-
The accompanying figure is a screenshot of FileZilla, in which the ____ file will go to the location pointed to by box B.
uploaded
-
A ____ IP address is one which can be accessed by packets on the Internet.
routable
-
The disadvantage of WAP-enabled devices is their ____
screen size
-
replaced analog technology with digital technology and added support for text messages
2G
-
In the accompanying figure, the type of signal represented by B is a(n) ____
analog signal
-
The elapsed time for data to make a round trip from point A to point B and back is called
latency
-
is an up-and-coming standard destined to be deployed by ISPs and cell phone carriers to allow seamless handoff between one tower and another
Mobile WiMAX
-
A group of computers temporarily networked to download a file is a _
swarm
-
The accompanying figure represents a virtual private network. In this figure, D points to ____ data.
nonencrypted
-
The accompanying figure represents a virtual private network. In this figure, E points to
the Internet
-
The accompanying figure represents a virtual private network. In this figure, B points to a(n)
router
-
Messaging and chat protocols include all of the following EXCEPT
Talkie
-
The octets in an IP address correspond to a ____.
network class
-
_ technologies support digital transmission for both voice and data.
3G
-
The accompanying figure represents a virtual private network. In this figure, A points to ____ data
encrypted
-
3G technologies have speeds ranging from 200 Kbps to ____
5 Mbps
-
To set up free VoIP, you and the people you communicate with can install free VoIP clients such as
Blink
-
An Ethernet-compatible network standard designated as IEEE 802.16 is ____.
WiMAX
-
The accompanying figure is a screenshot of FileZilla, in which the file to be ____ is indicated by box A.
uploaded
-
The average “survival time” for an unprotected computer to remain uncompromised is only
nine minutes
-
Sending computer data over a ____ system required a voiceband modem to convert digital data into audible signals
Both a. and b.
-
Interim 4G technologies such as ____ have been deployed since 2009
LTE
-
You need your own domain name if ____
you have your own Web site
-
The accompanying figure represents a virtual private network. In this figure, C points to a(n) ____ server.
VPN
-
BitTorrent can be used to distribute ____
all of the above
-
In the accompanying figure, the type of signal represented by A is a(n) ___
digital signal
-
Some ISDN providers offer a service called ____, which remains connected to an ISP as long as the computer and terminal adapter are on.
AO/DI
-
Satellite Internet service and TV service requires ____
a satellite dish and a modem
-
Sharing files on a LAN or the Internet requires open
ports
-
Most Internet servers have an easy to remember name that is known as a(n)
FQDN
-
A communications ____ is described as a virtual device because it is not a physical circuit or mechanism
port
-
Network service providers include ____.
all of the above
-
Data transport rates depend on the technology of the cellular system. The generation of cellular technology associated with analog voice service is ____
1G
-
DSL uses ____ to transmit data.
phone lines
-
The Internet began with a project called ___
ARPANET
-
The rate of data arriving at your computer is
downstream speed
-
is a file sharing protocol that distributes the role of the file server across a collection of dispersed computers.
BitTorrent
-
Prefixes such as http://, www, and ftp: correspond to _
protocols
-
A fixed Internet connection that uses a voiceband modem and telephone lines is a(n) ____ connection
dial-up
-
The accompanying figure is a screenshot of FileZilla, in which the ____ of the transfer is indicated by box C
progress
-
VoIP software is sometimes referred to as a(n) ____ client
SIP
-
is a valid top-level domain
.ca
-
In the accompanying figure, C points to ___
the Internet backbone
-
The rate of data that is transmitted from your computer to the Internet is ____
upstream speed
-
Every domain name corresponds to a unique IP address that has been entered into the
domain name system
-
wireless Internet service is designed to offer Internet access to homes and businesses by broadcasting data signals over areas large enough to cover most cities and outlying areas
Fixed
-
A communication protocol that provides Internet access from handheld devices is
WAP
-
The accompanying figure represents the connection of your computer to the Internet; the router marked A should belong to a(n)
ISP
-
For instant messaging, ____ are the people in a participant's list who are currently online
buddies
-
The ____ protocol allows the transfer of files from one computer to another over any TCP/IP network
ftp
-
There are estimated to be more than ____ users of the Internet
2 billion
-
The accompanying figure represents the connection of your computer to the Internet; the router marked B should belong to a(n)
NSP
-
The speed for satellite Internet service is
faster downstream than upstream
-
A ____ is a device that connects a computer to a telephone line and converts computer data signals into signals compatible with DSL
DSL modem
-
VoIP systems are offered by companies such as
all of the above
-
You can install personal VPN software such as ___
all of the above
-
Portable Internet access includes all of the following EXCEPT
cellular
-
Examples of 3G technologies include_
all of the above
-
The ability to easily move your Internet service from one location to another is considered ____ Internet service
portable
-
An ISP may provide ____ services
all of the above
-
Domain names are assigned by
ICANN
-
One important security precaution is to install a(n)
router
-
You can use a service called ____ to reformat Web pages to fit on a small screen
Skweezer
-
The use of automated software to locate computers that are vulnerable to unauthorized access is a port _
probe
-
Cable Internet service needs ____
circuitry to handle Ethernet protocols and a cable modem
-
are intended to work within LANs to monitor and direct packets being transported from one device to another
Routers
-
In a classic Webmail configuration, messages are sent immediately and thus a(n) ____ is not needed
Outbox
-
HTTP is classified as a ____ protocol because it maintains no record of previous interactions and handles each request based entirely on information that comes with it
stateless
-
An HTTP exchange takes place over a pair of _
sockets
-
Which of the following is a Web resource?
any of the above
-
Which of the following may pose a threat to your computer’s security and/or your privacy?
all of the above
-
When a Web page author includes meta keywords, like “sex,” that have little to do with the information on the page, the author is engaging in __
keyword stuffing
-
A tradeoff to the anonymity offered by anonymous ____ is that they tend not to operate at the same speed as your regular browser
proxies
-
In the URL found in the accompanying figure, showbiz is a ____.
folder name
-
Keyword ____ is an unethical practice in which meta keywords are manipulated to gain high relevancy rankings
stuffing
-
Examples of Uniform Resource Identifiers include _
all of the above
-
A(n) ____ is client software that displays Web page elements and handles links between pages
browser
-
Which of the following technologies are used to create a secure connection between a client computer and a Web site?
all of the above
-
Both SSL and its successor, ____, are protocols that encrypt data traveling between a client computer and an HTTP server
TLS
-
Server-side scripts can be written using _
all of the above
-
In an e-mail message, such as the one found in the accompanying figure, the recipient’s e-mail address and the message subject are found in the ____
message header
-
HTML ____ are typically used to collect shipping and payment information during checkout at an e-commerce Web site
forms
-
In addition to using search engines, you can also find Web-based information using a(n) ____ engine that searches a series of other search engines and compiles the search results
metasearch
-
A(n) ____ is a type of utility software that captures unsolicited e-mails before they reach your inbox
spam filter
-
Flash ____ can collect and store personal data, such as a user’s name or the user’s progress in a game
cookies
-
In the URL found in the accompanying figure, .htm is the ____.
file extension
-
____ is the most frequently used HTTP method.
GET
-
A podcast is an audio file that is distributed through downloads or the use of a(n)
feed
-
In the URL found in the accompanying figure, http is the ____
Web protocol standard
-
A(n) ____ certificate is an electronic attachment to a file that verifies the identity of its source
digital
-
In the URL found in the accompanying figure, www.cnn.com is the
Web server name
-
Some search engines use a program called a Web ____ that combs the Web to gather data that is representative of the contents of Web pages
crawler
-
Many ____ sites act as relay stations to forward your searches to search engines without leaving a trail back to a cookie or IP address
anonymizer
-
allow a Web site to store information on the client computer for later retrieval.
Cookies
-
A ____ enables a Web server to keep track of your activity and compile a list of your purchases.
cookie
-
____ is a protocol that works in conjunction with TCP/IP to get Web resources to your desktop
HTTP
-
An e-mail scam designed to persuade you into revealing confidential information by replying to an e-mail is called
phishing
-
software is a type of security software designed to identify and neutralize Web bugs, ad-serving cookies, and other types of malware
Antispyware
-
Junk e-mail messages may use ____ to monitor the number of people who view the e-mail. That data is collected and sometimes used to determine the direction of marketing campaigns
Web bugs
-
Webmail allows you to use a(n) ____ to access and view your e-mail messages
browser
-
Which of the following statements is NOT true?
Web pages that provide a secure connection start with httpx: instead of http
-
A(n) ____ is a compiled computer program that can be referenced from within an HTML document, downloaded, installed on your computer, and executed within the browser window
ActiveX control
-
The ____ wildcard character allows a search engine to find pages with any derivation of a basic word
*
-
When you use a search engine, it stores all of the following information about your query EXCEPT ____
your name
-
Incoming mail can be stored on a ____ server until it is downloaded to the inbox on your hard disk
POP3
-
PayPal is an example of a(n) ____ payment system
P2P (person-to-person)
-
For HTTP, ____ usually are associated with port 80 on the client and server.
sockets
-
When using an application like the one shown in the accompanying figure, you can access a Web page by clicking a(n) ____ or by typing a URL
link
-
When working with ____ mail, make sure your antivirus software is checking incoming messages
HTML
-
Applications written in the Java programming language are called Java
applets
-
A(n) ____ adds HTML tags to a document, spreadsheet, or other text-based file to create an HTML document that can be displayed by a browser.
HTML conversion utility
-
A(n) ____ helps you find information by searching the Web for pages that meet your query specifications
search engine
-
A(n) ____ is a series of instructions that is embedded directly into an HTML document that instruct the browser to carry out specific actions or to respond to specific user actions
HTML script
-
_ provides tools specifically designed to enter and format Web page text, graphics, and links.
Web authoring software
-
e-commerce occurs when businesses sell to governments
B2G
-
A ____ is a collaborative Web site that can be accessed and edited by anyone who wants to contribute to it
wiki
-
schemes redirect users to fake sites by poisoning a domain name server with a fake IP address
Pharming
-
Search engine ____ software is designed to pull keywords from a Web page and store them in a database
indexer
-
A search engine’s ____ looks for your search terms in the search engine’s indexed database and returns a list of relevant Web sites
query processor
-
To avoid becoming a spam victim, you should ___
use a disposable e-mail address when you register for online sites
-
Before sending a large attachment in an e-mail, you can use a(n) ____ to shrink it
compression program
-
A(n) ____ is a collection of related information organized and formatted so it can be accessed using software called a browser
Web site
-
__ has supplanted Netscape as the dominant browser for the PC platform
Internet Explorer
-
To use local e-mail you must install e-mail ____ software on your computer
client
-
A Web server’s response to a browser’s request includes an HTTP ____ that indicates whether the browser’s request could be fulfilled
status code
-
Often, Web page authors include a(n) ____ keyword in a header section of a Web page when it is created to describe the page contents
meta
-
When you purchase a used digital camera directly from the owner on an online auction, you are participating in ____ e-commerce
C2C
-
_ e-commerce involves one enterprise buying goods or services from another enterprise
B2B
-
When your browser fetches pages and graphics to form a Web page, it stores them in temporary files on your hard drive called a Web
cache
-
When you view a page infested with a(n) ____, an HTTP set-cookie request automatically goes to a third-party server, which may set a cookie on your computer for later retrieval or record your IP address.
Web bug
-
An e-mail message in ____ format can include graphics in addition to a wide variety of fonts and font colors.
HTML
-
You just sent an e-mail message to your co-worker that includes the following message body:MARY-CAN YOU PLEASE TELL ME WHEN YOU WILL HAVE THE REPORTS COMPLETED?Why might your coworker be offended by the message?
In terms of netiquette, you were shouting.
-
When you purchase a textbook online from a site like www.amazon.com, you are participating in ____ e-commerce.
B2C
-
Data ____ refers to the process of analyzing information in databases to discover previously unknown and potentially useful information
mining
-
Which of the following is NOT a Boolean operator
THIS
-
You can query by ____ using a fill-in form, like the one shown in the accompanying figure
example
-
With a(n) ____ database, the database is stored on several different computers, on multiple networks, or in different geographical locations
distributed
-
The goal of normalization is to minimize data ____
redundancy
-
A field ____ is a template that adds the correct formatting as data is entered
format
-
A field ____ rule is a specification that the database designer sets up to filter the data entered into a particular field.
validation
-
To provide a quality database interface, a designer might
arrange fields in a logical order
-
The ____ Web publishing process generates customized Web pages as needed.
dynamic
-
A ____ validates an entry by searching for the same data in a file or database table
lookup routine
-
Which of the following SQL operators can be used to omit records from a search by specifying a not-equal relationship?
NOT
-
The accompanying figure shows a(n) ____ document.
XML
-
In SQL terminology, creating a relationship between tables is referred to as ____ tables
joining
-
allows decision makers to look for relationships between multiple data dimensions
OLAP
-
In an object database, an attribute is
equivalent to a field in a relational database
-
A ____ update changes data in more than one record at a time.
global
-
Which of the following SQL operators designates records that meet either one of a set of two criteria or both?
OR
-
__ refers to a branch of data mining that focuses on predicting future probabilities and trends
Predictive analytics
-
The ____ operator specifies that both of the search criteria must be true for the record to be selected
AND
-
Databases are NOT vulnerable to ____
encryption
-
Which of the following does NOT have the potential to add doubt about the veracity of database data?
access controls
-
Relationships between record types can be graphically depicted using a(n)
ERD
-
The ____ database model uses a mesh-like structure, which allows for the definition of many-to-many relationships
network
-
Database ____ software is designed to manage billions of records and several hundred transactions per second
server
-
A technique called ____ Web publishing is a simple way to display the data in a database by converting a database report into an HTML document, which can be displayed as a Web page by a browser.
static
-
Which of the following is NOT a guideline for creating a template for reports?
Present as much information as possible
-
are detailed specifications for an SQL command.
Parameters
-
If a single data management tool can be used to maintain many different files and databases, it must support data
independence
-
What SQL command removes a record from a table?
DELETE
-
The data accessed by data mining and other analysis techniques is often stored in a data
warehouse
-
What is the SQL command used to introduce a brand-new database or table?
CREATE
-
____ is a markup language that allows field tags, data, and tables to be incorporated into a Web document.
XML
-
refers to the number of associations that can exist between two record types
Cardinality
-
The ____ data type is used to store true/false or yes/no data using minimal storage space
logical
-
A table's ____ order is the order in which records are stored on disk
sort
-
___ is a query language.
SQL
-
Which of the following is NOT true of XML?
XML documents are optimized for many operations you customarily associate with databases such as fast sorts and updates.
-
A CGI script can be written in all of the following EXCEPT
JavaScript
-
Criminals have become sophisticated in the use of all of the following EXCEPT ____ to access data stored on personal computers
ATMs
-
In the world of databases, a(n) ____ refers to a collection of data fields.
record
-
A(n) ____ allows you to create, update, and administer a relational database.
RDBMS
-
A database ____ contains a list of keys, and each key provides a pointer to the record that contains the rest of the fields related to that key
index
-
____ can block unauthorized users and limit activities of authorized users.
Access controls
-
Dynamic Web publishing relies on a program or script, referred to as a(n) ____ program, that acts as an intermediary between your browser and a DBMS.
server-side
-
A record ____ contains data about a particular entity.
occurrence
-
Surveys show that as many as ____ of businesses never change the standard administrator password for a DBMS
25%
-
Which of the following can be used to delineate the data entry area in a user interface?
all of the above
-
A ____ establishes which fields and records a particular user may access
data view
-
A ____ data type usually provides a variable-length field into which users can enter comments.
memo
-
A(n) ____ is an association between data that is stored in different record types
relationship
-
A(n) ____ file uses a uniform format to store data for each person or thing in the file
structured
-
What would be an appropriate data type to choose for a fixed-length field designed to hold a person’s name?
text data type
-
A ____ contains the outline or general specifications for a report, including such elements as the report title, fields to include, fields to subtotal/total, and report format specifications
report template
-
The two tables shown in the accompanying figure are ____ by the CustomerNumber field.
related
-
A fixed-length field contains a predetermined number of ____
bytes
-
In the broadest definition, a(n) ____ is a collection of information.
database
-
Data ____ means that data are separate from the programs used to manipulate the data
independence
-
A database audit can ____
all of the above
|
|