What feature allows you to connect a camera directly to a printer?
PictBridge

Which is a drawback of point-and shoot cameras?
You can't change the lens

Which type of camera has the least shutter lag?
D-SLR

What is necessary for your camera to connect to your computer using a USB or FireWire cable?
Device driver

Which audio file type is most commonly used for music files?
MP3

Which media player is designed to transfer media to an iOS device?
iTunes

What process allows media to begin to play immediately as it is being received?
Streaming

Which is not an iOS device?
Android

Why might you carry a tablet instead of a notebook?
to take pictures, listen to music, and for longer battery life

Why is a smartphone considered a convergence device?
It has features of a PDA and a portable media player.

You can change the lens on a compact system camera (t/f)
true

Resolution has the most impact on the size of photo print you can make (t/f)
true

D-SLRs are subject to shutter lag (t/f)
false

Once full, memory cards cannot be reused (t/f)
false

Editing digital images requires expensive software (t/f)
false

Once you post an image on an online photo sharing site, anyone can view it (t/f)
false

Webcasts can be live or pre-recorded (t/f)
true

Speech recognition software is built into most modern operating systems (t/f)
true

Portable media players that use flash memory for storage have lower capacities than those that have hard drives (T/F)
true

An e-reader is a tablet designed for reading books (t/f)
true

________________ is the measure of the number of pixels in an image and is expressed in megapixels.
Resolution

The time between pressing the button and the camera snapping the picture is called _______________
shutter lag

Optical __________ uses a lens to change the focal length of the camera
zoom

Labeling images with keywords, or _____________ them, makes it easier to find your pictures later.
tagging

An industry standard that allows a camera to connect directly to a printer is ____________
PictBridge

To use ________________ software you might need to train it to recognize your speech patterns
speech recognition

_____________ is a technology that is applied to digital media files, such as music, eBooks, and videos, to impose restrictions on the use of these files.
Digital rights management (DRM)

________________ software tools allow you to create a video of what happens on your computer screen.
Screen capture

Broadcasting on the Web, or ______________ , can be used to stream a live performance or lecture.
webcasting

______________ allow you to carry with you thousands of songs and podcasts (and perhaps photos, videos, and games), so you can listen to them wherever you are.
Portable media players

The original Internet was called
ARPANET

The broadband Internet service that runs over fiber optic cable is
FTTH

A(n) _______ is a company that offers Internet access
ISP

The default Web browser on a Mac is
Safari

You can view multiple Web pages in most browsers using
tabs

A(n) _______ is a third- party program that extends the functionality of a Web browser.
add-on

Examples of _________ include .com, .gov, and .edu
TLDs (top-level domains)

The ___________ allows you to type a URL in your browser instead of an IP address.
DNS (Domain Name System)

One way to evaluate a website's credibility is to look for a ________ TLD
restricted

Check the ______ on a website for the credentials of the author or organization.
About Us page

The Internet was developed in 1991 by Tim-Berners Lee (T/F)
false

There are five Internet Exchange Points around the world (t/f)
false

The Internet2 project evolved from the original NSFNET (t/f)
true

Outside of your home, you share your DSL with your neighbors (t/f)
false

Because it uses satellites, WiMAX is available in remote locations (t/f)
false

Most Web pages can't be viewed in a mobile browser (t/f)
false

Adobe Flash Player is a popular Web browser (t/f)
false

It's generally not necessary to type http:// when entering a URL in your browser (t/f)
true

Every node on the Internet must have a unique IP address (t/f)
true

Much of the Internet consists of user-generated-content that should be critically evaluated (t/f)
true

The ____________________ is the high-speed connection point between networks
internet backbone

The ______________ is the part of the Internet that uses hypertext to connect pieces of information
World Wide Web

__________ is broadband over digital telephone lines
DSL

Internet access that exceeds 200 Kbps is considered ____________
broadband

The two formats of 4G internet access are _____ and ________
LTE and WiMAX

Basic web pages are written in _____
HTML

Internet Explorer, Firefox, and Safari are examples of ___________
web browsers

The _____________ is the Web page that appears when you open your browser.
home page

Another term for the address of a website is ______
URL

The ____ gov is restricted to government websites.
TLD

What form of online communication happens in real time between two people?
instant messaging

What are synchronous online conversations between multiple people at the same time?
Chats

Email is a ____________ form of online communication
store-and-forward

Which field prevents multiple recipients from seeing each others' email addresses?
Bcc:

A(n) ________ is an online game in which players interact with people in real time in a virtual world using an avatar.
MMORPG

Facebook and LikedIn are examples of
social networks

Your _________ is all the information that someone could find out about you by searching the Web, including social network sites.
digital footprint

What service is used to distribute Web feeds to subscribers?
RSS

In which type of social media are posts are limited to a small number of characters and users post updates frequently?
Microblog

_______ is the practice of using social media sites to sell products and services
SMM

VoIP is a service that allows phone calls to be transmitted over the Internet instead of traditional phone lines (t/f)
true

Email is private and can't be read by others (t/f)
false

Email is a form of synchronous communication (t/f)
false

A viral video spreads computer viruses (t/f)
false

The social tagging of Web media is known as folksonomy (t/f)
true

Social media is a collection of tools that enable users to create user-generated content, connect, network, and share (t/f)
true

You can listen to some podcasts directly from their websites without a podcast client (t/f)
true

Like a blog, a wiki usually has only one author (t/f)
false

Crowd-sourcing means trusting the collective opinion of a crowd of people rather than that of an expert (t/f)
true

Social media marketing is designed to get more subscribers on social networks (t/f)
false

___________online communication happens in real time.
Synchronous

A __________, or discussion board, is an asynchronous form of communication
forum

A _______ is a series of letters and numbers that are distorted in some way.
captcha

New technologies used to communicate and collaborate on the Web are called _____
Web 2.0

Your ____________ is all the information that someone could find out about you by searching the Web, including social network sites.
digital footprint

the _________ consists of all the blogs on the Web and the connections between them.
blogosphere

_________ is a format used for distributing Web feeds that change frequently—for example, blogs, podcasts, and news—to subscribers.
RSS

A(n) _________ is a digital media file of a prerecorded radio- or TV-like show that is distributed over the Web.
podcast

_____________ sites allow you to save and share your favorites online.
Social bookmarking

___________ is doing business on the Web.
E-commerce

Computers in a peer-to-peer network belong to a ___________.
workgroup

Which resources are not shared by default in a homegroup?
documents

Which type of network consists of data storage devices and servers?
SAN

Which type of network spans multiple locations and connects multiple networks?
WAN

Which topology connects devices in a single line?
bus

When two Bluetooth devices connect to each other directly, they form a(n) ________.
personal area network (PAN)

The device needed to connect two or more networks together is called a(n) ______
router

A(n)___________ connects multiple devices on a LAN
switch

Which protocol is responsible for assuring that data packets are transmitted reliably on a network?
TCP

Which device examines data packets as they enter and leave a network and denies unauthorized packets access?
Firewall

In a client-server network, each computer is considered equal (t/f)
false

It's possible to share files between computers running Windows, Mac OS X, and Linux (t/f)
true

Most LANs are configured in a ring topology (t/f)
false

A campus area network (CAN) consists of multiple LANs located in the same location connected to each other using routers (t/f)
true

When two wireless devices connect to each other directly, they form an ad hoc network (t/f)
true

Computers can have multiple network adapters installed at one time (t/f)
true

A switch is a device that connects two or more networks together (t/f)
false

You must install special software to create a peer-to-peer network (t/f)
false

TCP/IP is the default protocol installed on Linux computers (t/f)
true

Using an open wireless network to access the Internet without permission is called wardriving (t/f)
false

_____________ include software, hardware, and files
network resources

A ______ creates a private network through a public network.
VPN

A ____________ has at least one server at its center.
client-server network

In an __________________ devices connect through a wireless access point.
infrastructure wireless network

A ___________ is a network that has all devices located in the same physical location
LAN

______________ is the physical layout of a local area network
Topology

Every device on a network must have a(n) ____________ to establish a connection with a network.
network adapter

An analog __________ is the first device on a network connects to the Internet via telephone lines.
modem

A group of clients and servers under the control of one central security database is called a ____________
domain

___________ define the rules for communication between devices
protocols

WE WILL WRITE A CUSTOM ESSAY SAMPLE ON
CIS TEST SPECIFICALLY FOR YOU
FOR ONLY $13.90/PAGE