Internet Concepts ML Study Guide Created by Advisers

Similar documents
M3-R3: INTERNET AND WEB PAGE DESIGN

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

Common Technology Words and Definitions

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

8 9 Before: Computers are categorized into three main categories from least to most powerful: microcomputers minicomputers mainframe computers Today:

How does the Internet Work? The Basics: Getting a Web Page. The Basics: Getting a Web Page. Client-Server model. The Internet: Basics

An internet or interconnected network is formed when two or more networks are connected.

Introduction to Internet, Web, and TCP/IP Protocols SEEM

Internet composed of 5 major components. Overview of the Internet. The Internet. The Internet. Internet Geek-Speak. World Wide Web

Overview of the Internet

INFS 321 Information Sources

CONTENTS. Internet Basics. Internet Explorer. Search Engines. . Advantages and Disadvantages of the Internet. Some good websites

Internet. Class-In charge: S.Sasirekha

Introduction to the Internet

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning

The Basics of Networking

DESCRIPTION OF TYPICAL NETWORK SERVICES ON SERVERS

Objectives. Connecting with Computer Science 2

Secure Recipient Guide

Resource:

Lesson-1 Computer Security

Full file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Business Data Communications and Networking

M3-R3: INTERNET AND WEB DESIGN

Introduction to Internet

CHAPTER2. 1. The Internet was launched in 1969 and was originally called

Chapter 10: Application Layer

The Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP)

Using the Internet and the World Wide Web

Introduction to the Internet. Part 1. What is the Internet?

Full file at

4. The transport layer

How many people are online? As of Sept. 2002: an educated guess suggests: World Total: million. Internet. Types of Computers on Internet

Word Found Meaning Innovation

Computer Networks. Computer Networks. Telecommunication Links. CMPUT101 Introduction to Computing - Spring Chapter 12: Computer Networks 1

Emptying the trash...18 Webmail Settings...19 Displayed Name...19 Sort by...19 Default font style...19 Service language...

Downloaded from

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

A1 ASSIGNMENT TERMINOLOGY.

3 The Internet and the electronic mail

Contents. Management. Client. Choosing One 1/20/17

. Help Documentation. This document was auto-created from web content and is subject to change at any time. Copyright (c) 2019 SmarterTools Inc.

GRADE 11 NOVEMBER 2012 COMPUTER APPLICATIONS TECHNOLOGY P2

STUDY GUIDE CHAPTER 7

5/17/2009. Networked Computers Change Our Lives. People Are More Interconnected. Nowhere Is Remote. English Is Becoming a Universal Language

6. Something which has easily understood instructions is said to be: 1) User friendly 2) Information 3) Word Processing 4) Icon 5) None of these

Introduction. Logging in. WebMail User Guide

WEBppliance for Windows User Administrator's Help

Networking and the Web Reminder: Next Quiz on 4/15

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Twitter Basics at the Deerfield Public Library

Cyber Security Practice Questions. Varying Difficulty

Özgür ZEYDAN (PhD.)

From administrivia to what really matters

= a hypertext system which is accessible via internet

Connecting with Computer Science Chapter 5 Review: Chapter Summary:

Post Evaluation Cyberspace Pursuit 2005

Glossary

IT1403: Internet and World Wide Web Multiple Choice Question Paper

Chapter 3. The Basics of Networking

Hostopia WebMail Help

Grade: 5 Cyber Olympiad Qualifier Set: 2

KULLEĠĠ SAN BENEDITTU Boys Secondary, Kirkop

Internet Structural View. The Internet software layers. Package-shipping example TCP UDP

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Netiquette. IT Engineering II Instructor: Ali B. Hashemi

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

Introduction. Logging in. WebQuarantine User Guide

SECURING INFORMATION SYSTEMS

The Office, Procedures and Technology Chapter 3 Test 1

Objectives. Introduction to HTML. Objectives. Objectives

Downloaded from

Unit A: Computer and Internet Basics

1 Adda247 No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

7.1. Browsing CHAPTER. The Internet. Web Browser software

ENG224 INFORMATION TECHNOLOGY Part I 3. The Internet. 3. The Internet

Computer networks 2013

This is a list of vocabulary related to information and communication technology. Coloque el significado en español sobre las líneas.

The Internet, Intranets, and Extranets Chapter 7

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking

ZENworks for Desktops Preboot Services

IBPS Practice Exam 1. 1.What is the ultimate purpose of Defragmentation? 1) Make the PC faster 2) Create More Free Space 3) Delete temporary files 4)

networks List various types of networks and their

UNIT I. A protocol is a precise set of rules defining how components communicate, the format of addresses, how data is split into packets

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Part 1: BASIC INTERNET

EEC-682/782 Computer Networks I

(electronic mail) is the exchange of computer-stored messages by telecommunication.

Introduction to

Basic Computer Skills: An Overview

Typical Network Uses

WEB TECHNOLOGIES CHAPTER 1

Chapter 11: Wide-Area Networks and the Internet

IT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

Chapter 4: Networking and the Internet

Chapter 18: The Internet. The Internet Evolution and basic services on Internet World Wide Web (WWW) WWW browsers Uses of the Internet

UNIQUE IAS ACADEMY- COMPUTER QUIZ 2

Transcription:

Description of Internet Concepts ML: The written objective test may consist of general information about the Internet, world wide web, browsers, e-mail, computer security, ethics, and privacy. 1 It is considered appropriate to use smiley faces in professional e-mail messages. TRUE FALSE 2 Why are prepositions, conjunctions, and pronouns usually considered poor choices to use as keywords? These words must be put in quotes. Most web pages contain these words URLs only use nouns in addresses They are confused with suffix markers 3 What kind of organization would most likely have a URL that ends with the suffix.edu? A government agency A non-profit organization A business A School 4 What is Netiquette? Treat others as badly as they treat you. Be polite online and others will do the same. Repeat messages over and over so others don't get a chance to talk. Call people names when they do something you don't like. 5 Which of the following is used in creating webpages? HMLT LAN HTML RAID 6 When you download your email messages, you notice a large amount of inappropriate or unwanted messages. This inappropriate email technique is referred to as Dumping Spamming Slamming Trashing 7 When you bcc: someone on a email you send emails to everyone in your address book send an email to someone but hide the other bcc recipients send emails to your entire department send spam to all email users on your email server 8 The acronym TCP/IP stands for Transmission Control Protocol/Internet Protocol Terminal Call Program/Internal Program Timing Considered Positive/Insert Point Transmission Call Protocol/Internet Program Page 1 of 8

9 What is cloud computing? A model for delivering information technology services in which resources are retrieved from a direct connection to a service. The internet is connected to the clouds to retrieve information. The clouds connect to the Internet to deliver information. A model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. 10 What is SPAM? Is a dangerous virus, distributed through e-mail Unsolicited e-mail A special filetype, used for exchanging files via e-mail Plays an important role as part of the netiquette 11 A router Organizes the part of the network your computer belongs to Determines the complete route from sender to recipient Sends messages from one network into another network Manages a list containing the names of all machines in the network 12 A computer firewall Prevents a fire from spreading through your computer Software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer Protect important machines from physical hazards Keeps the temperature in computer rooms at an acceptable level 13 A four-part number separated by periods that uniquely identifies a machine on the Internet. IRC IP LAN 14 A language computers use when talking to each other. IP LAN IRC 15 A group of connected computers, usually located in close proximity so data can be shared among them. IP Links WAN LAN 16 A three letter extension used to identify a graphic image Jpg Doc Exl Ppt 17 A four-part number separated by periods that uniquely identifies a machine on the Internet. IRC IP LAN Page 2 of 8

18 A language computers use when talking to each other. IP LAN IRC 19 A group of connected computers, usually located in close proximity so data can be shared among them. IP Links WAN LAN 20 22 23 24 25 26 27 Page 3 of 8

28 Which of the following information protocols is for running programs on remote computers? Telnet E-Mail Usenet News File Transfer Protocol 29 America Online, Comcast, and Earthlink are examples of. Email Service Providers Internet Service Providers Cable TV Providers Web-Based Information Service Providers 30 The first Internet developed was known as. Internet ARPANET HTML Protocol URL Provider 31 An email protocol that only allows you to send emails and not receive emails is referred to as. SMTP POP IMAP Webmail 32 33 34 35 36 A router: organizes the part of the network your computer belongs to determines the complete route from sender to recipient sends messages from one network into another network manages a list containing the names of all machines in the network Page 4 of 8

37 Spam: is a dangerous virus, distributed through e-mail plays an important role as part of the netiquette is unsolicited e-mail is a special file type, used for exchanging files via e-mail 38 Impersonate someone else, in order to get illegal access to a server(program) is called: hacking spoofing tracking pinging 39 Which is not essential as a technique used for the interaction between brower and web server: URL WWW HTTP HTML 40 What does the term html stand for? Hyper-text manage link Hyper-text middle line Hyper-text markup language Hyper-text markup link 41 Which statement is false? Hacking is similar to breaking and entering. Hacking is a crime. Hacking involves breaking a computer into pieces. Hacking is unethical. 42 An attempt to gather personal information online is called: Phishing Spying Hacking Plagiarizing 43 What does html stand for? Half Text Making Language Hyper-text Markup Language HoTMaiL Hypo-text Markup Language 44 A computer is a type of microcomputer that is designed to meet the needs of a individual. Digital Mini Personal mainframe 45 One billion bytes is called a, and typical hard disk sizes range from 10 to 75 billion bytes dekabyte (D Kilobyte (K Gigabyte(G Megabyte(M 46 Printer resolution is measured by the number of a printer can output. Dots per inch (dpi) Characters per page (cpp) Bits per centimeter (bpc) Pixels per segment (pps) Page 5 of 8

47 In a Web page URL, the identifies the Web site, which is stored on a Web server. Path protocol hypertext Domain name 48 The first browser was. Mosaic Netscape Communicator Internet Explorer None of the above 49 The protocol defines how messages are formatted and transmitted. http Html www Tcp/ip 50 When using a browser, click the, which reloads the current Web page. Refresh Reload Return Either A or B 51 Links that are no longer active. Outdated links Expired links Dead links Expended links 52 What is a URL (Uniform Resource Locator)? The location of the server. A local area network connection. It is the global address of documents and Other resources on the web. A WAN 53 What is a LAN? Local area network Wide area network The Internet WWW world wide web 54 What is a WAN? Wide area network Local area network Company s server School system s network 55 What does this extension in a file name tell you? html It is a presentation file It is a web page It is a spreadsheet It is a locked file Page 6 of 8

Internet Concepts--ML Study Guide Created by Advisers ANSWER KEY 1 B 21 NO QUESTION 41 No Answer Given 2 B 22 D 42 No Answer Given 3 D 23 A 43 No Answer Given 4 B 24 B 44 C 5 C 25 D 45 C 6 B 26 C 46 B 7 B 27 D 47 D 8 A 28 A 48 A 9 D 29 B 49 A 10 B 30 B 50 A 11 C 31 A 51 C 12 B 32 A 52 C 13 C 33 D 53 A 14 A 34 C 54 A 15 D 35 B 55 B 16 No Answer Given 36 C 17 C 37 C 18 A 38 A 19 D 39 A 20 B 40 C Page 7 of 8