click below
click below
Normal Size Small Size show me how
EXAM
EXAMS
| Question | Answer |
|---|---|
| Address bar to do all of the following | click the address book and select a link |
| Using one browser window for all open pages is called | tabbed browsing |
| Home Page | The page that opens when you start your browser is called the |
| A URL is a ____-part addressing scheme | Four |
| You might customize your Chrome browser using a theme for all of the following EXCEPT: | to make searching easier |
| Web browsers are applications that allow you to navigate and interact with internet content. | True |
| When computer networks are connected to each other, the system is called a(n) | internet |
| Your browser stores the location of each webpage you visit during a single session in a(n) | history list |
| If you type in the Address bar, your browser will convert it to ____ and load the home page at that URL. | |
| In Private browsing mode, all of the following are deleted from the computer you are using when you close the file EXCEPT: | downloads |
| In the address the domain name is | www.nytimes.com |
| When you do not want information about the websites you visited stored on the hard drive of the computer you are using, you can use the browser’s _____ mode. | private browsing |
| The address bar in Chrome is called the | Omnibox |
| A cookie is a small text file that a web server saves on the hard drive of the computer that is running the web browser software. | True |
| Edge includes a _____ feature that allows users to manage their online reading. | Reading List |
| A text file that contains HTML tags is called a(n | HTML document |
| In Google Chrome, you can use the Bookmark manager to store and organize your saved bookmarks. | True |
| Edge uses the _____ search engine as its default. | Bing |
| Firefox is an open-source software, which means that Mozilla has given others the right | study its code distribute its code modify its code Correct! all of the above |
| While working in Chrome, if you encounter a webpage in another language, you should | click the Translate this page icon in the right corner of the omnibox |
| A ____ usually identifies one person’s email account on a mail server. | Username |
| “Detaching a file” is the phrase often used for saving an email attachment to your computer. | True |
| The ____ protocol specifies how to encode nontext data, such as graphics or sound, so it can travel over the Internet. | Mime |
| An email sender’s local network sends the message to the sender’s mail | Server |
| The CRAM-SPAM law was the first U.S. federal government effort to legislate controls on spam. | False |
| A signature is not optional when sending an email. | False |
| Thanks to improved technology, email attachments no longer contain viruses. | False |
| A group of keyboard characters that, viewed together, represent a human expression is known as a(n) | Emoticon |
| An email user’s account name is also known as his/her domain name | False |
| When forwarding a message, Gmail includes the original message in the message display area and adds a blank line ____ so you can add an optional message to provide context for the recipient. | above the original message |
| “Email” is short for | electronic mail |
| When you click Contacts on the Gmail menu, Google Contacts | opens in a new tab |
| In January 2004, the U.S. ____ law went into effect. | CAN-SPAM |
| A ____ might appear at the bottom of an email message and contain standard information about the sender | Signature |
| Spam | consumes large amounts of network capacity distracts employees and wastes their time may include content that is offensive or misleading Correct! all of the above |
| Some search engines can search for images that resemble an image uploaded by the user. | True |
| Link rot refers to webpages that contain an excessive number of hyperlinks | False |
| It is possible for a legitimate not-for-profit company to be using a .com domain rather than .org. | True |
| A _____, or spider, is a search engine program that automatically searches the web to find new websites and update information about old websites. | Web robot |
| A spider is a program that automatically searches the web to find new websites. | True |
| The term “web” is an abbreviation for _ | World wide web |
| In terms of using search engines, another word for “query” is | search expressions |
| The procedure of converting a natural language question into a search expression is called | Parsing |
| Regarding search engines, the term “search expression” means something different from the term “query.” | False |
| A not-for-profit organization will usually -- though not necessarily -- use the _____ domain. | Org |
| A webpage indexed in a search engine’s database containing text matching a query is called a(n) | Hit |
| Search engines usually label paid placement links as “paid.” | False |
| the number of high-quality back links that the webpage provides | Page rank is determined by |
| To develop an opinion about the quality of a resource, you can evaluate four elements of any webpage: the webpage’s authorship, ownership, content, and appearance. | True |
| In the United States, intellectual property is protected through | patents trademarks trade secrets Correct! all of the above |
| Due to their large size, digital audio books have been slow to gain popularity. | False |
| In the U.S., a work that was created in 2000 by an individual author who died in 2005 will be protected by copyright until | 2075 |
| Employment websites such as careerbuilders.com make money by | charging employers who post a job listing a fee |
| Fair use of copyrighted work includes using it for ___ | criticism |
| is a general term that includes all products of the human mind, including original ideas. | Intellectual property |
| Which of the following focuses on information related to disease identification, control, and prevention? | cdc.gov |
| One website that offers full-text copies of works no longer protected by copyright is | Project Gutenberg |
| In the U.S., ____ laws allow people to use copyrighted works under some conditions. | Fair Use |
| ____ is a combination of online research tools that provides online-based information services in subject areas such as business, science, engineering, finance, and law and in a format to meet the needs of a wide range of users. | ProQuest Dialog |
| When a copyright for a work has expired, the work is then said to be in the | public domain |
| E-commerce stands for | electronic commerce |
| All DOI numbers begin with ____ followed by a prefix of a unique combination of four or more digits, then a slash, and finally a suffix that is any alphanumeric combination that identifies the publisher. | 10 |
| If you own a stationery store and you buy your supplies from a large distribution company, you are participating in _____ e-commerce. | B2B |
| Sometimes the link to subscribe to feeds is a text link with the letters “____” to indicate the file format of the syndicated content. RSA | RSS |
| When the Usenet News Service began operating, the only way to read or post articles to newsgroups was to install and run a software program called a | newsreader |
| was the first to make APIs available to other developers | Amazon |
| The addition of a Web camera (also called a ____) enables users to participate in a video chat, in which participants can see and speak to each other. | Webcam |
| VoIP is an acronym for Voice over Internet | Protocol |
| Facebook has a large number of active users, and more than ____ of its users check their Facebook pages daily. | 65% |
| Unlike ______, which is a social network open to business professionals, _____ is a social networking site restricted to credentialed physicians. | LinkedIn/Sermo |
| encryption uses a single key that both the sender and receiver know | Private-key |
| A web bug is an example of spyware because _ | the clear GIF and its actions are hidden from the user |
| A digital ID is purchased from | a certificate authority |
| The Ad-Aware Free ad blocker detects adware and eliminates | malware threats |
| Webpages secured by SSL have URLs that begin with _ | |
| provides wireless broadband connections at very fast speeds | LTE |
| how compatible Bluetooth devices establish their connection with each other | Pairing |
| a program used to illegally monitor activity on a wireless network in order to obtain personal information | Sniffer |
| a device that permits communication between wired and wireless networks so wireless clients and receive and send data | access point |
| when a hacker with special software gains access to a Bluetooth-enabled device without the victim’s knowledge | BlueSnarfing |
| If you have both WPA and WEP available to you, your system will be most secure if you use ____. | WPA only |
| A wireless device’s ____ refers to the physical distance between the access point and the wireless device. | range |
| An SSID may contain up to ____ alphanumeric characters. | 32 |
| The Internet of Things (IoT) uses _____ to collect and transmit data using wireless connections so that data can be acted upon by a person or another machine. | sensors |
| The following is an example of hacking: | Unauthorized access to information being sent over a wireless network |
| 3.5G wireless networks are also called | mobile broadband |
| In a(n) ____ attack, a hacker sets up a computer to act as a legitimate access point, and then steals personal information from users trying to connect to it. | evil twin |
| the term for driving through a neighborhood with a wireless-enabled notebook looking for unsecured wireless networks. | Wardriving |
| By default, most wireless networks are | left unsecured |
| A bulleted list is also known as a(n) ____ list. | unordered |
| A commonly used option for making filenames easier to read is to separate words with the ____ character. | _ |
| Tags that are included within other tags are called ____ tags. | nested |
| The “center” value of the align attribute is ____ in XHTML. | deprecated |
| The text editor installed with Windows is called | NotePad |
| A ____ language is a general term that indicates the separation of the formatting of a document and the content of a document. | markup |
| Companies that sell only on the web are sometimes called ____ companies. | dot-com |
| Online travel sites such as Expedia and Travelocity also earn commissions from transportation and lodging providers in the form of fees for each ____ their website. | reservation made through |
| A user’s ____ is a record of the links clicked by a user while visiting a website. | clickstream |