CMPTR2_Ch05-06

active tab
the tab that appears to be on the top in a browser window
Application Service Provider
Aka:ASP. A company that manages and distributes software-based services over the internet.
ARPANET
The predecessor to the internet, named after the Advanced Research Projects Agency (ARPA), which sponsored its development.
attachment
a file that you send with an email message
Blog
A Web page that contains short, frequently updated entries in chronological order, typically by just one individual.
Broadband over Fiber/ Fiber-to-the-premises (FTTP)
Aka: BoF/ FTTP. Very fast, direct internet access via fiber-optic networks.
Cable Internet Access
Fast, direct Internet access via cable TV lines.
contact
each person or organization with whom you communicate and about whom you store information
Conventional Dial-up Internet Access
Dial-up Internet access via standard telephone lines.
cookie
a small file stored on a user’s hard drive by a Web server, commonly used to identify personal preferences and settings for that user
Digital Subscriber Line
Aka: DSL. Fast, direct internet access via standard telephone lines.
DSL (Digital Subscriber Line) Internet access
fast, direct Internet access via standard telephone lines
e-Commerce
Online financial transactions.
e-Portfolio
A collection of an individual’s work accessible via the web.
favorite
a shortcut to a web page saved in a list
feed
frequently updated web site content such as news or blogs delivered directly to your browser
Fixed Wireless Internet Access
Fast, direct Internet access available in some areas via the airwaves.
history list
a list that tracks the web pages you visit over a certain time period
Hit
A link that matches search criteria in a search site.
home page
the page that appears when you start a browser
Instant Messaging
Aka: IM. A way of exchanging real-time typed messages with other individuals.
Internet 2
a consortium of researchers, educators, and technology leaders from industry, govt. and the international community that is dedicated t othe development of revolutionary Internet technologies.
Internet Content Provider
A person or an organization that provides Internet content.
Internet is used by what percent of the U.S. population
75%
Internet Service Provider
Aka: ISP. A business or an organisation that provides internet content.
Keyword
A word typed in a search box on a search site or other web page to locate information related to that keyword.
load
to copy a Web page from a server to a computer
Microblog
Very short messages, called updates, posted to a microblogging service that others can read.
Mobile Wireless Internet Access
Internet access via a mobile phone network.
Mosaic web browser
1993
Podcast
A recorded audio or video file that can be played or downloaded via the Web.
Satellite Internet Access
Fast, direct Internet access via the airwaves and a satellite dish.
Search Engine
A software program used by a search site to retrieve matching web pages from a search database.
Search Phrase
Multiple keywords.
Search Site
A Web site designed to help users search for Web pages that match specified keywords or selected categories.
Social Networking Site
A site that enables a community of individuals to communicate and share information.
tab group
a collection of related tabs
Text Messaging
A way of exchanging real-time typed messages with other individuals via a cellular network and, typically, cell phones.
third party cookie
a cookie placed on your hard drive by a company other than the one associated with the Web pages that you are viewing
Tim Berners-Lee
proposed the internet in 1989
tweeting
sending short status updates about your current activities via the Twitter service
Two problems with early internet
1. required a computer / 2. was hard to use
users
people who use the internet
Voice over Internet Protocol (VoIP)
the process of placing telephone calls via the Internet
Web Conference
A face-to-face meeting that takes place via the Web.
Web Slice
a portion of a web page that is frequently updated and delivered to your browser
Webinar
A seminar presented via the Web.
What is the amount of money for US online sales
335 billion
Wi-Fi Hotspot
A location that provides wireless Internet access to the public
Wiki
A collaborative Web page that is designed to be edited and republished by a variety of individuals.
____ has a typical speed of 10-25 Mbps, and is the most widely used type of home broadband connection.
Cable Internet
____ is available in selected areas, uses transmission towers, and can reach speeds typically up to 6 Mbps.
Fixed wireless
____ is often the only broadband option for rural areas.
Satellite
DSL requires users to be within ____ of a telephone switching station.
3 miles
E-mail’s ____ technology lets you send messages to any users on the Internet, even if they do not have their computers turned on.
store-and-forward
Email is typically transmitted ____.
over public media
Facebook is an example of a(n) ____ site.
social networking
Google, Yahoo!, and Bing are all examples of ____.
search sites
Internet2 is ____.
a research and development tool to help create technologies that will ensure the Internet can keep up with future applications
More than ____ of all home Internet connections in the United States are broadband.
two-thirds
Most Internet connections today are ____ (always-on) connections.
direct
Only ____ email can be transmitted safely and privately.
encrypted
Search engines return a list of links to Web pages that match your search criteria, called ____.
hits
SMS can transmit up to ____ characters in one message.
160
Text messaging is also known as ____.
SMS
The biggest advantage of VoIP is ____.
cost savings
The concept of ____ refers to the idea that the Internet is designed for all content to be treated equally.
net neutrality
The Mosaic Web browser was released in ____.
1993
The term podcast comes from ____.
the original iPod
To conduct a Web search, you type ____ into a search box on a search site.
keywords
To ensure a unique email address for everyone in the world, usernames must be unique within each ____.
domain name
Today, the standard term for placing telephone calls over the Internet is ____.
VolP
Twitter is a free and popular ____ service.
microblogging
When shopping at an e-commerce Web site, make sure you only enter payment information on a secure Web page, one with a URL that begins with ____.
https
Question 1: Text messaging is also known as ____. [IM / VoIP / SMH / * SMS
SMS
Question 2: Facebook is an example of a(n) ____ site. [wiki / Webinar / * social networking / ISP
social networking
Question 3: Cable Internet service requires ____. [* a cable modem / a satellite receiver / a cable TV subscription / digital telephone lines
a cable modem
Question 4: Most Internet connections today are ____ (always-on) connections. [scaled / dial-up / lossless / * direct
direct
Question 5: A social networking site is any site that creates a community of individuals who can communicate with and/or share information with one another. [* true / false
true
Question 6: Email is typically transmitted ____. [in encrypted form / at times of low Internet usage / * over public media / through a VPN
over public media
Question 7: According to the text, about ____% of online music is now accessed via a mobile device. [85 / * 70 / 25 / 40
70
Question 8: Verizon’s FiOS service uses fiber-optic cabling to provide direct broadband Internet access to people’s homes. [* true / false
true
Question 9: The Mosaic Web browser was released in ____. [* 1993 / 1969 / 1989 / 2001
1993
Question 10: Only ____ email can be transmitted safely and privately. [work / * encrypted / logged / Web-based
encrypted
Question 11: Internet content providers are the suppliers of the information that is available through the Internet. [* true / false
true
Question 12: ____ is usually a more one-way communication than ____. [* A Webinar, a Web conference / IMing, VoIP / A Web conference, a Webinar / VoIP, a Webinar
A Webinar, a Web conference
Question 13: Online classified ads are the most common way to purchase items online from other individuals. [True / * False
False
Question 14: Today, the standard term for placing telephone calls over the Internet is ____. [Internet telephony / podcasting / cyberchatting / * VoIP
VoIP
Question 15: More than ____ of all home Internet connections in the United States are broadband. [three-quarters / 90% / * two-thirds / one-third
two-thirds
Question 16: To ensure a unique email address for everyone in the world, usernames must be unique within each ____. [region / * domain name / hub / nation
domain name
Question 17: Tim Berners-Lee proposed the idea of the World Wide Web in 1989. [* true / false
true
Question 18: A video call between two individuals would constitute a basic Web conference. [* true / false
true
Question 19: ____ enable users to create and edit collaborative Web pages quickly and easily; they are intended to be modified by others and are especially appropriate for collaboration. [Cookies / Blogs / * Wikis / IMs
Wikis
Question 20: Internet2 is ____. [applications that allow people to collaborate, socialize, and share information online / nonexistent / * a research and development tool to help create technologies that will ensure the Internet can keep up with future applications / a new network designed to eventually replace the Internet
a research and development tool to help create technologies that will ensure the Internet can keep up with future applications
Question 21: Twitter is a free and popular ____ service. [* microblogging / podcast / wiki / macroblogging
microblogging
Question 22: Words you type into a search engine to conduct a search are called spiders, or Web crawlers. [True / * False
False
Question 23: According to the text, no matter what kind of Internet connection setup you arrange for your computer, you will likely need to select these two things: ____. [WiFi channel, payment method / * a username and a payment method / RJ-45 wiring & coaxial cabling / phone number, username
a username and a payment method
Question 24: When shopping at an e-commerce Web site, make sure you only enter payment information on a secure Web page, one with a URL that begins with ____. [a deadbolt symbol / * https / SEC-http / http
https
Question 25: ____ is an example of a photo-sharing site. [* Flickr / MySpace / Xfinity / Hulu
Flickr
Question 26: The URL for Web pages using SSL begins with https:. [* true / false
true
Question 27: ____ databases contain demographic data that is used for sending advertisements that fit an individual’s interests. [* Marketing / Opted / Pharm / Government
Marketing
Question 28: A ____ is a program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to. [* virus / worm / Trojan horse / DDoS
virus
Question 29: A ____ Web site is a fraudulent site that has been set up to be indistinguishable from the legitimate site it is pretending to be. [spear phished / phramed or framed / sponged / * spoofed
spoofed
Question 30: The term ____ encompasses any illegal act involving a computer. [Websparring / Nethacking / * Cybercrime / Wardriving
Cybercrime
Question 31: Symantec’s MessageLabs recently estimated that more than ____ percent of all email messages is spam. [10-15 / * 90 / 99 / 50
90
Question 32: Presence technology is the ability of one computing device on a network to identify another device on the same network and determine its status. [* true / false
true
Question 33: ____ emails are directly targeted to a specific individual, usually in order to steal intellectual property. [Potshot / Pharming / PhinePrint / * Spear phishing
Spear phishing
Question 34: According to FBI statistics, the recovery rate of a lost or stolen personal computer is about ____ percent. [* 2-3 / 10 / 22 / 60
2-3
Question 35: A fingerprint reader is an example of a(n) ____ access system. [* biometric / holistic / trivial / ephemeral
biometric
Question 36: Maliciously altering the content of a competitor’s commercial Web site is an example of ____ is an act of malicious destruction to a computer or computer resource. [* computer sabotage / a dot con / cracking / Cyberterrorism
computer sabotage
Question 37: The technical term for the complete malfunction of a computer system is ____. [* system failure / file corruption / BSOD / asset demechanization
system failure
Question 38: ____ refers to following a predesignated procedure to remove yourself from marketing lists. [Downsizing / Deprofiling / * Opting out / Rabbitholing
Opting out
Question 39: FDE devices are designed to withstand much more physical abuse than conventional devices. [* false / true
false
Question 40: The best protection against many dot cons is ____. [a proactive local police force / * protecting your identity / frequent change of email addresses / a hardware and software firewall
protecting your identity
Question 41: ____ occurs when someone obtains enough information about a person to be able to masquerade as that person. [* Identity theft / Data theft / Spoofing / Pharming
Identity theft
Question 42: A group of zombie computers controlled by one individual, working together in a coordinated fashion, is called a(n) ____. [etherbomb / * botnet / wardriver / zero-day threat
botnet
Question 43: The ____ Act has been controversial ever since implementation in 1998, and in fact has never been implemented. [CAN-SPAM / PROTECT / NET / * COPA
COPA
Question 44: ____ devices are designed to withstand much more physical abuse than conventional devices. [* Ruggedized / Modulated / Encapsulated / Hard-dipped
Ruggedized
Question 45: The text recommends all of the following for creating strong passwords EXCEPT ____. [* stringing together easy-to-remember family names / using at least eight characters / creating a password from an easy-to-remember passphrase / using a combination of upper- and lowercase letters
stringing together easy-to-remember family names
Question 46: A UPS is designed to provide enough power for a computer to remain briefly powered up if the electricity goes off. [ / * true / false
true
Question 47: ____ refers to unsolicited email sent to a large group of individuals at one time. [Profiling / * Spam / Salami / Phish
Spam
Question 48: Market filtering refers to following a predesignated procedure to remove yourself from marketing lists, or otherwise preventing your personal information from being obtained or shared by others. [True / * False
False
Question 49: A ____ is a type of malware that masquerades as something else. [switchbot / worm / zombie / * Trojan horse
Trojan horse
Question 50: The term hot site is related most closely to the term ____. [marketing database / * disaster recovery plan / Wi-Fi network / security software
disaster recovery plan