the internet is
a large network of networks
a web site that allows anyone to add or edit content is called a
the text version of a web sites internet address is called the
the world wide web was invented by
tim berners-lee at CERN
webcasts differ from podcasts in that webcasts
are not updated automatically
in the url, the portion labled .com is the
top level domain
a key word or term that is assigned to a piece of information such as a web page, digital image, or video and describes the site so that it can be found again by browsing or searching
the internet backbone refers to
the main pathway of high-speed communications lines through which all the internet traffic flows
the agency that first began funding the internet was called the
advanced research projects agency network
the s in https stands for
secure socket layer
a list of pages within a web site that you have visited and that usually appears at the top of a page is reffered to as a
breadcrum trail
search engines have which three parts
a spider, an indexer, and a search engine software
the internet and the world wide web are the same thing
the internet is the largest computer network in the world
the primary use for the internet is searching
the web is simply a means of accessing information over the internet
there are virtually no privacy risks in using todays newest social networking sites
security is not much of a concern when working on a wireless network
when shopping on the web, it is better to pay for your purchases with a debit card rather than a credit card
the internet protocol used to upload and download files is http
when evaluating a website, testing the relevancy of a site means checking to see if the information in the site is current
the # sign ca nbe used as a wildcard when conducting searches with most search engines
most public wifi hot spots are secured
the ________ is a world wide computer network
a _________ is a clip of audio or video that is broadcast over the internet using compressed files
specially coded text that can be clicked on to access another web page is referred to as a
rather than passing documents back and forth, businesses are starting to use ________ as means of collaboration
a popular collaborative online encyclopedia
______ is anything that involves one or more forms of media in addition to text
a browsers _______ list shows all the web sites and pages that you have visited over a period of time
if you want to share your internet connection with more than one computer you will need a
_____ is an ongoing project sponsored by over 300 universities to develop new internet technologies
according to the fbi, how much identity theft begins with emial?
two thirds
of the following which is not a way to protect yourself from identity theft
make all online purchases with a debit card
a virus taht is programmed to destroy pc files on a specific date is known as what kind of virus?
time bomb
which statement is not true reguarding antivirus programs
they always detect every virus on a pc
hardware or software designed to guard against unauthorized access to a computer network is known as a
the majority of computer crimes are committed by
company employees
the name for harrassment over the internet is
using deception to get individuals to reveal sensistive information is also known as a ______ attack
social engineering
a program that masquerades as a useful program, but is really a destructive program is a
trojan horse
which type of virus uses computer hosts to reprodue itself
whta is the name of an application program that gathers users information and sends it to someone through the internet
when you visit certain websites, spyware may be automatically downloaded, this is called a
drive-by download
a programmed attack that destroys data files if a programmer is ever terminated is an example of what tiem of trojan horse
logic bomb
_______ is the measurement of things such as fingerprints and retinal scans used for security access
what is the most common tool used to restrict access to a computer system
the scrambling of code in an email message ca nbe done using
an intentionally disruptive program that spreads either from program to program or from disk to disk is known as a
security procedures eliminate all risks to computers
smart cards and biometrics are two ways companies may add physical security to computer systesm
software that allows different levels of security per user is know as access control software
a public key is only available to the user originating a message
the most widely used data recovery techniques is making regular backups
information can be recovered from a hard drive even after the file has been deleted
computer crime often goes unreported because businesses fear negative pubilicity
an email message claiming your facebook account has been hacked and you need to click on a link to restore your account is an example of a
when you use a disk or usb jump drive in several different computers on the same day, you are taking the chance of contracting a
______ programs search for and eliminate viruses
a security _____ is a software program that closes possible security breaches in the operating system
an encryption _________ is the secret numerical code a user will utilize to encrypt a message
most _________ allow you to connect wireless and wired computers together
wireless router
which of the following is not an example of a WAN
LANs connected in a single building
the most common type of home network is a
sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network
routers and switches
a computer network is defined as tow or more computers connected with ______ so that they can communicate with each other
software and hardware
one way to increase security on a network is by installing a
WPA stands for
wifi protected access
throughput, the actual speed of data transfer that is achieved in a network is ususally
less than or equal to the data transfer rate
a wireless network uses which of the following as its transmission medium
radio waves
a client computer is the computer on which users accomplish specific tasks
the internet is an example of a client/server network
p2p networks are more commonly used in small businesses that in homes
a single computer can function as both a client and a server, but performance will be degraded
limiting your signal range does not help increase wireless network security
wireless networks are more vulnerable to attack than wired networks
WEP is a stronger form of security than WAP
a firewall can come in either software or hardware form
many cities in the united states are now deploying __________ to provide internet access to residents and tourists
a _______ network is one in which each computer can communicate directly with each other, instead of having a seperate device exercise central control over the entire network
________ transfer data between two or more networks
_______ is a method of translating data into code
________ refers to the act of connecting to a wireless connection without the permission of the owner
_________ is the actual speed of a data transfer that is achieved on a network
the 802.11 wireless standard is also know as
public places where you can wirelessly connect to the internet are known as