Using Information Technology 11th Edition Williams Test Bank
Using Information Technology 11th Edition Williams Test Bank
Chapter 02
1. The basis for the Internet began in 1969 because of work by the ________.
A. access device
B. secondary storage
C. means of connection
D. Internet service provider
3. An expression for how much data can be sent through a communications channel in a given
amount of time is referred to as ________.
A. connectivity
B. dial-up
C. bandwidth
D. download
2-1
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
A. broadband
B. dial-up
C. bandwidth
D. upload
5. The wired or wireless means of connecting a computer to the Internet is called a ________.
A. broadband
B. physical connection
C. dial-up
D. bandwidth
2-2
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
8. Gigabits per second are ________.
9. The transmission of data from a remote computer to a local computer is referred to as ________.
A. uploading
B. downloading
C. broadband
D. bandwidth
2-3
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
12. The device that sends and receives computer data over regular phone lines is (a) ________.
A. T1 line
B. modem
C. POTS
D. communications satellite
A. fast download
B. connection always on
C. consistent transmission rate
D. universal availability
14. Which traditional trunk line carries 24 normal telephone circuits and has a transmission rate of
1.5-6 Mbps?
A. T1 line
B. cable modem
C. DSL line
D. communications satellite
15. What connects a personal computer to a cable-TV system that offers an Internet connection?
A. T1 line
B. cable modem
C. DSL line
D. communications satellite
2-4
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
16. The method of going online that requires the user to be no more than about 4.5 miles from a
phone company central switching office is ________.
A. dial-up modem
B. DSL
C. T1 line
D. satellite
17. The line most commonly used by corporate, government, and academic sites is ________.
A. DSL
B. T1 line
C. satellite
D. ISDN
A. affordability
B. high-speed transmission
C. 24 separate circuits
D. supports many users
19. A space station that transmits radio waves called microwaves from earth-based stations is called
a ________.
A. T1 line
B. cable modem
C. DSL line
D. communications satellite
2-5
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
20. ISP stands for ________.
A. cable connection
B. Internet Exchange Point
C. hotspot
D. POP
22. In a client-server network, a(n) __________ is a central computer that supplies data or services
requested of it.
A. ISP
B. server
C. browser
D. website
23. A __________ is a collection of modems and other equipment in a local area that acts as an ISP's
gateway to the Internet.
A. web page
B. website
C. IXP
D. point of presence
2-6
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
24. When you connect to your ISP's POP, the ISP and the equipment at the POP go through a
process called _________, establishing the speed of the Internet connection, and then proceed to
_________.
A. authentication; handshaking
B. authentication; transmission
C. handshaking; authentication
D. handshaking; transmission
25. When you are connecting to the Internet, during the process of authentication you must provide
a(n) __________ and a password.
A. username
B. POP
C. ISP
D. protocol
26. The set of communications rules for exchanging information electronically on the Internet is called
the ________.
A. web browser
B. HTML
C. URL
D. protocol
27. A(n) __________ uniquely identifies each computer and device connected to the Internet.
A. web page
B. IP address
C. POP
D. URL
2-7
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
28. Software that enables users to find and access the various parts of the web is called a ________.
A. home page
B. website
C. browser
D. web page
29. A specific web address for specific information is called a(n) ________.
A. home page
B. web page
C. URL (Uniform Resource Locater)
D. hyperlink
A. web page
B. website
C. URL
D. web portal
31. The .gov, .com, .net, and .edu extensions are examples of ________.
A. protocols
B. directory names
C. domains
D. URLs
2-8
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
32. The set of special instructions used to specify document structure, formatting, and links to other
multimedia documents is called ________.
A. HTML
B. hypertext
C. multimedia
D. HTTP
33. HTML connections to other documents or web pages that contain related information are called
________ links.
A. HTTP
B. multimedia
C. URL
D. hypertext
A. URL
B. home page
C. browser
D. protocol
35. Little circles located in front of various website screen options, which can be selected with the
mouse, are called ________.
A. hyperlinks
B. radio buttons
C. text boxes
D. web portals
2-9
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
36. An independently controllable section of a web page is called a ________.
A. hyperlink
B. radio button
C. frame
D. window
37. Websites that group together in one convenient location popular features such as online shopping
malls, email support, community forums, and current news and weather are called ________.
A. home pages
B. browsers
C. search engines
D. web portals
38. The subject word (or words) of the topic you wish to find while using a search engine is called the
________.
A. directory
B. URL
C. keyword
D. web portal
39. Which of these can be used to locate information on the web by asking questions or using
keywords?
A. search engines
B. home pages
C. hyperlinks
D. URLs
2-10
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
40. Which of these provides lists of several websites classified by topic?
A. web portal
B. subject directory
C. metasearch engine
D. browser
41. A search engine that allows you to search several search engines simultaneously is called a
________.
A. megasearch engine
B. hypersearch engine
C. metasearch engine
D. subject directory
A. URL
B. domain name
C. domain type
D. username
43. If you were emailing a term paper and wanted to maintain its formatting, you would send it as a(n)
________.
A. URL
B. instant message
C. protocol
D. attachment
2-11
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
44. Any user on a given email system can send a message via (a) ________ and have it pop up right
away on the screen of anyone else logged onto that system.
A. attachments
B. instant messaging
C. FTP
D. mailing list
46. A method whereby one can connect to a remote computer with a different operating system and
transfer large files to his or her own microcomputer's hard disk over the Internet is called
________.
A. URL
B. FTP
C. POP
D. HTML
A. Cute
B. Put
C. Grab
D. FTP net
2-12
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
48. To access a newsgroup, a(n) ________ program is needed.
A. browser
B. applet
C. newsreader
D. chat
49. A collection of messages on a particular topic on a message board is called a(n) ________.
A. thread
B. hyperlink
C. mailing list
D. newsgroup
50. A program that adds a specific feature to a browser, allowing it to play or view certain files, is a
________.
A. script
B. plug-in
C. tag
D. cookie
51. Small Java programs that can be quickly downloaded and run by most browsers are called
________.
A. cookies
B. applets
C. plug-ins
D. hypertext
2-13
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
52. The rapid sequencing of still images to create the appearance of motion is called a(n) ________.
A. animation
B. stream
C. script
D. applet
53. The technology (software) that automatically downloads website information to your computer is
called ________.
A. pull technology
B. download
C. push technology
D. upload
54. The technology in which customized text, audio, and video are sent automatically to the user on a
regular basis is called ________.
A. webcasting
B. broadcasting
C. pulling
D. attaching
55. Web logs made by various users that are accessible to others are called ________.
A. real-time chat
B. blogs
C. telnet
D. applets
2-14
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
56. RSS newsreaders are also known as ________.
A. attachments
B. aggregators
C. podcasters
D. webcasts
57. __________ is the electronic sale or exchange of goods and services directly between companies,
cutting out traditional intermediaries.
A. B2C
B. C2C
C. B2B
D. Online finance
58. The move toward a more social, collaborative, interactive, and responsive web is called
__________.
A. Web 3.0
B. aggregating
C. Web 2.0
D. webcasting
A. a sealed letter
B. an insured package
C. a postcard
D. a notarized document
2-15
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
60. An uninvited email solicitation to buy something is an example of ________.
A. flaming
B. spam
C. pharming
D. instant messaging
61. Forging of an email sender name so that the message appears to have originated from someone
or somewhere other than the actual source is called ________.
A. spoofing
B. phishing
C. pharming
D. spyware
A. cookies
B. spam
C. pop-up generator
D. aggregator
A. browser hijackers
B. search hijackers
C. key loggers
D. All of these
2-16
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
64. Bandwidth is an expression of how much data can be sent through a communications channel in
a given amount of time.
True False
65. The wired or wireless means of connecting to the Internet is called a physical connection.
True False
True False
67. One kilobit per second is the same as 1 million bits per second.
True False
68. Kilobits per second are faster than megabits per second.
True False
True False
True False
71. "Uploading" refers to the transmission of data from a remote computer to a local computer.
True False
72. The transmission of the latest pinball game off a subscriber network to a home computer is an
example of an upload.
True False
2-17
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
73. The transmission of credit information to order something online is an example of an upload.
True False
74. Digital subscriber line (DSL) uses satellite technology to transmit data in megabits per second.
True False
75. The primary advantages of DSL are that it is always on and its transmission rate is consistent.
True False
True False
77. A T1 line is essentially a traditional trunk line that carries 24 normal telephone circuits and has a
transmission rate of 1.5-6 Mbps.
True False
True False
True False
True False
81. Cable modem lines are shared with other cable users in a particular area and can be slower
during peak use periods.
True False
2-18
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
82. You can have a cable modem Internet connection even if there is no cable television available in
your area.
True False
83. A DSL line can be installed anywhere as long as the user has a telephone line.
True False
84. A communications satellite, a space station that transmits radio waves called microwaves from
earth-based stations, can be used to retrieve information from the Internet.
True False
True False
86. Wi-Fi refers to a group of 802.11 standards established by the IEEE (Institute of Electrical and
Electronic Engineers).
True False
87. An Internet service provider (ISP) provides users with access to the Internet.
True False
True False
89. ISPs provide each user with a point of presence as a local access point to the Internet.
True False
2-19
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
90. Internet Exchange Points connect an ISP with the Internet backbone.
True False
91. The protocol that enables all computers to use data transmitted on the Internet is called Hypertext
Transfer Protocol.
True False
92. Every computer connected to the Internet has the same IP address.
True False
True False
True False
95. A browser is a document on the World Wide Web that can include text, pictures, sound, and
video.
True False
True False
97. A website is the location of a web domain name in a computer (server) somewhere on the
Internet.
True False
2-20
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
98. A URL is a string of characters that points to a specific piece of information on the web.
True False
99. HyperText Transfer Protocol, or HTTP, refers to the communications rules that allow browsers to
connect with web servers.
True False
True False
101.HTML is the set of special instructions that are used to specify document structure, formatting,
and links to other documents.
True False
True False
103.Radio buttons are little circles located in front of various options on a web page; selecting an
option with the mouse places a dot in the corresponding circle and allows the user to interact with
the web page.
True False
104.Scroll arrows, small up/down and left/right arrows, can be used to move the screen to see the
rest of the web page.
True False
2-21
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
105.A frame is a type of gateway website that functions as an "anchor" site, a major starting point for
users to connect to the web.
True False
106.A portal is software that enables users to view web pages and to jump from one page to another.
True False
107.Search engines are websites that group together in one convenient location popular features
such as search tools, email, electronic commerce, and discussion groups.
True False
108.A subject directory allows you to search for information by selecting lists of categories or topics.
True False
109.Email can be sent via a particular email program, such as Microsoft Outlook, or via a browser
and a website, such as through Hotmail and Gmail.
True False
110.Some commonly used top-level domains are .net, .com, .gov, and .edu.
True False
111.Sending yourself an email with a file attached is an easy way to back up that file.
True False
True False
2-22
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
113.Guides to appropriate online behavior are called net rules.
True False
True False
True False
116.A newsgroup is an email discussion group on a special-interest topic in which all subscribers
receive emails messages sent to the group's email address.
True False
True False
118.Internet telephony is the method of using the Internet to make a phone call, either one-to-one or
for audio conferencing.
True False
True False
120.Applets are small programs that can be quickly downloaded and run by most browsers to support
multimedia.
True False
2-23
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
121.Applets are written in Java, a programming language that enables programmers to create
animated and interactive web pages.
True False
122.Streaming video is the rapid sequencing of still images to create the appearance of motion, such
as in a cartoon.
True False
True False
124.Webcasting sends customized text, video, and audio to your computer automatically on a regular
basis or live on demand.
True False
True False
126.Streaming audio allows you to listen to a file while the data is still being downloaded to your
computer.
True False
True False
True False
2-24
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
129."Web 2.0" refers to a more social, collaborative, interactive, and responsive web.
True False
True False
131.Emails and texts are generally private and safe from snooping.
True False
132.Spam consists of little text files left on your hard disk by some websites you visit.
True False
True False
134.In pharming, thieves implant malicious software on a victim's computer that redirects the user to
an impostor web page even when the individual types the correct address into his or her
browser.
True False
True False
136.Browser hijackers can record each character you type and transmit that information to someone
else on the Internet, making it possible for strangers to learn your passwords and other
information.
True False
2-25
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Fill in the Blank Questions
137.The type of data transmission that allows only one signal at a time is called ________
transmission.
________________________________________
________________________________________
139.The wired or wireless means of connecting to the Internet is called a(n) ________ connection.
________________________________________
________________________________________
141.The speed of a modem that is 56,000 bps can be expressed as ________ Kbps.
________________________________________
________________________________________
143.Downloading is the transmission of data from a(n) ________ computer to one's own computer.
________________________________________
144.A device that sends and receives data over telephone lines to and from computers is called a(n)
________.
________________________________________
2-26
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
145.POTS stands for __________.
________________________________________
146.Transmitting data from a local PC to a website being constructed by a user can be called a(n)
________.
________________________________________
147.A modem that uses telephone lines to transmit data at 56 Kbps is a(n) ________ connection.
________________________________________
148.The device that connects a personal computer to a cable-TV system that offers an Internet
connection is called a(n) ________.
________________________________________
149.A space station that transmits radio waves from earth-based stations is called a ________.
________________________________________
150.The radio waves transmitted from a communications satellite are called ________.
________________________________________
________________________________________
152.3G and 4G wireless technology does not need Wi-Fi access points because it uses the existing
________ system.
________________________________________
2-27
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
153.A WISP is a(n) ________.
________________________________________
154.The Internet service provider's (ISP's) local access point for users in a particular area is its
________.
________________________________________
155.ISPs that don't run their own backbones connect to an Internet backbone through a(n) ________.
________________________________________
________________________________________
157.When two modems connect to each other at a single ISP location, the process is called
________.
________________________________________
158.A set of rules that computers must follow to transmit data electronically is called a(n) ________.
________________________________________
159.The protocol that enables all computers to use data transmitted on the Internet is called
________.
________________________________________
160.To send data over the Internet, TCP/IP breaks data into smaller blocks called ________.
________________________________________
2-28
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
161.Every computer on the Internet has a(n) _________ address.
________________________________________
162.An IP address consists of four sets of numbers between _________ and _________ separated by
decimals.
________________________________________
163.Each time a general web user connects to an ISP, the ISP assigns the computer a new IP
address for that session; the new address is called a(n) ________ address.
________________________________________
________________________________________
165.The _________ is the organizational home for groups responsible for Internet infrastructure
standards.
________________________________________
166.Various parts of the web can be accessed using software called a(n) ________.
________________________________________
167.A location on a particular computer on the web that has a unique address is a _________.
________________________________________
________________________________________
2-29
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
169.A string of characters that points to a specific piece of information anywhere on the web is called
a(n) ________.
________________________________________
________________________________________
________________________________________
________________________________________
173.A network website would typically have the ________ domain abbreviation.
________________________________________
174.A .gov domain abbreviation indicates that the website is a _________ site.
________________________________________
175.A .com domain abbreviation indicates that the website is a _________ site.
________________________________________
176.Documents scattered across many Internet sites are directly linked with ________.
________________________________________
177.Sets of instructions that are used in HTML to specify document structure and formatting are
called ________.
________________________________________
2-30
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
178.The welcome page that identifies the website and contains links to other pages at the site is
called a ________.
________________________________________
179.A browser's _________ keeps track of the locations of the web pages you have visited and allows
you to quickly return to them.
________________________________________
180.On a web page, little circles located in front of various options are called ________; options can
be selected with mouse clicks.
________________________________________
________________________________________
182.A(n) ________ is a "gateway" website—a major starting point—for users when they connect to the
web.
________________________________________
183.The subject word of the topic one wishes to search for on the web is called a ________.
________________________________________
184._________ are programs that enable you to ask questions or use keywords to help locate
information on the web.
________________________________________
2-31
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
185.The program used to search for a web topic with the help of a keyword provided by the user is
called a ________.
________________________________________
186.A _________ search engine such as Yippy! allows you to search several search engines
simultaneously.
________________________________________
187.A _________ is a program that can be downloaded for free and used to make a website that can
be corrected or added to by anyone.
________________________________________
________________________________________
________________________________________
190.In an email address, the first section, called the __________, identifies who is at the address.
________________________________________
191.The user name and the domain name in an email address are linked by the __________
character.
________________________________________
________________________________________
2-32
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
193.You can ________ files (documents, photos, etc.) that aren't very large to emails and send them
to friends.
________________________________________
194.A __________________ is a web-based discussion group that does not require a newsreader; it
can be accessed via a browser.
________________________________________
195.A program included with most browsers that allows access to newsgroups is called a ________.
________________________________________
196.FTP files can be downloaded using either a web browser or a special _________ client program
such as Fetch.
________________________________________
197.Using the net to make phone calls, either one to one or for audio conferencing (such as via
Skype), is called __________________.
________________________________________
198.A _________ is a program that adds a specific feature or function to a browser, allowing it to play
or view certain files.
________________________________________
199.Small Java programs that can be quickly downloaded and run by most browsers to enhance the
interactivity of web pages are called ________.
________________________________________
2-33
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
200.Applets are written in a programming language called ________.
________________________________________
201.The rapid sequencing of still images to create the appearance of motion is called ________.
________________________________________
202.The process of transferring data in a continuous flow such that the file can be viewed before the
end of the file is sent is called ________.
________________________________________
________________________________________
________________________________________
205.Delivering music, radio, or video from the Internet to a computer or other device is called
_________.
________________________________________
________________________________________
207.The electronic sales or exchange of goods and services directly between companies, cutting out
intermediaries, is called ________ commerce.
________________________________________
2-34
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
208.When shoppers browse for products in stores only to buy them from an online rival, this is called
_________.
________________________________________
________________________________________
________________________________________
211."Semantic markup" and "personal browser" are terms that apply to the concept of Web
_________.
________________________________________
212.__________ is the forgery of an email name so that the message appears to have originated from
someone or somewhere other than the legitimate source.
________________________________________
213.The sending of bogus text messages in order to obtain someone's personal information (ID theft)
is called _________.
________________________________________
214.In _________, web visitors are redirected by malicious software to imposter web pages.
________________________________________
215.Little text files left on the hard disk by some websites visited by the user are called ________;
these small files help companies keep track of users' data.
________________________________________
2-35
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
216._________ is a kind of spyware that tracks web surfing and online buying so that marketers can
send users targeted and solicited pop-up and other ads.
________________________________________
217.Search _________ intercept your legitimate search requests made to real search engines and
return results from phony search services designed to send you to sites they run.
________________________________________
218.___________________ can record each character you type and transmit the information to
someone else on the Internet, making it possible for strangers to learn your passwords and other
information.
________________________________________
________________________________________
Essay Questions
220.What are the three things needed to gain access to the Internet?
2-36
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
221.What is the difference between baseband transmission and broadband transmission?
223.State the advantages and disadvantages of using a digital subscriber line (DSL) service.
2-37
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
224.What is a T1 line?
2-38
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
227.What is Transmission Control Protocol/Internet Protocol (TCP/IP)?
229.What is the Internet Corporation for Assigned Names and Numbers (ICANN)?
2-39
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
230.List and explain the parts of a URL.
231.Web pages are created with hypertext markup language (HTML). Explain what HTML is and how
it relates to TCP/IP.
232.What's the difference between a keyword index type of search engine and a subject directory
type of search engine?
2-40
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
233.Explain some ways to evaluate and source information found on the web.
234.Explain what webmail is; what are two advantages and two disadvantages of webmail? Name the
four major webmail services.
2-41
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
236.Explain what a thread is and where it is used.
2-42
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
239.Distinguish spoofing, phishing, and pharming.
2-43
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Chapter 02 The Internet and the World Wide Web: Exploring
Cyberspace Answer Key
1. The basis for the Internet began in 1969 because of work by the ________.
(p. 50)
A. access device
B. secondary storage
C. means of connection
D. Internet service provider
2-44
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
3. An expression for how much data can be sent through a communications channel in a given
(p. 52) amount of time is referred to as ________.
A. connectivity
B. dial-up
C. bandwidth
D. download
A. broadband
B. dial-up
C. bandwidth
D. upload
5. The wired or wireless means of connecting a computer to the Internet is called a ________.
(p. 52)
A. broadband
B. physical connection
C. dial-up
D. bandwidth
2-45
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
2-46
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
A. uploading
B. downloading
C. broadband
D. bandwidth
Saving = storing.
2-47
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
11. Which of the following is NOT an example of an upload?
(p. 53)
12. The device that sends and receives computer data over regular phone lines is (a) ________.
(p. 53)
A. T1 line
B. modem
C. POTS
D. communications satellite
2-48
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
13. Which of the following is NOT an advantage of DSL?
(p. 54)
A. fast download
B. connection always on
C. consistent transmission rate
D. universal availability
14. Which traditional trunk line carries 24 normal telephone circuits and has a transmission rate of
(p. 54) 1.5-6 Mbps?
A. T1 line
B. cable modem
C. DSL line
D. communications satellite
2-49
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
15. What connects a personal computer to a cable-TV system that offers an Internet connection?
(p. 54)
A. T1 line
B. cable modem
C. DSL line
D. communications satellite
16. The method of going online that requires the user to be no more than about 4.5 miles from a
(p. 54) phone company central switching office is ________.
A. dial-up modem
B. DSL
C. T1 line
D. satellite
17. The line most commonly used by corporate, government, and academic sites is ________.
(p. 54-
55)
A. DSL
B. T1 line
C. satellite
D. ISDN
2-50
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
A. affordability
B. high-speed transmission
C. 24 separate circuits
D. supports many users
19. A space station that transmits radio waves called microwaves from earth-based stations is
(p. 57) called a ________.
A. T1 line
B. cable modem
C. DSL line
D. communications satellite
2-51
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
20. ISP stands for ________.
(p. 58)
A. cable connection
B. Internet Exchange Point
C. hotspot
D. POP
22. In a client-server network, a(n) __________ is a central computer that supplies data or services
(p. 59) requested of it.
A. ISP
B. server
C. browser
D. website
2-52
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Learning Outcome: 02-02 How Does the Internet Work?
Topic: How Does the Internet Work?
23. A __________ is a collection of modems and other equipment in a local area that acts as an
(p. 60) ISP's gateway to the Internet.
A. web page
B. website
C. IXP
D. point of presence
24. When you connect to your ISP's POP, the ISP and the equipment at the POP go through a
(p. 60) process called _________, establishing the speed of the Internet connection, and then proceed
to _________.
A. authentication; handshaking
B. authentication; transmission
C. handshaking; authentication
D. handshaking; transmission
2-53
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
25. When you are connecting to the Internet, during the process of authentication you must
(p. 60) provide a(n) __________ and a password.
A. username
B. POP
C. ISP
D. protocol
26. The set of communications rules for exchanging information electronically on the Internet is
(p. 60) called the ________.
A. web browser
B. HTML
C. URL
D. protocol
27. A(n) __________ uniquely identifies each computer and device connected to the Internet.
(p. 61)
A. web page
B. IP address
C. POP
D. URL
2-54
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Difficulty: 2 Medium
Learning Outcome: 02-02 How Does the Internet Work?
Topic: How Does the Internet Work?
28. Software that enables users to find and access the various parts of the web is called a
(p. 63) ________.
A. home page
B. website
C. browser
D. web page
29. A specific web address for specific information is called a(n) ________.
(p. 64)
A. home page
B. web page
C. URL (Uniform Resource Locater)
D. hyperlink
A URL consists of (1) the web protocol, (2) the domain name or web server name, (3) the
directory (or folder) on that server, and (4) the file within that directory (perhaps with an
extension such as html or htm).
2-55
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
30. A computer with a domain name is called a ________.
(p. 64-
65)
A. web page
B. website
C. URL
D. web portal
The website is the location of a web domain name of a computer (server) somewhere on the
Internet.
31. The .gov, .com, .net, and .edu extensions are examples of ________.
(p. 64-
65)
A. protocols
B. directory names
C. domains
D. URLs
The top-level domain is a three-letter extension that describes the domain type.
2-56
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
32. The set of special instructions used to specify document structure, formatting, and links to
(p. 66) other multimedia documents is called ________.
A. HTML
B. hypertext
C. multimedia
D. HTTP
33. HTML connections to other documents or web pages that contain related information are
(p. 66) called ________ links.
A. HTTP
B. multimedia
C. URL
D. hypertext
Hypertext links are connections to other documents or web pages that contain related
information; a word or phrase in one document becomes a connection to a document in a
different place.
2-57
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
34. The first page seen at a website is called the ______.
(p. 67)
A. URL
B. home page
C. browser
D. protocol
The home page acts as the welcome page of the website; it identifies the website and
contains links to other pages at the site.
35. Little circles located in front of various website screen options, which can be selected with the
(p. 69) mouse, are called ________.
A. hyperlinks
B. radio buttons
C. text boxes
D. web portals
Selecting an option with the mouse places a dot in the corresponding circle (radio button).
2-58
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
36. An independently controllable section of a web page is called a ________.
(p. 69)
A. hyperlink
B. radio button
C. frame
D. window
A web page designer can divide a page into separate frames, each with different features and
options.
37. Websites that group together in one convenient location popular features such as online
(p. 70) shopping malls, email support, community forums, and current news and weather are called
________.
A. home pages
B. browsers
C. search engines
D. web portals
2-59
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
38. The subject word (or words) of the topic you wish to find while using a search engine is called
(p. 71) the ________.
A. directory
B. URL
C. keyword
D. web portal
The results of your keyword search will be displayed in a summary of documents containing
the keyword(s) you typed.
39. Which of these can be used to locate information on the web by asking questions or using
(p. 71) keywords?
A. search engines
B. home pages
C. hyperlinks
D. URLs
When you use a keyword to search for a topic, you are using a piece of software known as a
search engine.
2-60
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
40. Which of these provides lists of several websites classified by topic?
(p. 72)
A. web portal
B. subject directory
C. metasearch engine
D. browser
41. A search engine that allows you to search several search engines simultaneously is called a
(p. 72) ________.
A. megasearch engine
B. hypersearch engine
C. metasearch engine
D. subject directory
2-61
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
42. In the email address [email protected], "earthlink" is the __________.
(p. 78)
A. URL
B. domain name
C. domain type
D. username
43. If you were emailing a term paper and wanted to maintain its formatting, you would send it as
(p. 81) a(n) ________.
A. URL
B. instant message
C. protocol
D. attachment
44. Any user on a given email system can send a message via (a) ________ and have it pop up
(p. 81) right away on the screen of anyone else logged onto that system.
A. attachments
B. instant messaging
C. FTP
D. mailing list
2-62
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Difficulty: 1 Easy
Learning Outcome: 02-04 Email, Instant Messaging, and Other Ways of Communicating Over the Net
Topic: Email, Instant Messaging, and Other Ways of Communicating Over the Net
When replying, quote only the relevant section to save the recipient the effort of wading
through lots of text to find the reference.
46. A method whereby one can connect to a remote computer with a different operating system
(p. 83) and transfer large files to his or her own microcomputer's hard disk over the Internet is called
________.
A. URL
B. FTP
C. POP
D. HTML
2-63
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
47. Which of the following is an FTP client program?
(p. 83)
A. Cute
B. Put
C. Grab
D. FTP net
FTP client programs are special software that enables the download and upload of FTP files.
A. browser
B. applet
C. newsreader
D. chat
2-64
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
49. A collection of messages on a particular topic on a message board is called a(n) ________.
(p. 83)
A. thread
B. hyperlink
C. mailing list
D. newsgroup
50. A program that adds a specific feature to a browser, allowing it to play or view certain files, is a
(p. 86) ________.
A. script
B. plug-in
C. tag
D. cookie
2-65
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
51. Small Java programs that can be quickly downloaded and run by most browsers are called
(p. 86) ________.
A. cookies
B. applets
C. plug-ins
D. hypertext
Java applets enhance web pages by, for example, playing music, displaying graphics and
animation, and providing interactive games.
52. The rapid sequencing of still images to create the appearance of motion is called a(n)
(p. 87) ________.
A. animation
B. stream
C. script
D. applet
2-66
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
53. The technology (software) that automatically downloads website information to your computer
(p. 88) is called ________.
A. pull technology
B. download
C. push technology
D. upload
One can choose the categories or the channels of websites that will automatically send you
updated information.
54. The technology in which customized text, audio, and video are sent automatically to the user
(p. 88) on a regular basis is called ________.
A. webcasting
B. broadcasting
C. pulling
D. attaching
2-67
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
55. Web logs made by various users that are accessible to others are called ________.
(p. 88)
A. real-time chat
B. blogs
C. telnet
D. applets
A. attachments
B. aggregators
C. podcasters
D. webcasts
RSS newsreaders, or RSS aggregators, are programs that scour the web, sometimes hourly
or more frequently, and pull together in one place web "feeds" from several websites.
2-68
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
57. __________ is the electronic sale or exchange of goods and services directly between
(p. 91) companies, cutting out traditional intermediaries.
A. B2C
B. C2C
C. B2B
D. Online finance
58. The move toward a more social, collaborative, interactive, and responsive web is called
(p. 92) __________.
A. Web 3.0
B. aggregating
C. Web 2.0
D. webcasting
2-69
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
59. In terms of privacy, email is like ________.
(p. 96)
A. a sealed letter
B. an insured package
C. a postcard
D. a notarized document
Anyone can pick up and read a postcard, and chances are any number of people can read an
email.
A. flaming
B. spam
C. pharming
D. instant messaging
2-70
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
61. Forging of an email sender name so that the message appears to have originated from
(p. 97) someone or somewhere other than the actual source is called ________.
A. spoofing
B. phishing
C. pharming
D. spyware
Spoofing is one of the main tactics used by spammers (and virus writers) to induce or trick
recipients into opening and perhaps responding to their solicitations.
A. cookies
B. spam
C. pop-up generator
D. aggregator
Adware, or pop-up generators, is a kind of spyware that tracks web searching or online buying
so that marketers can send you targeted and unsolicited pop-up and other ads.
2-71
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
63. One type of spyware is ________.
(p. 99)
A. browser hijackers
B. search hijackers
C. key loggers
D. All of these
64. Bandwidth is an expression of how much data can be sent through a communications channel
(p. 52) in a given amount of time.
TRUE
65. The wired or wireless means of connecting to the Internet is called a physical connection.
(p. 52)
TRUE
2-72
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
66. Bps stands for bandwidth per second.
(p. 52)
FALSE
67. One kilobit per second is the same as 1 million bits per second.
(p. 52)
FALSE
68. Kilobits per second are faster than megabits per second.
(p. 52-
53)
FALSE
2-73
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
69. Mps stands for megabits per second.
(p. 53)
FALSE
Mbps
TRUE
71. "Uploading" refers to the transmission of data from a remote computer to a local computer.
(p. 53)
FALSE
2-74
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
72. The transmission of the latest pinball game off a subscriber network to a home computer is an
(p. 53) example of an upload.
FALSE
download
73. The transmission of credit information to order something online is an example of an upload.
(p. 53)
TRUE
74. Digital subscriber line (DSL) uses satellite technology to transmit data in megabits per
(p. 54) second.
FALSE
2-75
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
75. The primary advantages of DSL are that it is always on and its transmission rate is consistent.
(p. 54)
TRUE
FALSE
77. A T1 line is essentially a traditional trunk line that carries 24 normal telephone circuits and has
(p. 54- a transmission rate of 1.5-6 Mbps.
55)
TRUE
2-76
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
FALSE
TRUE
81. Cable modem lines are shared with other cable users in a particular area and can be slower
(p. 57) during peak use periods.
TRUE
2-77
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
82. You can have a cable modem Internet connection even if there is no cable television available
(p. 57) in your area.
FALSE
83. A DSL line can be installed anywhere as long as the user has a telephone line.
(p. 58)
FALSE
The user must be no more than about 3 miles from a phone company central switching office.
84. A communications satellite, a space station that transmits radio waves called microwaves from
(p. 57) earth-based stations, can be used to retrieve information from the Internet.
TRUE
2-78
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
85. ISP stands for Internet solution provider.
(p. 58)
FALSE
86. Wi-Fi refers to a group of 802.11 standards established by the IEEE (Institute of Electrical and
(p. 58) Electronic Engineers).
TRUE
87. An Internet service provider (ISP) provides users with access to the Internet.
(p. 58)
TRUE
TRUE
2-79
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
89. ISPs provide each user with a point of presence as a local access point to the Internet.
(p. 60)
TRUE
90. Internet Exchange Points connect an ISP with the Internet backbone.
(p. 60)
TRUE
91. The protocol that enables all computers to use data transmitted on the Internet is called
(p. 60) Hypertext Transfer Protocol.
FALSE
2-80
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
92. Every computer connected to the Internet has the same IP address.
(p. 61)
FALSE
FALSE
dynamic IP addresses
FALSE
No one runs the Internet. ICANN regulates domain names in Internet addresses (URLs).
2-81
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
95. A browser is a document on the World Wide Web that can include text, pictures, sound, and
(p. 63) video.
FALSE
A browser is software that enables you to find and access the various parts of the web.
TRUE
97. A website is the location of a web domain name in a computer (server) somewhere on the
(p. 64) Internet.
TRUE
98. A URL is a string of characters that points to a specific piece of information on the web.
(p. 64)
TRUE
2-82
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Difficulty: 2 Medium
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
99. HyperText Transfer Protocol, or HTTP, refers to the communications rules that allow browsers
(p. 64) to connect with web servers.
TRUE
TRUE
101. HTML is the set of special instructions that are used to specify document structure, formatting,
(p. 65) and links to other documents.
TRUE
2-83
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
102. The first page seen at a website is called the Start page.
(p. 67)
FALSE
Home page
103. Radio buttons are little circles located in front of various options on a web page; selecting an
(p. 69) option with the mouse places a dot in the corresponding circle and allows the user to interact
TRUE
104. Scroll arrows, small up/down and left/right arrows, can be used to move the screen to see the
(p. 69) rest of the web page.
TRUE
2-84
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
105. A frame is a type of gateway website that functions as an "anchor" site, a major starting point
(p. 69) for users to connect to the web.
FALSE
106. A portal is software that enables users to view web pages and to jump from one page to
(p. 69) another.
FALSE
A portal is a type of gateway website that functions as an "anchor site" and offers a broad
array of resources and services, online shopping malls, email support, community forums,
current news and weather, stock quotes, travel information, and links to other popular subject
categories.
107. Search engines are websites that group together in one convenient location popular features
(p. 71) such as search tools, email, electronic commerce, and discussion groups.
FALSE
Search engines are programs that enable you to ask questions or use keywords to help locate
information on the web.
2-85
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
108. A subject directory allows you to search for information by selecting lists of categories or
(p. 72) topics.
TRUE
109. Email can be sent via a particular email program, such as Microsoft Outlook, or via a browser
(p. 78) and a website, such as through Hotmail and Gmail.
TRUE
110. Some commonly used top-level domains are .net, .com, .gov, and .edu.
(p. 79)
TRUE
111. Sending yourself an email with a file attached is an easy way to back up that file.
(p. 81)
TRUE
2-86
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Blooms: Understand
Difficulty: 1 Easy
Learning Outcome: 02-04 Email, Instant Messaging, and Other Ways of Communicating Over the Net
Topic: Email, Instant Messaging, and Other Ways of Communicating Over the Net
FALSE
With instant messaging (IM), any user on a given email system can send a message and have
it pop up instantly on the screen of anyone else logged onto that system.
FALSE
Netiquette
114. Use of all-capital letters on the Internet is considered appropriate online behavior.
(p. 81)
FALSE
2-87
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Learning Outcome: 02-04 Email, Instant Messaging, and Other Ways of Communicating Over the Net
Topic: Email, Instant Messaging, and Other Ways of Communicating Over the Net
115. "Flaming" refers to unsolicited email in the form of advertising or chain letters.
(p. 81)
FALSE
116. A newsgroup is an email discussion group on a special-interest topic in which all subscribers
(p. 83) receive emails messages sent to the group's email address.
FALSE
FALSE
2-88
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
118. Internet telephony is the method of using the Internet to make a phone call, either one-to-one
(p. 84) or for audio conferencing.
TRUE
TRUE
120. Applets are small programs that can be quickly downloaded and run by most browsers to
(p. 86) support multimedia.
TRUE
2-89
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
121. Applets are written in Java, a programming language that enables programmers to create
(p. 86) animated and interactive web pages.
TRUE
122. Streaming video is the rapid sequencing of still images to create the appearance of motion,
(p. 87) such as in a cartoon.
FALSE
This is animation. Streaming video is the process of transferring data in a continuous flow so
that you can begin viewing a file even before the end of the file is sent.
FALSE
With pull technology, you go to a website and pull down the information you want—in other
words, the web page isn't delivered until a browser requests, or pulls, it.
2-90
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
124. Webcasting sends customized text, video, and audio to your computer automatically on a
(p. 88) regular basis or live on demand.
TRUE
125. RSS newsreaders and RSS aggregators are the same thing.
(p. 88)
TRUE
They both scour the web and pull together "feeds" from several websites to deliver to users'
computers/devices.
126. Streaming audio allows you to listen to a file while the data is still being downloaded to your
(p. 88) computer.
TRUE
2-91
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
127. Podcasting uses streaming to deliver Internet media to a computer or a device.
(p. 90)
FALSE
The media files must be downloaded and saved before they can be viewed.
TRUE
129. "Web 2.0" refers to a more social, collaborative, interactive, and responsive web.
(p. 92)
TRUE
2-92
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
130. Flickr and YouTube are social-networking websites.
(p. 93)
FALSE
131. Emails and texts are generally private and safe from snooping.
(p. 96)
FALSE
132. Spam consists of little text files left on your hard disk by some websites you visit.
(p. 97)
FALSE
2-93
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
133. Spamming is writing an online message that uses derogatory, obscene, or inappropriate
(p. 97) language.
FALSE
This is flaming; spam refers to unsolicited email, or junk mail, in the form of advertising or
chain letters.
134. In pharming, thieves implant malicious software on a victim's computer that redirects the user
(p. 97- to an impostor web page even when the individual types the correct address into his or her
98)
browser.
TRUE
FALSE
Cookies are more like trackers: little text files—such as your username, password, and
preferences—left on your hard disk by websites you visit. The websites retrieve the data when
you visit again.
2-94
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Learning Outcome: 02-06 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and
Malware
Topic: The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and Malware
136. Browser hijackers can record each character you type and transmit that information to
(p. 99) someone else on the Internet, making it possible for strangers to learn your passwords and
other information.
FALSE
137. The type of data transmission that allows only one signal at a time is called ________
(p. 52) transmission.
baseband
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
138. When several signals can be transmitted at once, it is called ________ transmission.
(p. 52)
broadband
Blooms: Remember
Difficulty: 2 Medium
2-95
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
139. The wired or wireless means of connecting to the Internet is called a(n) ________ connection.
(p. 52)
physical
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
bits
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
141. The speed of a modem that is 56,000 bps can be expressed as ________ Kbps.
(p. 52)
56
Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
billion
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
2-96
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
143. Downloading is the transmission of data from a(n) ________ computer to one's own computer.
(p. 53)
remote
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
144. A device that sends and receives data over telephone lines to and from computers is called
(p. 53) a(n) ________.
modem
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
146. Transmitting data from a local PC to a website being constructed by a user can be called a(n)
(p. 53) ________.
upload
Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
2-97
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
147. A modem that uses telephone lines to transmit data at 56 Kbps is a(n) ________ connection.
(p. 53)
dial-up or dial up
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
148. The device that connects a personal computer to a cable-TV system that offers an Internet
(p. 56) connection is called a(n) ________.
cable modem
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
149. A space station that transmits radio waves from earth-based stations is called a ________.
(p. 57)
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
150. The radio waves transmitted from a communications satellite are called ________.
(p. 79)
microwaves or microwave
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
2-98
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
151. Communications satellites transmit data to you at a rate of 1-5 ________.
(p. 57)
Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
152. 3G and 4G wireless technology does not need Wi-Fi access points because it uses the
(p. 58) existing ________ system.
Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
154. The Internet service provider's (ISP's) local access point for users in a particular area is its
(p. 60) ________.
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-02 How Does the Internet Work?
Topic: How Does the Internet Work?
2-99
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
155. ISPs that don't run their own backbones connect to an Internet backbone through a(n)
(p. 60) ________.
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-02 How Does the Internet Work?
Topic: How Does the Internet Work?
156. The Internet's high-speed, high-capacity communication lines are its ________.
(p. 60)
backbone
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-02 How Does the Internet Work?
Topic: How Does the Internet Work?
157. When two modems connect to each other at a single ISP location, the process is called
(p. 60) ________.
handshaking
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-02 How Does the Internet Work?
Topic: How Does the Internet Work?
158. A set of rules that computers must follow to transmit data electronically is called a(n)
(p. 60) ________.
protocol
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-02 How Does the Internet Work?
Topic: How Does the Internet Work?
2-100
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
159. The protocol that enables all computers to use data transmitted on the Internet is called
(p. 60) ________.
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
160. To send data over the Internet, TCP/IP breaks data into smaller blocks called ________.
(p. 60)
packets or packet
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-02 How Does the Internet Work?
Topic: How Does the Internet Work?
IP or Internet Protocol
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-02 How Does the Internet Work?
Topic: How Does the Internet Work?
162. An IP address consists of four sets of numbers between _________ and _________ separated
(p. 61) by decimals.
0 or 255
Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 02-02 How Does the Internet Work?
Topic: How Does the Internet Work?
2-101
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
163. Each time a general web user connects to an ISP, the ISP assigns the computer a new IP
(p. 61) address for that session; the new address is called a(n) ________ address.
dynamic IP
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-02 How Does the Internet Work?
Topic: How Does the Internet Work?
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-02 How Does the Internet Work?
Topic: How Does the Internet Work?
165. The _________ is the organizational home for groups responsible for Internet infrastructure
(p. 62) standards.
Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 02-02 How Does the Internet Work?
Topic: How Does the Internet Work?
166. Various parts of the web can be accessed using software called a(n) ________.
(p. 63)
Blooms: Understand
Difficulty: 1 Easy
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
2-102
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
167. A location on a particular computer on the web that has a unique address is a _________.
(p. 63)
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
169. A string of characters that points to a specific piece of information anywhere on the web is
(p. 64) called a(n) ________.
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
2-103
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
171. The domain abbreviation for a military organization website is ________.
(p. 64)
.mil or mil
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
172. The domain abbreviation for an educational or research institution website is ________.
(p. 64)
.edu or edu
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
173. A network website would typically have the ________ domain abbreviation.
(p. 64)
.net or net
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
174. A .gov domain abbreviation indicates that the website is a _________ site.
(p. 64)
government
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
175. A .com domain abbreviation indicates that the website is a _________ site.
(p. 64)
commercial
Blooms: Remember
2-104
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Difficulty: 1 Easy
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
176. Documents scattered across many Internet sites are directly linked with ________.
(p. 66)
hyperlinks or links
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
177. Sets of instructions that are used in HTML to specify document structure and formatting are
(p. 66) called ________.
tags or markups
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
178. The welcome page that identifies the website and contains links to other pages at the site is
(p. 67) called a ________.
home page
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
179. A browser's _________ keeps track of the locations of the web pages you have visited and
(p. 67) allows you to quickly return to them.
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-03 The World Wide Web
2-105
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Topic: The World Wide Web
180. On a web page, little circles located in front of various options are called ________; options can
(p. 70) be selected with mouse clicks.
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
frame
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
182. A(n) ________ is a "gateway" website—a major starting point—for users when they connect to
(p. 70) the web.
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
183. The subject word of the topic one wishes to search for on the web is called a ________.
(p. 70)
keyword
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
2-106
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
184. _________ are programs that enable you to ask questions or use keywords to help locate
(p. 71) information on the web.
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
185. The program used to search for a web topic with the help of a keyword provided by the user is
(p. 71) called a ________.
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
186. A _________ search engine such as Yippy! allows you to search several search engines
(p. 72) simultaneously.
metasearch
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
187. A _________ is a program that can be downloaded for free and used to make a website that
(p. 73) can be corrected or added to by anyone.
wiki
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
2-107
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
188. Incoming mail is usually stored on an ISP's server, called a ________.
(p. 77)
mail server
Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 02-04 Email, Instant Messaging, and Other Ways of Communicating Over the Net
Topic: Email, Instant Messaging, and Other Ways of Communicating Over the Net
Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 02-04 Email, Instant Messaging, and Other Ways of Communicating Over the Net
Topic: Email, Instant Messaging, and Other Ways of Communicating Over the Net
190. In an email address, the first section, called the __________, identifies who is at the address.
(p. 79)
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-04 Email, Instant Messaging, and Other Ways of Communicating Over the Net
Topic: Email, Instant Messaging, and Other Ways of Communicating Over the Net
191. The user name and the domain name in an email address are linked by the __________
(p. 79) character.
@ or at
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-04 Email, Instant Messaging, and Other Ways of Communicating Over the Net
Topic: Email, Instant Messaging, and Other Ways of Communicating Over the Net
2-108
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
192. On a display screen, a rectangular area containing a document or an activity is called a
(p. 81) _________.
window
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-04 Email, Instant Messaging, and Other Ways of Communicating Over the Net
Topic: Email, Instant Messaging, and Other Ways of Communicating Over the Net
193. You can ________ files (documents, photos, etc.) that aren't very large to emails and send
(p. 81) them to friends.
attach
Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 02-04 Email, Instant Messaging, and Other Ways of Communicating Over the Net
Topic: Email, Instant Messaging, and Other Ways of Communicating Over the Net
194. A __________________ is a web-based discussion group that does not require a newsreader; it
(p. 83) can be accessed via a browser.
message board
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-04 Email, Instant Messaging, and Other Ways of Communicating Over the Net
Topic: Email, Instant Messaging, and Other Ways of Communicating Over the Net
195. A program included with most browsers that allows access to newsgroups is called a
(p. 83) ________.
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-04 Email, Instant Messaging, and Other Ways of Communicating Over the Net
Topic: Email, Instant Messaging, and Other Ways of Communicating Over the Net
2-109
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
196. FTP files can be downloaded using either a web browser or a special _________ client
(p. 83) program such as Fetch.
FTP
Blooms: Remember
Difficulty: 3 Hard
Learning Outcome: 02-04 Email, Instant Messaging, and Other Ways of Communicating Over the Net
Topic: Email, Instant Messaging, and Other Ways of Communicating Over the Net
197. Using the net to make phone calls, either one to one or for audio conferencing (such as via
(p. 84) Skype), is called __________________.
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-05 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social
Networking
Topic: The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social Networking
198. A _________ is a program that adds a specific feature or function to a browser, allowing it to
(p. 86) play or view certain files.
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-05 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social
Networking
Topic: The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social Networking
199. Small Java programs that can be quickly downloaded and run by most browsers to enhance
(p. 86) the interactivity of web pages are called ________.
applets or applet
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-05 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social
Networking
2-110
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Topic: The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social Networking
Java
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-05 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social
Networking
Topic: The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social Networking
201. The rapid sequencing of still images to create the appearance of motion is called ________.
(p. 87)
animation
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-05 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social
Networking
Topic: The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social Networking
202. The process of transferring data in a continuous flow such that the file can be viewed before
(p. 87) the end of the file is sent is called ________.
streaming
Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 02-05 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social
Networking
Topic: The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social Networking
203. The technology that causes software to automatically download information to a computer is
(p. 88) called ________ technology.
push
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-05 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social
Networking
2-111
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Topic: The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social Networking
web log
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-05 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social
Networking
Topic: The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social Networking
205. Delivering music, radio, or video from the Internet to a computer or other device is called
(p. 90) _________.
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-05 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social
Networking
Topic: The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social Networking
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-05 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social
Networking
Topic: The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social Networking
207. The electronic sales or exchange of goods and services directly between companies, cutting
(p. 90) out intermediaries, is called ________ commerce.
B2B or business-to-business
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-05 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social
Networking
2-112
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Topic: The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social Networking
208. When shoppers browse for products in stores only to buy them from an online rival, this is
(p. 90) called _________.
showrooming
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-05 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social
Networking
Topic: The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social Networking
Blooms: Understand
Difficulty: 1 Easy
Learning Outcome: 02-05 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social
Networking
Topic: The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social Networking
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-05 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social
Networking
Topic: The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social Networking
211. "Semantic markup" and "personal browser" are terms that apply to the concept of Web
(p. 93) _________.
3.0 or 3
Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 02-05 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social
Networking
2-113
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Topic: The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social Networking
212. __________ is the forgery of an email name so that the message appears to have originated
(p. 97) from someone or somewhere other than the legitimate source.
Spoofing
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-06 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and
Malware
Topic: The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and Malware
213. The sending of bogus text messages in order to obtain someone's personal information (ID
(p. 97) theft) is called _________.
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-06 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and
Malware
Topic: The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and Malware
214. In _________, web visitors are redirected by malicious software to imposter web pages.
(p. 97)
pharming
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-06 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and
Malware
Topic: The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and Malware
215. Little text files left on the hard disk by some websites visited by the user are called ________;
(p. 98) these small files help companies keep track of users' data.
cookies
Blooms: Remember
Difficulty: 1 Easy
2-114
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Learning Outcome: 02-06 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and
Malware
Topic: The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and Malware
216. _________ is a kind of spyware that tracks web surfing and online buying so that marketers
(p. 99) can send users targeted and solicited pop-up and other ads.
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-06 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and
Malware
Topic: The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and Malware
217. Search _________ intercept your legitimate search requests made to real search engines and
(p. 99) return results from phony search services designed to send you to sites they run.
hijackers
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-06 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and
Malware
Topic: The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and Malware
218. ___________________ can record each character you type and transmit the information to
(p. 99) someone else on the Internet, making it possible for strangers to learn your passwords and
other information.
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-06 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and
Malware
Topic: The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and Malware
2-115
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
219. Computer viruses are a form of _________.
(p. 100)
malware
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-06 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and
Malware
Topic: The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and Malware
Essay Questions
220. What are the three things needed to gain access to the Internet?
(p. 52)
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
2-116
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
221. What is the difference between baseband transmission and broadband transmission?
(p. 52)
Bandwidth, or channel capacity, is an expression of how much data—text, voice, video, and so
on—can be sent through a communications channel in a given amount of time. Baseband
transmission allows only one signal at a time; broadband transmission allows several signals
to be transmitted at once. Broadband connections include various kinds of high-speed wired
connections, such as coaxial and fiber-optic cable.
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
223. State the advantages and disadvantages of using a digital subscriber line (DSL) service.
(p. 54)
An advantage of using DSL is that it is always on and, unlike cable, its transmission rate is
relatively consistent. Also, one can talk on the phone and send data at the same time. The
disadvantage is that one has to live no farther than about 4.5 miles from a phone company
central switching office, because the access speed and reliability degrade with distance.
Blooms: Understand
2-117
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Difficulty: 2 Medium
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
A T1 line is an expensive trunk line that carries 24 normal telephone circuits and has a
transmission rate of 1.5-6 Mbps. They are generally leased by corporate, government, and
academic sites.
Blooms: Remember
Difficulty: 1 Easy
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
2-118
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
226. What is an Internet service provider (ISP)?
(p. 58)
In addition to having an access device and a means of connection, to get on the Internet, you
need to go through an Internet access provider, or an Internet service provider (ISP)—a local,
regional, or national organization that provides access to the Internet for a fee. The ISP may
own the facilities that it uses to deliver services, or it may lease the facilities of another
provider. Examples of national providers are Comcast, CenturyLink, Charter, Cox Cable,
AT&T, Frontier, and Verizon; there are many others. There are also still some free ISPs.
Blooms: Understand
Difficulty: 1 Easy
Learning Outcome: 02-01 Connecting to the Internet: Narrowband, Broadband, and Access Providers
Topic: Connecting to the Internet: Narrowband, Broadband, and Access Providers
The protocol—set of rules—that enables all computers to use data transmitted on the Internet
is Transmission Control Protocol/Internet Protocol, or TCP/IP, which was developed in 1978
by ARPA (U.S. Department of Defense, Advanced Research Projects Agency). TCP/IP is
used for all Internet transactions, from sending email to downloading pictures, audio, video,
etc.
Among other things, TCP/IP determines how the sending device indicates that it has finished
sending a message and how the receiving device indicates that it has received the message.
TCP/IP breaks the data in a message into separate packets, fixed-length blocks of data for
transmission. This allows a message to be split up and its parts sent by separate routes yet
still all wind up in the same place. IP is used to send the packets across the Internet to their
final destination, and TCP is used to reassemble the packets in the correct order. The packets
do not have to follow the same network routes to reach their destination because all the
packets have the same IP address.
Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 02-02 How Does the Internet Work?
Topic: How Does the Internet Work?
2-119
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
228. What is an IP (Internet Protocol) address?
(p. 61)
An IP address uniquely identifies every computer and device connected to the Internet. An IP
address consists of four sets of numbers between 0 and 255 separated by decimals (called a
dotted quad)—for example, 1.160.10.240. An IP address is similar to a street address, but
street addresses rarely change, whereas IP addresses often do. Each time you connect to
your Internet access provider, it assigns your computer a new IP address, called a dynamic IP
address, for your online session. When you request data from the Internet, it is transmitted to
your computer's IP address. When you disconnect, your provider frees up the IP address you
were using and reassigns it to another user.
Whereas a dynamic IP address changes each time you connect to the Internet, a static IP
address is the same every time you connect. Established organizational websites have their
own static IP addresses, which they pay for. If your computer is constantly connected to the
Internet through a local network at work or school, most likely you have a static IP address.
Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 02-02 How Does the Internet Work?
Topic: How Does the Internet Work?
229. What is the Internet Corporation for Assigned Names and Numbers (ICANN)?
(p. 62)
The Internet Corporation for Assigned Names and Numbers (ICANN) is a global, private-
sector, nonprofit corporation that was established to regulate human-friendly Internet domain
names—those addresses ending with .com, .org, .net, and so on, that overlie IP addresses
and identify the website type.
ICANN doesn't control content or deal with access to the Internet.
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-02 How Does the Internet Work?
Topic: How Does the Internet Work?
2-120
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
230. List and explain the parts of a URL.
(p. 64-
65)
The URL (Uniform Resource Locator) is a string of characters that points to a specific piece of
information anywhere on the web; the URL is the website's unique address.
A URL consists of (1) the web protocol, (2) the domain name or web server name, (3) the
directory name (or folder) on that server, and (4) the file within that directory (perhaps with an
extension, such as html or htm).
Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
231. Web pages are created with hypertext markup language (HTML). Explain what HTML is and
(p. 65- how it relates to TCP/IP.
66)
The basic communications protocol that makes the Internet work TCP/IP (Transmission
Control Protocol/Internet Protocol). The communications protocol used to access that part of
the Internet called the World Wide Web is Hypertext Transfer Protocol (HTTP). A hypertext
document uses hypertext markup language (HTML), which uses hypertext links, to connect
with other documents. The foundations of the World Wide Web, then, are HTML and its
hypertext links.
Hypertext markup language (HTML) is the set of special instructions (called "tags" or
"markups") that are used to specify document structure, formatting, and links to other
multimedia documents on the web. Extensible hypertext markup language (XHTML) is the
new and current version of HTML, a stricter version required by the fact that web content now
needs to be delivered to smartphones and other devices that have fewer resources than
traditional computers have.
Hypertext links—also called hyperlinks, hotlinks, or just links—are HTML connections to other
documents or web pages that contain related information. Hyperlinks usually appear as
underlined or colored words.
Blooms: Understand
Difficulty: 3 Hard
2-121
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
232. What's the difference between a keyword index type of search engine and a subject directory
(p. 71- type of search engine?
72)
A keyword index allows you to search for information by typing one or more keywords, and the
search engine then displays a list of web pages, or "hits," that contain those key words. A
subject directory allows you to search for information by selecting lists of categories or topics,
such as "Business and Commerce" or "Art and Humanities."
Blooms: Remember
Difficulty: 2 Medium
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
233. Explain some ways to evaluate and source information found on the web.
(p. 75)
See the Practical Action box on page 75 for this discussion; answers should include most of
the main points discussed here.
Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 02-03 The World Wide Web
Topic: The World Wide Web
2-122
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
234. Explain what webmail is; what are two advantages and two disadvantages of webmail? Name
(p. 78) the four major webmail services.
With web-based email, or webmail, you send and receive messages by interacting via a
browser with a website.
The advantages of web-based email are that you can easily send and receive messages while
traveling anywhere in the world, and the cost of the service itself is usually free. Also, you can
use any personal computer and browser to keep up with your email.
The disadvantages are that, because you aren't paying for the service, webmail providers
support it with advertising, which means you'll have to deal with lots of ads. Purveyors of junk
mail (spam) also tend to heavily target webmail services, so users are bombarded with
unwanted sales pitches. Finally, hackers commonly steal webmail users' address books and
then send scam emails to all the people/organizations in the address lists.
The big four webmail carriers are Yahoo!Mail, Microsoft Outlook.com, Gmail (Google), and
AIM Mail (AOL.com).
Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 02-04 Email, Instant Messaging, and Other Ways of Communicating Over the Net
Topic: Email, Instant Messaging, and Other Ways of Communicating Over the Net
2-123
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
235. List some rules of email netiquette.
(p. 81)
Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 02-04 Email, Instant Messaging, and Other Ways of Communicating Over the Net
Topic: Email, Instant Messaging, and Other Ways of Communicating Over the Net
A message board is a web-based discussion group that does not require a newsreader. These
special-interest discussions may be accessed through a web browser (not email) from Yahoo!
Groups and Google Groups. Some groups are open to the public; others are members only.
Users post a message—which is called an article—to the bulletin board, which other users can
read and write replies to. A collection of messages on a particular subject is called a thread or
a threaded discussion.
Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 02-04 Email, Instant Messaging, and Other Ways of Communicating Over the Net
Topic: Email, Instant Messaging, and Other Ways of Communicating Over the Net
2-124
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
237. Define "Web 2.0."
(p. 92)
Web 2.0 can be defined as the move toward a more social, collaborative, interactive, and
responsive web. As websites have become easier to use, they allow users to better harness
the collective power of people, which has led to a "social web" or "social media," involving not
only blogs and wikis (for sharing information) but also social networks and media sharing. The
common theme of all these is human interaction.
Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 02-05 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social
Networking
Topic: The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social Networking
• Social communication skills are diminished: Too much online interaction can hurt real-life
relationships. Uploading photos, forwarding inane quizzes, posting dumb jokes, or tweeting
unimportant information about our whereabouts are no substitute for face-to-face or phone
communication. Body language and voice inflection can express nuances that typing cannot.
• Your supposedly private data is used to sell you stuff: Even people who set their Facebook
profiles to the strictest privacy settings aren't necessarily protected from having their personal
information leaked all over the web or used in ads.
• Your online data may exist forever and can be used against you: Your supposedly "deleted"
photos and messages may remain online for years. This gives potential employers the
opportunity to turn up inappropriate photos you posted and criminals the chance to use them
in fraudulent schemes, such as fake adoption scams.
• Social networks may be used to attack others: Social-networking sites can become platforms
for anonymous bullying and other types of attacks. Anonymity can allow Internet bloggers and
site users to inflict pain and shame on others.
• Employers don't often ask for this information right now, but be aware that, when you are
looking for a job, what's on your Facebook page may hurt your chances.
Blooms: Understand
2-125
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Difficulty: 2 Medium
Learning Outcome: 02-05 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social
Networking
Topic: The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce, and Social Networking
Spoofing is the forgery of an email sender name so that the message appears to have
originated from someone or somewhere other than the actual source. Phishing is (1) the
sending of a forged email that (2) directs recipients to a replica of an existing web page, both
of which pretend to belong to a legitimate company. The purpose of the fraudulent sender is to
"phish" for, or entice people to share, their personal, financial, or password data. In pharming,
thieves implant malicious software on a victim's computer that redirects the user to an
impostor web page even when the individual types the correct address into his or her browser.
Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 02-06 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and
Malware
Topic: The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and Malware
2-126
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
240. Explain three types of spyware.
(p. 98-
99)
1. Adware, or pop-up generator, tracks web surfing or online buying so that marketers can
send you targeted and unsolicited pop-up and other ads. This is the most common, and
benign, type of spyware. Adware can be developed by legitimate companies such as Verizon
and Panasonic but also by all kinds of fly-by-night purveyors of pornography and gambling
operating from computer servers in Russia, Spain, and the Virgin Islands.
2. Browser hijackers change settings in your browser without your knowledge, often changing
your browser's home page and replacing it with another web page, and search hijackers
intercept your legitimate search requests made to real search engines and return results from
phony search services designed to send you to sites they run.
3. Key loggers, or keystroke loggers, can record each character you type and transmit that
information to someone else on the Internet, making it possible for strangers to learn your
passwords and other information. For instance, some may secretly record the keystrokes you
use to log into online bank accounts and then send the information off to who knows where.
Blooms: Understand
Difficulty: 3 Hard
Learning Outcome: 02-06 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and
Malware
Topic: The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and Malware
2-127
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Using Information Technology 11th Edition Williams Test Bank
• Download virus protection software and follow instructions for installing it on your machine.
(Don't use antivirus software from companies you know nothing about.) Scan your entire
system with antivirus software the first time it's installed; then scan it regularly after that. Also
scan any new CDs and drives before using them.
• Don't open, download, or execute any files, email messages, or email attachments if the
source is unknown or if the subject line of an email is questionable or unexpected.
• Delete all spam and email messages from strangers. Don't open, forward, or reply to such
messages.
• Use webmail sparingly, since viruses can hide in the HTML coding of the email. Even the
simple act of previewing the message in your email program can activate the virus and infect
your computer.
• Don't start your computer with a flash drive, USB thumb drive, or CD/DVD in place.
• Back up your data files regularly, and keep at least one backup device in a location separate
from your computer or use an online (cloud) backup service.
• If you discover you have a virus, ask your antivirus software provider to scan your computer
online; then follow its directions for cleaning or deleting the virus.
Blooms: Understand
Difficulty: 2 Medium
Learning Outcome: 02-06 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and
Malware
Topic: The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, Spyware, and Malware
2-128
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.