Chapter 2 The Internet: Gateway to a World of Resources Assignment Sheet 2 Multiple Choice



Download 113.84 Kb.
Date29.07.2017
Size113.84 Kb.
#24762
Chapter 2 - The Internet: Gateway to a World of Resources Assignment Sheet 2
Multiple Choice

Identify the choice that best completes the statement or answers the question.
____ 1. A survey of Kansas State University students showed that the students view an average of _____ web pages each year.

a.

500

b.

1,000

c.

2,300

d.

1,000,000

____ 2. Microblogging sites such as _____ are pushing the boundaries of citizen

journalism as participants often send out updates on current news stories

before news agencies do.



a.

Twitter

b.

Facebook

c.

MySpace

d.

YouTube

____ 3. The Internet is described in Chapter 2 as the world’s largest



a.

computer network.

b.

supercomputer.

c.

electronic device.

d.

calculator.

____ 4. The hardware of the Internet is made up of a collection of



a.

servers.

b.

routers.

c.

switches.

d.

All of the above

____ 5. As stated in Chapter 2, if the ____ is a pathway for information, the ____ is the content that travels along that path.



a.

Internet; Browser

b.

Web; Internet

c.

Internet; Web

d.

Web; Deep Web

____ 6. ____ marks a change from people simply reading information online to people interacting by both reading and writing online content.



a.

The Deep Web

b.

Web 1.0

c.

The Semantic Web

d.

Web 2.0

____ 7. Which phase of online usage is marked by collaborative content that is connected in meaningful ways?



a.

Web 1.0

b.

Web 2.0

c.

Web 3.0

d.

Future Web

____ 8.


Google Squared, pictured here, exemplifies the kind of content that will be offered by

a.

Web 1.0.

b.

Web 2.0.

c.

Web 3.0.

d.

Web 4.0.

____ 9. Which continent has the highest number of Internet users?



a.

Europe

b.

North America

c.

Asia

d.

Africa

____ 10.

What type of Internet connection is illustrated here?

a.

mobile broadband stick

b.

DSL

c.

dial-up

d.

cable modem

____ 11. Wi-Fi uses ____ to connect your computer to a “hotspot.”



a.

radio signals

b.

a regular phone line

c.

a coaxial cable

d.

infrared beams

____ 12. ___ are essentially portable modems about the size of a USB flash drive.



a.

Routers

b.

Wireless access points

c.

Mobile broadband sticks

d.

Switches

____ 13. Which of the following types of Internet connection is slower than the others and ties up your phone line?



a.

Wi-Fi

b.

dial-up

c.

WiMAX

d.

DSL

____ 14. A cable modem connects your computer to the Internet via a



a.

coxial cable.

b.

twisted-pair cable.

c.

wireless router.

d.

3G connection.

____ 15. In addition to an email account, an ISP typically offers its customers _____ in exchange for a monthly subscription.



a.

virus scans

b.

a firewall

c.

spam management

d.

All of the above

____ 16. Web pages are typically created using some variation of this language.



a.

Cobol

b.

C++

c.

Visual Basic

d.

HTML

____ 17. Which of these four options for connecting to the Internet is not considered broadband?



a.

DSL

b.

cable

c.

dial-up

d.

satellite

____ 18. Which broadband option may be your only choice if you live in a remote area?



a.

satellite

b.

fiber optic cable

c.

cable

d.

DSL

____ 19. Which of the following represents an accurate example of an IP address?



a.

225.73.110.102

b.

www.google.com

c.

612.555.1212

d.

http://www.google.com

____ 20. This organization keeps track of IP addresses around the world.



a.

ICAAN

b.

ITAA

c.

URL

d.

DRAM

____ 21. The text-based address for a web page is referred to as the



a.

ISP.

b.

URL.

c.

IP address.

d.

domain.

____ 22. A URL contains several text parts separated by



a.

a colon (:).

b.

slashes (/).

c.

dots (.).

d.

All of the above

____ 23.

In the URL pictured here, which component is known as the top-level domain?

a.

http://

b.

www

c.

.com

d.

emcp

____ 24. In a URL, what element is just to the left of the top-level domain?



a.

the IP address

b.

the protocol

c.

“www”

d.

the domain name

____ 25. A website’s starting page is called the



a.

front page.

b.

URL.

c.

index.

d.

home page.

____ 26.

In this image, which of the lettered indicators points to the home page link?

a.

A

b.

B

c.

C

d.

D

____ 27. A _____ catalogs and indexes web pages for you.



a.

browser

b.

blog

c.

C2C website

d.

search engine

____ 28. Search engines use search text that is made up of



a.

hyperlinks.

b.

hypertext.

c.

keywords.

d.

All of the above

____ 29. Using quotes (“ ”) around words in your search text causes the search engine to



a.

use the exact words in the exact order.

b.

use any of the enclosed words in any order.

c.

exclude the words in the search.

d.

search the deep Web for the enclosed words.

____ 30. When this character is used in a search text, the search engine uses it as a placeholder for any possible word.



a.

asterisk (*)

b.

at sign (@)

c.

percent sign (%)

d.

exclamation point (!)

____ 31. Mapquest, Expedia, and BizRate are examples of



a.

specialized search sites.

b.

peer-to-peer file sharing programs.

c.

metasearch engines.

d.

standard search engines.

____ 32. In order to experience some multimedia components of a web page, you may be required to install a



a.

specialized router.

b.

high-performance graphics card.

c.

firewall.

d.

plug-in or player.

____ 33. What plug-in or player is required to read and print PDF files?



a.

Adobe Flash Player

b.

Shockwave

c.

Quicktime

d.

Adobe Reader

____ 34. In the URL http://www.emcp.com, what is the second-level domain?



a.

.emcp

b.

http://

c.

www

d.

.com

____ 35. What does a domain name resolver do?



a.

It looks up and corrects misspelled second-level domain names.

b.

It gets routing information for a requested URL and returns it in the form of an IP address.

c.

It checks to see if a second-level domain name is already in use.

d.

All of the above

____ 36. When gauging the accuracy of online content, what are the three Ws?



a.

Where, When, and Why

b.

Who, What, and Why

c.

When, Why, and Who

d.

Who, What, and When

____ 37. According to an organization cited in Chapter 2, _____ refers to “the creations of the mind; inventions, literary and artistic works; symbols, names, images, and designs used in commerce.”



a.

copyright

b.

art

c.

content

d.

intellectual property

____ 38. By what other name is the invisible Web known?



a.

virtual Web

b.

deep Web

c.

Web 3.0

d.

Web 2.0

____ 39. Most search engines cannot find data in the deep Web because the data are



a.

stored in databases.

b.

encrypted.

c.

too complex.

d.

stored in servers on other continents.

____ 40. Which of the following is not one of the three e-commerce business models discussed in Chapter 2?



a.

C2B

b.

B2B

c.

B2C

d.

C2C

____ 41. Amazon.com and Zappos.com are examples of which type of business model?



a.

C2C

b.

B2C

c.

B2B

d.

All of the above

____ 42. Which of the following is a popular example of a C2C e-commerce site?



a.

Facebook

b.

JustHost.com

c.

Amazon.com

d.

eBay

____ 43. Which of the following is not cited as a way for consumers to protect themselves in e-commerce transactions?



a.

pay by a third-party payment service

b.

make sure the URL begins with “https”

c.

choose a trusted shopping site

d.

complete your transaction outside the auction whenever possible

____ 44. When buying online, keep in mind that paying with _____ protects you from theft, while paying with _____ does not.



a.

PayPal or check; credit card or debit card

b.

check or debit card; PayPal or credit card

c.

check or credit card; debit card or PayPal

d.

PayPal or credit card; check or debit card

____ 45. Working people send an average of _____ emails a day a receive _____ emails a day.



a.

36; 74

b.

10; 25

c.

55; 110

d.

110; 175

____ 46. The first email was sent between two computers in



a.

1987.

b.

1971.

c.

1962.

d.

1959.

____ 47. _____ is an example of an email program, while _____ is an example of an email client.



a.

Gmail; Outlook

b.

Apple’s Mail; Outlook

c.

Hotmail; Gmail

d.

Outlook; Apple’s Mail

____ 48. An email client typically uses one of these two protocols to retrieve email.



a.

IMAP or SMTP

b.

SMTP or MIME

c.

MIME or POP3

d.

POP3 or IMAP

____ 49.

The application shown here is used for taking advantage of ___ technology.

a.

URL

b.

FTP

c.

VoIP

d.

HTTPS

____ 50. Which of the following is listed as a downside of VoIP?



a.

It may not connect to the 911 emergency network.

b.

It may not work if your power goes out.

c.

You may not be able to get directory assistance.

d.

All of the above


Download 113.84 Kb.

Share with your friends:




The database is protected by copyright ©ininet.org 2024
send message

    Main page