Chapter 2 - The Internet: Gateway to a World of Resources Assignment Sheet 2
Multiple Choice
Identify the choice that best completes the statement or answers the question.
____ 1. A survey of Kansas State University students showed that the students view an average of _____ web pages each year.
a.
|
500
|
b.
|
1,000
|
c.
|
2,300
|
d.
|
1,000,000
|
____ 2. Microblogging sites such as _____ are pushing the boundaries of citizen
journalism as participants often send out updates on current news stories
before news agencies do.
a.
|
Twitter
|
b.
|
Facebook
|
c.
|
MySpace
|
d.
|
YouTube
|
____ 3. The Internet is described in Chapter 2 as the world’s largest
a.
|
computer network.
|
b.
|
supercomputer.
|
c.
|
electronic device.
|
d.
|
calculator.
|
____ 4. The hardware of the Internet is made up of a collection of
a.
|
servers.
|
b.
|
routers.
|
c.
|
switches.
|
d.
|
All of the above
|
____ 5. As stated in Chapter 2, if the ____ is a pathway for information, the ____ is the content that travels along that path.
a.
|
Internet; Browser
|
b.
|
Web; Internet
|
c.
|
Internet; Web
|
d.
|
Web; Deep Web
|
____ 6. ____ marks a change from people simply reading information online to people interacting by both reading and writing online content.
a.
|
The Deep Web
|
b.
|
Web 1.0
|
c.
|
The Semantic Web
|
d.
|
Web 2.0
|
____ 7. Which phase of online usage is marked by collaborative content that is connected in meaningful ways?
a.
|
Web 1.0
|
b.
|
Web 2.0
|
c.
|
Web 3.0
|
d.
|
Future Web
|
____ 8.
Google Squared, pictured here, exemplifies the kind of content that will be offered by
a.
|
Web 1.0.
|
b.
|
Web 2.0.
|
c.
|
Web 3.0.
|
d.
|
Web 4.0.
|
____ 9. Which continent has the highest number of Internet users?
a.
|
Europe
|
b.
|
North America
|
c.
|
Asia
|
d.
|
Africa
|
____ 10.
What type of Internet connection is illustrated here?
a.
|
mobile broadband stick
|
b.
|
DSL
|
c.
|
dial-up
|
d.
|
cable modem
|
____ 11. Wi-Fi uses ____ to connect your computer to a “hotspot.”
a.
|
radio signals
|
b.
|
a regular phone line
|
c.
|
a coaxial cable
|
d.
|
infrared beams
|
____ 12. ___ are essentially portable modems about the size of a USB flash drive.
a.
|
Routers
|
b.
|
Wireless access points
|
c.
|
Mobile broadband sticks
|
d.
|
Switches
|
____ 13. Which of the following types of Internet connection is slower than the others and ties up your phone line?
a.
|
Wi-Fi
|
b.
|
dial-up
|
c.
|
WiMAX
|
d.
|
DSL
|
____ 14. A cable modem connects your computer to the Internet via a
a.
|
coxial cable.
|
b.
|
twisted-pair cable.
|
c.
|
wireless router.
|
d.
|
3G connection.
|
____ 15. In addition to an email account, an ISP typically offers its customers _____ in exchange for a monthly subscription.
a.
|
virus scans
|
b.
|
a firewall
|
c.
|
spam management
|
d.
|
All of the above
|
____ 16. Web pages are typically created using some variation of this language.
a.
|
Cobol
|
b.
|
C++
|
c.
|
Visual Basic
|
d.
|
HTML
|
____ 17. Which of these four options for connecting to the Internet is not considered broadband?
a.
|
DSL
|
b.
|
cable
|
c.
|
dial-up
|
d.
|
satellite
|
____ 18. Which broadband option may be your only choice if you live in a remote area?
____ 19. Which of the following represents an accurate example of an IP address?
a.
|
225.73.110.102
|
b.
|
www.google.com
|
c.
|
612.555.1212
|
d.
|
http://www.google.com
|
____ 20. This organization keeps track of IP addresses around the world.
a.
|
ICAAN
|
b.
|
ITAA
|
c.
|
URL
|
d.
|
DRAM
|
____ 21. The text-based address for a web page is referred to as the
a.
|
ISP.
|
b.
|
URL.
|
c.
|
IP address.
|
d.
|
domain.
|
____ 22. A URL contains several text parts separated by
a.
|
a colon (:).
|
b.
|
slashes (/).
|
c.
|
dots (.).
|
d.
|
All of the above
|
____ 23.
In the URL pictured here, which component is known as the top-level domain?
a.
|
http://
|
b.
|
www
|
c.
|
.com
|
d.
|
emcp
|
____ 24. In a URL, what element is just to the left of the top-level domain?
a.
|
the IP address
|
b.
|
the protocol
|
c.
|
“www”
|
d.
|
the domain name
|
____ 25. A website’s starting page is called the
a.
|
front page.
|
b.
|
URL.
|
c.
|
index.
|
d.
|
home page.
|
____ 26.
In this image, which of the lettered indicators points to the home page link?
____ 27. A _____ catalogs and indexes web pages for you.
a.
|
browser
|
b.
|
blog
|
c.
|
C2C website
|
d.
|
search engine
|
____ 28. Search engines use search text that is made up of
a.
|
hyperlinks.
|
b.
|
hypertext.
|
c.
|
keywords.
|
d.
|
All of the above
|
____ 29. Using quotes (“ ”) around words in your search text causes the search engine to
a.
|
use the exact words in the exact order.
|
b.
|
use any of the enclosed words in any order.
|
c.
|
exclude the words in the search.
|
d.
|
search the deep Web for the enclosed words.
|
____ 30. When this character is used in a search text, the search engine uses it as a placeholder for any possible word.
a.
|
asterisk (*)
|
b.
|
at sign (@)
|
c.
|
percent sign (%)
|
d.
|
exclamation point (!)
|
____ 31. Mapquest, Expedia, and BizRate are examples of
a.
|
specialized search sites.
|
b.
|
peer-to-peer file sharing programs.
|
c.
|
metasearch engines.
|
d.
|
standard search engines.
|
____ 32. In order to experience some multimedia components of a web page, you may be required to install a
a.
|
specialized router.
|
b.
|
high-performance graphics card.
|
c.
|
firewall.
|
d.
|
plug-in or player.
|
____ 33. What plug-in or player is required to read and print PDF files?
a.
|
Adobe Flash Player
|
b.
|
Shockwave
|
c.
|
Quicktime
|
d.
|
Adobe Reader
|
____ 34. In the URL http://www.emcp.com, what is the second-level domain?
a.
|
.emcp
|
b.
|
http://
|
c.
|
www
|
d.
|
.com
|
____ 35. What does a domain name resolver do?
a.
|
It looks up and corrects misspelled second-level domain names.
|
b.
|
It gets routing information for a requested URL and returns it in the form of an IP address.
|
c.
|
It checks to see if a second-level domain name is already in use.
|
d.
|
All of the above
|
____ 36. When gauging the accuracy of online content, what are the three Ws?
a.
|
Where, When, and Why
|
b.
|
Who, What, and Why
|
c.
|
When, Why, and Who
|
d.
|
Who, What, and When
|
____ 37. According to an organization cited in Chapter 2, _____ refers to “the creations of the mind; inventions, literary and artistic works; symbols, names, images, and designs used in commerce.”
a.
|
copyright
|
b.
|
art
|
c.
|
content
|
d.
|
intellectual property
|
____ 38. By what other name is the invisible Web known?
a.
|
virtual Web
|
b.
|
deep Web
|
c.
|
Web 3.0
|
d.
|
Web 2.0
|
____ 39. Most search engines cannot find data in the deep Web because the data are
a.
|
stored in databases.
|
b.
|
encrypted.
|
c.
|
too complex.
|
d.
|
stored in servers on other continents.
|
____ 40. Which of the following is not one of the three e-commerce business models discussed in Chapter 2?
a.
|
C2B
|
b.
|
B2B
|
c.
|
B2C
|
d.
|
C2C
|
____ 41. Amazon.com and Zappos.com are examples of which type of business model?
a.
|
C2C
|
b.
|
B2C
|
c.
|
B2B
|
d.
|
All of the above
|
____ 42. Which of the following is a popular example of a C2C e-commerce site?
a.
|
Facebook
|
b.
|
JustHost.com
|
c.
|
Amazon.com
|
d.
|
eBay
|
____ 43. Which of the following is not cited as a way for consumers to protect themselves in e-commerce transactions?
a.
|
pay by a third-party payment service
|
b.
|
make sure the URL begins with “https”
|
c.
|
choose a trusted shopping site
|
d.
|
complete your transaction outside the auction whenever possible
|
____ 44. When buying online, keep in mind that paying with _____ protects you from theft, while paying with _____ does not.
a.
|
PayPal or check; credit card or debit card
|
b.
|
check or debit card; PayPal or credit card
|
c.
|
check or credit card; debit card or PayPal
|
d.
|
PayPal or credit card; check or debit card
|
____ 45. Working people send an average of _____ emails a day a receive _____ emails a day.
a.
|
36; 74
|
b.
|
10; 25
|
c.
|
55; 110
|
d.
|
110; 175
|
____ 46. The first email was sent between two computers in
a.
|
1987.
|
b.
|
1971.
|
c.
|
1962.
|
d.
|
1959.
|
____ 47. _____ is an example of an email program, while _____ is an example of an email client.
a.
|
Gmail; Outlook
|
b.
|
Apple’s Mail; Outlook
|
c.
|
Hotmail; Gmail
|
d.
|
Outlook; Apple’s Mail
|
____ 48. An email client typically uses one of these two protocols to retrieve email.
a.
|
IMAP or SMTP
|
b.
|
SMTP or MIME
|
c.
|
MIME or POP3
|
d.
|
POP3 or IMAP
|
____ 49.
The application shown here is used for taking advantage of ___ technology.
a.
|
URL
|
b.
|
FTP
|
c.
|
VoIP
|
d.
|
HTTPS
|
____ 50. Which of the following is listed as a downside of VoIP?
a.
|
It may not connect to the 911 emergency network.
|
b.
|
It may not work if your power goes out.
|
c.
|
You may not be able to get directory assistance.
|
d.
|
All of the above
|
Share with your friends: |