The Internet was originally created as a communication system for the ________. Show
The nodes on the original Internet system were ________. What was the ARPANET? What is the Internet backbone? The 4G network standard includes ________ technologies. When the Internet backbone was privatized, five large ________ Access Points made up the new backbone. Which broadband service are you likely to use if you live in a very remote area? The least expensive form of Internet connection is ________. Wireless access points that are available in public spaces are called ________. ________ is the authoring language that defines the structure of a webpage. Programs that interpret HTML to display a webpage are called ________. Adding
a browser ________ gives you quick access to the features of the application that installed it. ________ technologies use telephone lines to carry digital signals. A third-party program, such as Adobe Flash Player, is considered to be a(n) ________. You would install a(n) ________ if you wanted to enable new capabilities in your web browser. In the URL http://www.irs.gov, http is the ________. In the URL http://www.irs.gov, irs is the
________. The backbone of the Internet is composed of numerous Internet ________ Points around the world. The FTP protocol is used to ________. The s in https stands for ________. 198.168.0.1 is an example of a(n) ________. Which organization coordinates the Internet naming system? The ________ enables users to enter a friendly name like whitehouse.gov instead of an address like 74.125.224.72. Which operator is used to return results that includes two specific words? Wi-Fi that is made available in some cities and towns is known as ________ Wi-Fi. .com is an example of a(n) ________. Which of the following is a method of synchronous online communication? A moderated chat room ensures that ________. ________ allows you to communicate with one person at a time. ________ communication allows you to send a message to someone who
is not online at the same time. ________ is an example of asynchronous communication. ________ technology is used for sending email messages. Which statement about email is FALSE? A distorted series of letters and numbers, called a ________, is used to ensure that you are a human and not a computer. When sending one email to everyone in your address book, you should use the ________ field to keep their addresses private. An email ________ is a block of text that is automatically put at the end of your messages. The collection of websites that enable users to create user-generated content, connect, network, and share is called social ________. All the information someone can find out about you by searching the web is called your ________. ________ is a social network that is designed for business connections. In a virtual community, you can communicate with other people by using a(n) ________. ________ is the largest online video-hosting site in the world. ________ is the largest online image-sharing site in the world. ________ recommends music to you based on your listening preferences. A ________ is similar to an online
journal, in which you can write about anything you want to share. ________ is an example of a microblogging site that allows a limited number of characters in a post. Tweets are limited to ________ characters each. Podcasts allow time ________, so you can listen on your own schedule. You can subscribe to ________ feeds to stay up-to-date on podcasts and news feeds. ________ raises money from multiple small investors rather than a few large ones. When you trust the collective opinion of a crowd of people rather than an expert, it is known as ________. Wikis are designed for ________, which is allowing people to contribute more than just posting a response. You can use a social ________ site to save and share your favorites online. ________ sites let users evaluate hotels, movies, games, books, and other products and services. Which is an example of a social news site? Using social media to sell services is called ________. When one business provides services for another, it is a type of e-commerce called ________. When you buy a textbook online from Amazon.com, you are participating in ________ e-commerce. ________ e-commerce allows anyone to sell or trade items online. What happens when you click the padlock icon on a webpage? ________ is one of the most popular C2C websites. A Facebook ________ is used to promote an organization, a product, or a service. The # symbol used by Twitter is called a(n) ________. ________ is used to make a website easier to find by both people and
software and increases a webpage ranking in search engine results. P2P networks are normally found in ________. Each computer is considered equal in a ________ network. Which of the following statements about P2P networks is FALSE? A ________ network is a network in which all computers are considered equal. A ________ network is one that has at least one computer that provides centralized management, resources, and security. For a company that uses only two floors of an office building, all of the company's computers and printers will be connected by a ________. In a WLAN, devices are connected by ________. To connect peripherals at short ranges, you would use the ________ wireless technology. One of the most important reasons for Ethernet standards is it ________. Which of the following transmission media is NOT used to transmit signals on an Ethernet network? A
________ is a device that connects two or more networks together. Which of the following is NOT a common LAN topology? A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices. Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established. Network speeds are measured in ________ per second. Wi-Fi networks used in homes and public hotspots use the ________.
If you want to connect your home network to the Internet, you will need a ________ in addition to a modem. A ________ is a device that connects multiple devices on a LAN. Most home routers also include a built-in ________. A ________ can be set by an employer to prevent you from accessing eBay. A ________ is a network composed of a group of clients and servers under
the control of one central security database. The rules for communication between devices are called ________. The ________ protocol resolves the domain name amazon.com to an IP address. When you decide to use your neighbor's open wireless network without permission, you are ________. Moving through a neighborhood trying to locate open wireless access points is called ________. Which cybercrime is
considered to be a form of harassment? The cyberbullying of one adult by another adult, using a computer is known as ________. An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of
________. Clickjacking results in ________. An email claiming that you have won a
lottery might be an example of ________. ________ redirects you to a phony website by hijacking a domain name. ________ is an unlawful attack on computers or networks done to intimidate a government or its people. When a company pays people to hack into its own system, it calls in ________ hackers. ________ hackers hack into systems to steal or vandalize. Hacking to make a political statement is called ________. Which statement about cookies is FALSE? The
difference between a virus and a worm is a ________. Another name for the actual attack caused by a virus is a ________. Which statement about a logic bomb is FALSE? If your computer has a ________, someone else can gain access to it undetected. A ________ changes your home page and redirects you to other websites. A ________ appears to be a legitimate program, but is actually something malicious. Antivirus software uses ________ to search for known viruses.
A ________ connects two or more computers in a network. A router is a form of security because it ________. When you set up your wireless router, you should change the ________, which is also called the wireless network name. To secure your wireless network at home, you should ________. Which device on a network performs network address translation? You should use a(n) ________ account for everyday computing on a computer running Windows. When using Windows, to make changes, install hardware, or configure settings, you need to use the ________ account on your computer. Which would be the strongest password? When you enter your credit card information in a website, you know the
website is encrypted when you see ________ in the address bar. In an office acceptable use policy (AUP), which of the following might be prohibited? The ________ was created in an effort to make
it easier for victims to report cybercrimes. The ________ Act passed by the U.S. Congress in 1986 made it a crime to access classified information. A
database is a collection of ________ that has been organized in a meaningful way. In a database, a ________ stores data in rows and columns. A ________ contains the information for a single entity in the database. Which would make the best primary key in a table? In a database, title, author, publication date, and ISBN are examples of ________. ________ make data entry easier because they can be set up
to match the layout of a paper document. A ________ could be used to retrieve all the phone numbers from a student database. To print data or display it in an easy to read format, a ________ can be used. An Excel spreadsheet is an example of a(n) ________ database. In a relational vehicle database, a ________ relationship occurs when each vehicle record may link to several repair records, but each repair can link to only one vehicle. In a one-to-one relationship, both tables use the same ________ to link two records. What project was coordinated by the U.S. Department of Energy and the National Institutes of Health? Which is a type of data that can be stored in an object-oriented database? Data in a(n) ________ database are stored in data cubes. ________ allows the user to selectively
extract data from different viewpoints. The ________ database is the most popular type used by businesses. The science and telecommunication industries
would most likely use the ________ database type. Which is NOT an advantage of data normalization? A data ________ rule would prevent a user from entering text in a
date/time field. A data ________ defines the fields in a database and the type of data that each field contains. To ensure that a person does not misspell Wednesday in a field, a(n) ________ list can be used. Microsoft Office is an example of a(n) ________. Which is NOT a SQL relational keyword? The test
that a transaction processing system uses to make sure that transactions are fully completed or aren't undertaken at all is known as ________. An expert system is a computer programmed to ________. A(n) ________ is a set of rules that are used to apply a knowledge base to each situation. A(n) ________ improves over time by learning from its interactions. Which is NOT a CODIS index? ________ is the application of information technology to the field of biology. GIS is made up of datasets, also called ________, of geographically referenced
information about Earth's surface. GIS can be used by local municipalities to ________. The SDLC follows the development of a system from planning to the final stage, ________.
Which database object makes it easier to enter data into a database and displays information in an easy to read layout?form—A database object that makes it easier to enter data into a database, and displays information in an easy to read layout. GIS (Geographic Information System)—An information system that combines layers, or datasets of geographically referenced information about the surface of the earth.
When information is duplicated in multiple places it is known as data redundancy True False?Data redundancy occurs when the same piece of data is stored in two or more separate places and is a common occurrence in many businesses.
Which would make the best primary key in a table?Integer (number) data types are the best choice for primary key, followed by fixed-length character data types. SQL Server processes number data type values faster than character data type values because it converts characters to ASCII equivalent values before processing, which is an extra step.
Is a set of rules that are used to apply a knowledge base to each situation?inference engine: A set of rules for applying a knowledge base to each particular situation.
|