Using IT Chapter 2
Using IT Chapter 2
1 billion
1 thousand
1 million
1 hundred
1 trillion
1. A location on the internet is called a
a.
b.
c.
d.
e.
Network
User ID
Domain
Browser
Web
1. In the email address [email protected], Kim_Lee is the
a.
b.
c.
d.
e.
Domain
URL
Site
User ID
Location
1. Which of the following is not one of the four components of a URL?
a.
b.
c.
d.
e.
Web protocol
Name of the web server
Name of the browser
Name of the directory on the web server
Name of the file within the directory
1. Which of the following is the fastest method of data transmission?
a. ISDN
b. DSL
c. Modem
d. TI line
e. Cable modem
1. Which of the following is not netiquette rule?
a.
b.
c.
d.
e.
Consults FAQ
Flame only when necessary
Dont shout
Avoid huge file attachment
Avoid sloppiness and errors
1. Which protocol is used to retrieve email messages from the server to your
computer?
a.
b.
c.
d.
HTTP
SMTP
POP3
POP
1. Who owns internet?
a. Microsoft
b. IBM
c. Apple
d. U.S.government
e. No one owns the internet; the components that make up the internet
are owned and
shared by thousands of public and private entities.
1. Each time you connect to your ISP, it will assign your computer a new
address called a(n)
a.
b.
c.
d.
e.
Domain
IP address
Plug in
POP
URL
1. ISPs that dont run their own backbones connects to an internet backbones
through a
a.
b.
c.
d.
e.
NAP
Web portal
Web browser
URL
TCP/IP
TCP/IP
IE
HTTP
SMTP
1. The sending of phony email that pretends to be from a credit card company
or bank, luring you to website that attempts to obtain confidential information
from you is called
a. Spoofing
b. Phishing
c. Spamming
d. Keylogging
e. Cookies
True / false Questions
1. POP3 is used for sending email, and SMTP is used for retrieving email.(T)
2. A dial up modem is an ISP.(F)
3. Replying to spam email messages with statement remove will always get
spammers to stop sending you unsolicited email.(F)
4. All computer communications use the same bandwidth(F)
5. A TI line is the slowest but cheapest form of internet connection.(F)
6. A dynamic IP address gives you faster internet access than a static IP address
does(F)
7. A bookmark lets you return to a favorite website quickly(T)
8. Radio buttons are used for listening to radio stations on the internet(F)
9. Spoofing means using fake email sender names(T)
10.Hypertext refers to text presented with very large letters.(F)
Stage 2
Short answer Questions
1. Name three metods of data transmission that are faster than a regular
modem connection
T1 line , cable modem , satellite wireless connection
1. What does log on mean?
DSL receive data at the rate 1.5-10 Mbps and can send data at only
128kbps-1.5mbps, you can download 6 minute music video in only 11
minutes. The advantage of DSL is that it is always on and its
transmission rate is relatively consistent.
Adware
Browser hijackers
Search hijackers
Intercept your legitimate search requests made to real search engines and
return results from phony search services designed to send you to sites
they run.
Stage 3
Knowledge in action
7.
Email and IM are ways of sending text messages back and forth to other
people on the internet. They seem very similar : in both , you compose a message ,
and when its ready , you send it; and when someone else sends something to you,
you receive it on your devices and can read it.
But in practice, email and IM can be surprisingly different; each has its own rhythm,
its own strengths and weaknesses, its own sociology, its own etiquette. Instant
messaging is like using the telephone, whereas email is more like corresponding by
letter.
As you use email and IM during the course of the term, watch for differences
between them. Which medium is more appropriate for which kinds of relationships
and communications? Which medium is more stressful to use? Which takes more
time? Which is more convenient for you? Which one is more useful for getting real
work done? Which medium would you use if you knew that whatever you wrote was
eventually going to be published in a book. If you were restricted to using only one
of these communications methods. Which would it be?
Email is more formal than IM but it takes more time to sent, so I think
email is better for formal conditions and relationships such as from
employers to employee.
I think email is stressful to use , because we need to write it in formal
language, and it take more time to send an email rather than IM.
About which one is more convenient for me is depend on the conditions
and to whom my message will be sent. If my message is for my friends , I
may use IM ,but if it is for my boss, or my lecturer , I would rather use
Email, because email is more formal.
If I know that whatever I wrote will eventually going to be published in a
book , and if I was restricted to using only one of these communications
methods ,I would rather use email, because it s written in a formal
language.
10. As we have discussed in this chapter, the internet is both goldmine and
minefield. There are vast riches of information , entertainment, education, and
communication to be found, but there are also snoopers, spam, spoofing, phishing,
spyware, adware, browser hijackers, and key loggers. What should you do to avoid
these threats?
To avoid spam, snoopers , spoofing , and phishing , just believe that
everything in this world is not FREE. And to avoid spyware , adware ,
browser hijacker , and key logger is simple, be careful with FREE
download , be sure to prepare your computer with antivirus , or
antispyware before downloading.