The octets in an IP address correspond to a Web site address.
False
All IP addresses are static.
False
All IP addresses are dynamic.
False
The www in a URL is part of a domain name.
False
You must pay for a domain name.
True
You may use an analog modem even if your phone service is digital.
True
You must have a digital modem if your telephone system is digital.
False
Television and data signals are carried over the same cable.
True
Internet anywhere technology is now considered a standard.
False
You can use a hotspot for mobile Internet access.
False
To use portable satellite technology you must take your satellite with you.
True
You can use a USB port to connect your wireless modem card to your laptop.
False
Cloud computing is the term given to analyzing cloud patterns and with the help of computer predicting the weather.
False
FTP is a protocol used by Internet phone companies for free long distance.
False
P2P file sharing allows users to obtain files from other users on the internet.
True
Bit-Torrent uses P2P technology.
True
One of the most common ways of gaining unauthorized access to a network is by looking for open ports.
True
Accessing Internet mobility is possible with most of today's wired or wireless Internet technologies.
False
The quality of VoIP calls are independent of the speed of the Internet connection.
False
Most firewall software is preconfigured to block only unnecessarily open ports targeted by hackers.
True
A constant connection uses a static or dynamic IP address.
False, always-on.
Downstream speed is the rate of data transmitted from your computer to the Internet.
False, upstream.
A domain name ends with an extension that indicates its top-level domain.
True
Mobile Internet access allows you to easily move your device, as in the case of vehicle mounted satellite dishes that can be deployed when the vehicle is parked.
False, portable.
When transmitting data using ISDN, you use an ISDN terminal modem.
False, adapter.
Using an AO/DI increases your computer's vulnerability to hackers.
True
The big bonus of portable WiMAX is that you use the same Internet service provider whether you are at home or on the road.
True
The speed of the transmission at a hotspot is related to the speed of the wired line that connects it to the internet.
True
A GSM/GPRS phone transmits data at a much slower speed than an EDGE.
True
Most messaging is based on a client/server technology.
True
VoIP can automatically direct emergency responders to your location in the case of an emergency.
False, cannot.
Distributed grids tap into thousands of PC's and Macs with Internet connections whose owners rent their computer's idle hours to a grid processing task.
False, donate.
In the context of networking, a virus-protector is software or hardware designed to filter out suspicious packets attempting to enter or leave a computer.
False, firewall.
NATS are intended to work on LANs to monitor and direct packets.
False, routers.
Setting up a secure VPN is easy.
False, difficult.
The Internet began with a project called ____.
ARPANET
There are estimated to be more than ____ users of the internet.
1.5 billion
Network Service Providers include ____.
a. AT&T
b. Deutsche Telekom
c. British Telecom
d. all of the above
An ISP may provide ____ services.
a. e-mail
b. Web server
c. instant messaging
d. all of the above
The accompanying figure represents the connection of your computer to the internet; the router marked A should belong to an ____.
ISP
The accompanying figure represents the connection of your computer to the internet; the router marked B should belong to an ____.
NSP
In the accompanying figure, C points to ____.
the Internet backbone.
An IP address corresponds to a ____.
network class
An address on the Web is called a ____.
URL
____ is a valid top-level domain.
.ca
Every domain name corresponds to a unique IP address that has been entered into a ____.
domain name server
Prefixes such as http://, www, and ftp: correspond to ____.
protocols
A ____ is described as a virtual device because it is not a physical circuit or mechanism.
port
You need your own domain name if ____.
you have your own Web site
Domain names are assigned by ____.
ICANN
The elapsed time for data to make a round trip from point A to point B and back is called ____.
latency
The rate of data that is transmitted from your computer to the internet is ____.
upstream speed
The rate of data arriving at your computer is ____.
downstream speed
A fixed Internet connection that uses a voiceband modem and telephone lines is a ____ connection.
dial-up.
In the accompanying figure, the type of signal represented by A is a ____.
digital signal
In the accompanying figure, the type of signal represented by B is an ____.
analog signal
Some ISDN providers offer a service called ____ which remains connected to an ISP as the computer and terminal adapter are on.
AO/DI
All of the following EXCEPT ____ are considered high-speed connections.
a. ISDN
b. DSL
c. cable
d. all are high-speed
DSL uses ____ to transmit data.
phone lines
A ____ is a device that connects a computer to a telephone line and converts computer data signals into signals compatible with DSL.
DSL modem
____ currently offers the fastest Internet access speeds.
cable
Cable Internet service needs ____.
Circuitry to handle Ethernet protocols and a cable modem
The speed for satellite Internet service is ____.
faster downstream than upstream
Satellite Internet service and TV service require ____.
a satellite dish and a modem
____ wireless Internet service is designed to offer Internet access to homes and businesses by broadcasting data signals over areas large enough to cover most cities and outlying areas.
Fixed
An Ethernet-compatible network standard designed as IEEE 802.16 is ____.
WiMAX
Portable Internet access includes all of the following EXCEPT.
a. WiFi
b. portable satellite
c. portable wireless
d. cellular
The ability to easily move your Internet service from one location to another is considered ____ Internet service.
portable
____ is an up-and-coming standard designed to be deployed by ISPs and cell phone carriers to allow seamless hand-offs between one tower and another.
Mobile WiMAX
Data transport rates depend on the technology of the cellular system. The generation of cellular technology associated with analog voice service is ____.
1G
Data transport rates depend on the technology of the cellular system. The generation of cellular technology that was first associated with always-on data transfers is ____.
2.5G
The fastest cellular technology is ____.
HSUPA
____ is a 3G technology that works on GSM and GPRS cellular networks.
EDGE
____ is a 3G technology developed by Qualcomm and currently deployed by Alltel, Sprint, and Verizon.
EV-DO
____ is a 3.5G technology with theoretical maximum speeds in excess of 5 Mbps.
HSUPA
With a data service plan, you can use ____ to take advantage of mobile broadband.
WiFi
A communication protocol that provides Internet access from handheld devices is ____.
WAP
The disadvantage of WAP-enabled devices is their ____.
screen size
You can use a service called ____ to reformat Web pages to fit on a small screen.
Skweezer
Most messaging is based on a ____ model.
client/server
For instant messaging, ____ are the people in a participant's list who are currently online.
buddies
Messaging and chat protocols include all of the following EXCEPT ____.
Talkie
Messaging systems that require client software include ____.
a. Apple iChat
b. AOL Instant Messenger
c. Yahoo! Messenger
d. all of the above
Instant messaging is vulnerable to malware such as ____.
a. viruses
b. spyware
c. both a and b
d. neither a nor b
To use VoIP you must use any of the following EXCEPT ____.
a. an IP phone
b. a cable phone
c. a wireless IP phone
d. a USB phone
The accompanying figure is a screenshot of FileZilla, in which the ____ file will go to the location pointed to by box A.
downloaded
The accompanying figure is a screenshot of FileZilla, in which the file to be ____ is indicated by box B.
downloaded
The accompanying figure is a screenshot of FileZilla, in which the ____ of the transfer is indicated by box C.
status
The ____ protocol allows the transfer of files from one computer to another over any TCP/IP network.
FTP
____ is a file sharing protocol that distributes the role of the file server across a collection of dispersed computers.
BitTorrent
A group of computers temporarily networked to download a file is a ____.
swarm
BitTorrent can be used to distribute ____.
a. spyware
b. adware
c. malware
d. all of the above
Network services such as the Web, FTP, and e-mail operate from ____.
ports
The use of automated software to locate computers that are vulnerable to unauthorized access is a port ____.
probe
The average "survival time" for an unprotected computer to remain uncompromised is only ____.
9 minutes
In order to ensure your ports are inactive you should _____.
turn off the computer
____ are intended to work on LANs to monitor and direct packets being transported from one device to another.
Routers
A ____ IP address is one which can be accessed by packets on the Internet.
routable
The accompanying figure represents a Virtual Private Network. In this figure, A points to a ____.
corporate network
The accompanying figure represents a Virtual Private Network. In this figure, B points to ____.
router
The accompanying figure represents a Virtual Private Network. In this figure, C points to ____.
remote access server
The accompanying figure represents a Virtual Private Network. In this figure, D points to an ____.
encrypted channel
The accompanying figure represents a Virtual Private Network. In this figure, E points to the ____.
Internet
The accompanying figure represents a Virtual Private Network. In this figure, F points to an ____.
ISP
The accompanying figure represents a Virtual Private Network. In this figure, G points to a ____.
remote PC
Tom is currently using dial-up for his internet connection but he believes it is too slow for his needs and ties up his phone line. He is looking for an alternative and has come to you for help.
Tom wants to know which Internet access is the fastest. You tell him ____.
cable
Tom wants to know which of the services uses his existing telephone lines. You tell him ____.
a. DSL
b. ISDN
c. both a and b
d. nither a or b
Tom wants to know which service has overall lower costs. You tell him, on a monthly basis, it is ____.
cable
Sometimes Sally wants to browse the Internet while sitting and enjoying a cup of coffee. She has heard that Starbucks has WiFi but she knows there are some limitations. You tell her ____.
the signal is not strong everywhere
You describe WiMAX to Sally. You Tell her ____.
you can use the same provider for home and mobile use
Another option Sally is considering is a portable satellite system. She asks you about the details and you tell her ____.
a. you must take your satellite dish with you
b. your disk can move out of alignment and must be repositioned
c. they work well for browsing the Web
d. all of the above
Sally has heard that cellular data service has poor quality. You tell her ____.
that it depends on the generation of technology being used
You and Harry are discussing firewalls. You explain that he has a firewall built into Windows. He says he has one that came with his virus protection. He should ____.
turn the one that came with Windows off and use the firewall that came with his virus protection
Harry's grandson has been coming to his house and downloading music. His grandson turned "file sharing" on. He is concerned this causes security problems. He should ____.
deactivate it when not needed
NAPs such as Earthlink and Comcast offer dial-up and cable Internet access.
false
TCP, IP, UDP, HTTP, and FTP are examples of protocols used on the Internet
true
204.127.129.100 is an example of an IP address.
true
.edu and .ca are examples of top-level domains.
true
Internet-based servers can handle multiple tasks using different ports.
true
Utilities such as Ping and Traceroute help you gauge the speed of your Internet connection.
true
10 Mbps is a narrowband Internet connection.
false
Dial-up, ISDN, and DSL provide Internet access using telephone cabling.
true
Cable Internet service is fast because it has lots of latency.
false
WiMAX uses low-earth orbiting satellites to transport data to the Internet.
false
Portable Internet access includes portable WiMAX and Wi-Fi.
true
UTMS, EDGE, and HSUPA are examples of broadband ISPs.
false
VoIP uses circuit switching technology to send analog data.
false
SETI@home is a popular Wi-Fi service provider for non-business consumers.
false
FTP makes it easy to anonymously use a search engine.
false
BitTorrent is an Internet security protocol.
false
Consumers should use port probes to encrypt data sent over the Internet.
false
NATs are used by hackers to intercept packets traveling over the Internet.
false
One reason the Internet works is because TCP/IP offers a global addressing standard. Which one of the following is accurate in the context of Internet addresses?
A domain name, such as amazon.com, corresponds to a unique IP address.
Although ISPs offer Internet access though dial-up, satellites, WiMAX, ISDN, and DSL, cable Internet is currently the preferred access method. Why?
It is the fastest and most widely available technology
What is the difference between portable Internet access and mobile Internet access?
With portable access you cannot work online while moving very far
On the Internet, application protocols provide consumers with many useful services. Which one of the following correctly describes an Internet-based application protocol?
Files can be shared over the Internet using FTP or BitTorrent protocols.
Securing your computer from Internet-based intrusions is an important aspect of computer security. Which one of the following is NOT a useful security technique?