Name:     ID: 
 
Email: 

Final Exam - The Internet

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

The most common transfer protocol used on the Internet is _____.
a.
FTP
b.
HTTP
c.
IP
d.
TCP
 

 2. 

The ____ is a self-organized group that makes technical contributions to the engineering of the Internet and its technologies.
a.
Internet Engineering Task Force
b.
National Science Foundation
c.
Federal Networking Council
d.
Global Addressing Consortium
 

 3. 

The term ____ is used to describe LANs or WANs that use the TCP/IP protocol but do not connect to sites outside the firm.
a.
telephone
b.
intranet
c.
Internet
d.
network backbone
 

 4. 

When you click on a ____, a new HTML document, such as a page of text and graphics, or an audio or video file appears.
a.
user interface
b.
tag
c.
link
d.
hypermark
 

 5. 

Which of the following sells access to the Internet to organizations and businesses?
a.
Telnet
b.
Internet Service Providers (ISPs)
c.
Internet Backbone
d.
Network access points (NAPs)
 

 6. 

____ tells Web browser software how to display text and other elements contained in a document.
a.
HTML
b.
FTP
c.
URL
d.
HTTP
 

 7. 

The ____ domain name indicates a U.S. commercial enterprise.
a.
org
b.
edu
c.
com
d.
net
 

 8. 

The ____ button allows you to return to the home page (or start page) for your Web browser.
a.
back
b.
reload/refresh
c.
home
d.
stop
 
 
Figure B-1
nar001-1.jpg
 

 9. 

In the Internet Explorer window shown in Figure B-1, the item marked 2 is the ____.
a.
title bar
b.
menu bar
c.
address bar
d.
status bar
 

 10. 

In the Internet Explorer window shown in Figure B-1, the item marked 3 is the ____.
a.
refresh button
b.
stop button
c.
home button
d.
back button
 
 
Figure B-2
nar002-1.jpg
 

 11. 

In the Firefox window shown in Figure B-2, the item marked 2 is the ____.
a.
Title bar
b.
Menu bar
c.
Location bar
d.
Page tab
 

 12. 

You can organize bookmarks and favorites by placing them in which of the following?
a.
Folders
b.
A network
c.
The History folder
d.
A file
 

 13. 

Unsolicited e-mails usually selling an item or service are referred to as ____.
a.
Attachments.
b.
Webmail.
c.
Spam.
d.
Netiquette.
 

 14. 

In Hotmail, messages that you delete are stored in the ______ folder until you permanently delete them.
a.
Drafts.     
b.
Inbox.
c.
Sent Messages.     
d.
Trash Can.
 
 
Figure C-2
nar003-1.jpg
 

 15. 

In the Hotmail message window shown in Figure C-2, what is the function of the item marked 1?
a.
Specify a file to send with the current message.
b.
Summarize the content of the current message.
c.
Send the current message to its recipients.
d.
Specify message recipients.
 
 
Figure C-3
nar004-1.jpg
 

 16. 

In the Outlook Express Mail window shown in Figure C-3, which component is marked as 2?
a.
Message summaries.     
b.
Folders list.
c.
Message pane.
d.
Message list.
 

 17. 

You can use the ____ button to respond quickly and efficiently to the sender of an earlier message.
a.
Reply.
b.
Reply All.
c.
Forward.
d.
All of the above.
 

 18. 

A group of keyboard characters that represent an emotion when viewed together is called a(n) _____.
a.
Netiquette.
b.
Emoticon.
c.
E-mail faces.
d.
Electronicon.
 

 19. 

A Web robot deletes information in the search engine's ____ when a Web site no longer exists.
a.
spider
b.
database
c.
spreadsheet
d.
archive
 

 20. 

A Web ____ is a listing of links to Web pages that is organized into hierarchical categories.
a.
directory
b.
database
c.
search engine
d.
full-text indexed hierarchy
 

 21. 

____ list Web pages selected by people rather than using a database compiled by Web bots.
a.
Internet indexes
b.
Search engines
c.
Web directories
d.
Meta-search engines
 

 22. 

Which of the following uses human editors to select Web pages to be included in the database organized into hierarchical categories?
a.
Search engine
b.
Web directory
c.
Meta-search engine
d.
Web browser
 

 23. 

Using a ____ lets you search several engines at the same time.
a.
search engine
b.
Web directory
c.
meta-search engine
d.
Web bibliography
 

 24. 

You can search for weather forecasts in cities around the world using an online ______ service.
a.
temperature
b.
city
c.
news
d.
weather
 
 
Figure E-1
nar005-1.jpg
 

 25. 

Figure E-1, the item marked 1 does which of the following?
a.
Shows the location of the address you mapped.
b.
Prints the map.
c.
Allows you to zoom in or out of the map.
d.
Displays driving directions for the address you mapped.
 

 26. 

A search engine that enables you to find businesses grouped by type and location is called a _______.
a.
Web directory
b.
Yellow page directory
c.
White page directory
d.
Map site
 

 27. 

When you copy a work for use in criticism, comment, news reporting, teaching, scholarship, or research, it is called _____.
a.
copyright
b.
citation
c.
fair use
d.
plagiarism
 

 28. 

A(n) ____ document contains answers to common questions that users ask about mailing lists.
a.
FAQ
b.
help
c.
command
d.
archive
 
 
Figure F-3
nar006-1.jpg
 

 29. 

Which communication tool is shown in Figure F-3?
a.
Chat
b.
A mailing list
c.
A newsgroup
d.
None of the above
 

 30. 

A(n) _______ chat occurs between individuals who are invited to participate in the chat.
a.
public
b.
private
c.
open
d.
closed
 

 31. 

To ____ a file means to receive the file on your computer from another computer.
a.
download
b.
upload
c.
put
d.
retrieve
 

 32. 

Which of the following is fully functional software that is available to anyone at no cost and with no restrictions attached to its use?
a.
Limited edition software
b.
Freeware
c.
Shareware
d.
All of the above
 

 33. 

Which of the following resides on your computer and allows you to transfer files between your computer and another computer connected to it using the rules for FTP?
a.
FTP server program
b.
HTTP server program
c.
FTP client program
d.
Download program
 

 34. 

Most images on the Web are in the ____ file formats.
a.
GIF and JPEG
b.
TIFF and PCX
c.
HTML and SGML
d.
MPEG and WAV
 

 35. 

Which of the following is not a file format used for audio on the Web?
a.
MP3
b.
RealAudio
c.
AVI
d.
All of the above are used for audio
 

 36. 

Which of the following audio formats is the audio format used by the UNIX operating system?
a.
WAV
b.
MIDI
c.
AU
d.
MPEG
 

 37. 

Software that can only be started from within a Web browser and that displays or plays specific file types is known as a(n) ____.
a.
streaming program
b.
clip art
c.
plug-in
d.
animated GIF
 

 38. 

A browser extension that can start independent of a Web browser is known as a(n) _____.
a.
helper application
b.
plug-in
c.
anti-virus program
d.
worm
 

 39. 

Which type of browser extensions let you use a Web browser to read documents, such as those in PDF format?
a.
Animation
b.
Document and productivity
c.
Image viewer
d.
Sound player
 

 40. 

Which type of browser extensions allow you to play interactive games and view Shockwave and Flash files?
a.
Animation
b.
Document and productivity
c.
Video player
d.
Sound player
 

 41. 

A tool known as a ____ can capture data being transmitted on a network, including user names, passwords, and other personal information.
a.
packet sniffer
b.
JavaScript program
c.
cookie
d.
virus
 

 42. 

When an individual tries to obtain confidential information from people via e-mail by pretending to be a familiar organization or institution, it is called _____.
a.
phishing
b.
phinding
c.
phoning
d.
pharming
 

 43. 

A ____ on a computer permits traffic to enter and leave a computer.
a.
port
b.
pane
c.
post
d.
peephole
 

 44. 

Which of the following is the word used to describe a Web site that looks like it belongs to one organization but actually belongs to someone else?
a.
Spinned
b.
Spammed
c.
Spoofed
d.
Shared
 

 45. 

Someone could use open _______ on your computer to access data on your computer.
a.
doors
b.
windows
c.
ports
d.
panes
 

 46. 

Which of the following describes the process of scrambling and encoding data transmissions using a mathematically-based program?
a.
Encryption
b.
Enclosed
c.
Stealth
d.
Hidden
 

 47. 

Informed Web users can implement ____, which are procedures, programs, and hardware that detect and prevent computer security threats.
a.
viruses
b.
applets
c.
cookies
d.
countermeasures
 

 48. 

Some Web sites store information on your computer in small text files known as ____.
a.
applets
b.
cookies
c.
viruses
d.
worms
 

 49. 

A general category of software that includes advertisements to help pay for the product in which they appear is ___________.
a.
Web bugs
b.
cookies
c.
adware
d.
spyware
 

 50. 

You can keep viruses, worms, and Trojan Horses from using your e-mail program to reproduce by installing ____.
a.
applets
b.
anti-virus software
c.
pretty Good Privacy (PGP)
d.
browser extensions
 



 
         Start Over