the internet is
a large network of networks
a web site that allows anyone to add or edit content is called a
wiki
the text version of a web sites internet address is called the
url
the world wide web was invented by
tim berners-lee at CERN
webcasts differ from podcasts in that webcasts
are not updated automatically
in the url http://prenalhall.com, the portion labled .com is the
top level domain
a key word or term that is assigned to a piece of information such as a web page, digital image, or video and describes the site so that it can be found again by browsing or searching
tag
the internet backbone refers to
the main pathway of high-speed communications lines through which all the internet traffic flows
the agency that first began funding the internet was called the
advanced research projects agency network
the s in https stands for
secure socket layer
a list of pages within a web site that you have visited and that usually appears at the top of a page is reffered to as a
breadcrum trail
search engines have which three parts
a spider, an indexer, and a search engine software
the internet and the world wide web are the same thing
false
the internet is the largest computer network in the world
true
the primary use for the internet is searching
false
the web is simply a means of accessing information over the internet
true
there are virtually no privacy risks in using todays newest social networking sites
false
security is not much of a concern when working on a wireless network
false
when shopping on the web, it is better to pay for your purchases with a debit card rather than a credit card
false
the internet protocol used to upload and download files is http
false
when evaluating a website, testing the relevancy of a site means checking to see if the information in the site is current
true
the # sign ca nbe used as a wildcard when conducting searches with most search engines
false
most public wifi hot spots are secured
false
the ________ is a world wide computer network
internet
a _________ is a clip of audio or video that is broadcast over the internet using compressed files
podcast
specially coded text that can be clicked on to access another web page is referred to as a
hyperlink
rather than passing documents back and forth, businesses are starting to use ________ as means of collaboration
wikis
a popular collaborative online encyclopedia
wikipedia
______ is anything that involves one or more forms of media in addition to text
multimedia
a browsers _______ list shows all the web sites and pages that you have visited over a period of time
history
if you want to share your internet connection with more than one computer you will need a
router
_____ is an ongoing project sponsored by over 300 universities to develop new internet technologies
internet2
according to the fbi, how much identity theft begins with emial?
two thirds
of the following which is not a way to protect yourself from identity theft
make all online purchases with a debit card
a virus taht is programmed to destroy pc files on a specific date is known as what kind of virus?
time bomb
which statement is not true reguarding antivirus programs
they always detect every virus on a pc
hardware or software designed to guard against unauthorized access to a computer network is known as a
firewall
the majority of computer crimes are committed by
company employees
the name for harrassment over the internet is
cyberstalking
using deception to get individuals to reveal sensistive information is also known as a ______ attack
social engineering
a program that masquerades as a useful program, but is really a destructive program is a
trojan horse
which type of virus uses computer hosts to reprodue itself
worm
whta is the name of an application program that gathers users information and sends it to someone through the internet
spybot
when you visit certain websites, spyware may be automatically downloaded, this is called a
drive-by download
a programmed attack that destroys data files if a programmer is ever terminated is an example of what tiem of trojan horse
logic bomb
_______ is the measurement of things such as fingerprints and retinal scans used for security access
biometrics
what is the most common tool used to restrict access to a computer system
passwords
the scrambling of code in an email message ca nbe done using
cryptography
an intentionally disruptive program that spreads either from program to program or from disk to disk is known as a
virus
security procedures eliminate all risks to computers
false
smart cards and biometrics are two ways companies may add physical security to computer systesm
true
software that allows different levels of security per user is know as access control software
true
a public key is only available to the user originating a message
false
the most widely used data recovery techniques is making regular backups
true
information can be recovered from a hard drive even after the file has been deleted
true
computer crime often goes unreported because businesses fear negative pubilicity
true
an email message claiming your facebook account has been hacked and you need to click on a link to restore your account is an example of a
phishing
when you use a disk or usb jump drive in several different computers on the same day, you are taking the chance of contracting a
virus
______ programs search for and eliminate viruses
antivirus
a security _____ is a software program that closes possible security breaches in the operating system
patch
an encryption _________ is the secret numerical code a user will utilize to encrypt a message
key
most _________ allow you to connect wireless and wired computers together
wireless router
which of the following is not an example of a WAN
LANs connected in a single building
the most common type of home network is a
p2p
sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network
routers and switches
a computer network is defined as tow or more computers connected with ______ so that they can communicate with each other
software and hardware
one way to increase security on a network is by installing a
firewall
WPA stands for
wifi protected access
throughput, the actual speed of data transfer that is achieved in a network is ususally
less than or equal to the data transfer rate
a wireless network uses which of the following as its transmission medium
radio waves
a client computer is the computer on which users accomplish specific tasks
true
the internet is an example of a client/server network
true
p2p networks are more commonly used in small businesses that in homes
false
a single computer can function as both a client and a server, but performance will be degraded
true
limiting your signal range does not help increase wireless network security
false
wireless networks are more vulnerable to attack than wired networks
ture
WEP is a stronger form of security than WAP
false
a firewall can come in either software or hardware form
true
many cities in the united states are now deploying __________ to provide internet access to residents and tourists
MANs
a _______ network is one in which each computer can communicate directly with each other, instead of having a seperate device exercise central control over the entire network
P2P
________ transfer data between two or more networks
routers
_______ is a method of translating data into code
encryption
________ refers to the act of connecting to a wireless connection without the permission of the owner
piggybacking
_________ is the actual speed of a data transfer that is achieved on a network
throughput
the 802.11 wireless standard is also know as
wifi
public places where you can wirelessly connect to the internet are known as
hotspots
WE WILL WRITE A CUSTOM ESSAY SAMPLE ON
CIS SPECIFICALLY FOR YOU
FOR ONLY $13.90/PAGE