.
network
b.
distributed
c.
site
d.
multipurpose
54. To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
a.
re-securing
b.
decryption
c.
assessment
d.
digitization
55. Which of the following is an authorized person or company that issues and verifies digital certificates?
a.
certificate authority provider
b.
certificate agency
c.
certificate office
d.
certificate bureau
56. Which of the following statements is not a safeguard against the failure of hardware?
a.
surge protectors
b.
fault-tolerant computers
c.
device-tracking apps
d.
UPS
57. What term means to make a copy of a file?
page-pfc
Name:
Class:
Date:
a.
restore
b.
back up
c.
concatenate
d.
decipher
58. Which law states that it is not illegal to intercept or access an electronic communication made through an electronic
communication system that is configured so that such electronic communication is readily accessible to the general
public?
a.
CAN-SPAM Act
b.
Computer Abuse Amendments Act
c.
COPPA
d.
Electronic Communication Privacy Act
59. Which term refers to the rights to which creators are entitled for their work?
a.
community property
b.
intellectual property
c.
creative property
d.
ethical property
60. Websites use which of the following to keep track of items in a user’s shopping cart?
a.
session cookie
b.
zombie
c.
adware
d.
shopping bot

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.