07 Jun ALLIED ISY101 full course [ all discussions all homework and all CHECK YOUR UNDERSTANDING ]
Question
Module 1 Homework Assignment
ISY101: Introduction to Computer Systems
Student’s Name
Instructor’s Name
Date
2010-xx-xxxxxx-ISY101-M1HW-FL.doc
Homework Assignment 1
ISY 101: Introduction to Computer Systems
Directions: Using Microsoft Word to save and submit your work, please complete the following homework assignment. Please include a title page with this assignment. Your title page should include the assignment number, course, your name, your instructor, and the date submitted. Please click to view an example.
1. Name 5 keys on a computer keyboard and describe each of their functions.
2. What role does digital technology play in freedom of speech and democracy?
3. Discuss whether or not handheld devices are computers.
Module 2 Homework Assignment
ISY101: Introduction to Computer Systems
Student’s Name
Instructor’s Name
Date
2010-xx-xxxxxx-ISY101-M2HW-FL.doc
Homework Assignment 2
ISY 101: Introduction to Computer Systems
Directions: Using Microsoft Word to save and submit your work, please complete the following homework assignment. Please include a title page with this assignment. Your title page should include the assignment number, course, your name, your instructor, and the date submitted. Please clickHERE to view an example.
1. Discuss where a computer stores its basic hardware settings, why it does so, and what some of those settings are.
2. Compare storage devices using four criteria: versatility, durability, speed, and capacity.
Module 3 Homework Assignment
ISY101: Introduction to Computer Systems
Student’s Name
Instructor’s Name
Date
2010-xx-xxxxxx-ISY101-M3HW-FL.doc
Homework Assignment 3
ISY 101: Introduction to Computer Systems
Directions: Using Microsoft Word to save and submit your work, please complete the following homework assignment. Please include a title page with this assignment. Your title page should include the assignment number, course, your name, your instructor, and the date submitted. Please clickHEREto view an example.
1. Discuss the advantages and disadvantages of spreadsheet software as number-crunching software.
2. What are the advantages and disadvantages of purchasing a software suite?
Module 4 Homework Assignment
ISY101: Introduction to Computer Systems
Student’s Name
Instructor’s Name
Date
2010-xx-xxxxxx-ISY101-M4HW-FL.doc
Homework Assignment 4
ISY 101: Introduction to Computer Systems
Directions: Using Microsoft Word to save and submit your work, please complete the following homework assignment. Please include a title page with this assignment. Your title page should include the assignment number, course, your name, your instructor, and the date submitted. Please clickHEREto view an example.
1. List and describe the events that take place during the boot process.
2. A file management utility provides tools and procedures to help you keep track of your program and data files. These tools are most useful when you have a logical plan for organizing your files and when you need to follow some basic file guidelines. List and discuss those guidelines.
Module 5 Homework Assignment
ISY101: Introduction to Computer Systems
Student’s Name
Instructor’s Name
Date
2010-xx-xxxxxx-ISY101-M5HW-FL.doc
Homework Assignment 5
ISY 101: Introduction to Computer Systems
Directions: Using Microsoft Word to save and submit your work, please complete the following homework assignment. Please include a title page with this assignment. Your title page should include the assignment number, course, your name, your instructor, and the date submitted. Please clickHEREto view an example.
1. What are the limitations of powerline networks?
2. Discuss the disadvantages of LANs.
Module 6 Homework Assignment
ISY101: Introduction to Computer Systems
Student’s Name
Instructor’s Name
Date
2010-xx-xxxxxx-ISY101-M6HW-FL.doc
Homework Assignment 6
ISY 101: Introduction to Computer Systems
Directions: Using Microsoft Word to save and submit your work, please complete the following homework assignment. Please include a title page with this assignment. Your title page should include the assignment number, course, your name, your instructor, and the date submitted. Please clickHEREto view an example.
1. Explain the difference between portable Internet access and mobile Internet access.
2. Explain what VoIP is and how it works.
Module 7 Homework Assignment
ISY101: Introduction to Computer Systems
Student’s Name
Instructor’s Name
Date
2010-xx-xxxxxx-ISY101-M7HW-FL.doc
Homework Assignment 7
ISY 101: Introduction to Computer Systems
Directions: Using Microsoft Word to save and submit your work, please complete the following homework assignment. Please include a title page with this assignment. Your title page should include the assignment number, course, your name, your instructor, and the date submitted. Please clickHEREto view an example.
1. Give two reasons why it is important to upgrade your browser when a new version becomes available.
2. Compare and contrast POP e-mail to Web-based e-mail systems in terms of control, security, and accessibility.
Module 8 Homework Assignment
ISY101: Introduction to Computer Systems
Student’s Name
Instructor’s Name
Date
2010-xx-xxxxxx-ISY101-M8HW-FL.doc
Homework Assignment 8
ISY 101: Introduction to Computer Systems
Directions: Using Microsoft Word to save and submit your work, please complete the following homework assignment. Please include a title page with this assignment. Your title page should include the assignment number, course, your name, your instructor, and the date submitted. Please clickHEREto view an example.
1. List and describe the different file format types used for bitmap graphics.
2. There are a variety of techniques used by content providers to provide digital media from unlicensed duplication and use. Discuss Content Scrambling System as a DVD DRM technology.
discussions
Discussion Board #1
Please make sure that you provide your initial response to ALL three (3) questions by Wednesday in order to allow enough time in the week for my feedback from other students. All grades are post by the first of the following week.
- In what ways does digital technology affects society?
- What are the characteristics of personal computers, servers, mainframes, and supercomputers?
- What are the main differences between data and information?
“Substantive posts” mean replying to another student’s posts or the Professors posts in a non-combative manner with a minimum of 150 words. Please use common sense when replying to other students.
Discussion Board #2
Please make sure that you provide your initial response to ALL three (3) questionsby Wednesday in order to allow enough time in the week for my feedback from other students. All grades are post by the first of the following week.
1. What are the main differences between the components of a desktop computer and a laptop or mobile device?
2. What is RAM? How does it work? And how it differs from disk storage?
3. What are the main differences between magnetic storage and optical storage?
“Substantive posts” mean replying to another student’s posts or the Professors posts in a non-combative manner with a minimum of 150 words. Please use common sense when replying to other students.
Be sure to follow Discussion Board guidelines in your response. AAU’s grading policy states–Points for participation will be awarded based on the following criteria:
1. Comments made in the Discussion Board should be substantive (e.g. having a firm basis in reality and being therefore important, meaningful, or considerable) and should be substantiated and persuasively presented, whether it is the first original posting, acknowledging faculty’s feedback, or asking for further clarifications. Comments like “well done,” “oh I see,” “wow,” etc. are NOT considered substantive.
2. Posted comments from students should reflect understanding of the course objectives and original thought and reflection on the course topic and concepts.
3. Comments should extend the thoughts and ideas offered by your instructor and/or your classmates (if the course includes multiple students). The best contributions will reflect not only excellent preparation but interpretive and integrative thinking as well.
4. Comments should show evidence of thorough reading and analysis of the material being studied and discussed.
5. Student comments should show a willingness to test new ideas and risk comments that are not mainstream and “safe.”
Posted by Deborah Colon-mateo at 03/31/12 09:43 PM
Discussion Board #3
Please make sure that you provide your initial response to ALL three (3) questions by Wednesday in order to allow enough time in the week for my feedback from other students. All grades are post by the first of the following week.
1. What are the main features and uses of word processing, spreadsheet, desktop publishing, and Web authoring software?
2. What types of software are available for graphics, video, music, education and reference, entertainment, and business?
3. How does antivirus software work?
“Substantive posts” mean replying to another student’s posts or the Professors posts in a non-combative manner with a minimum of 150 words. Please use common sense when replying to other students.
Be sure to follow Discussion Board guidelines in your response. AAU’s grading policy states–Points for participation will be awarded based on the following criteria:
1. Comments made in the Discussion Board should be substantive (e.g. having a firm basis in reality and being therefore important, meaningful, or considerable) and should be substantiated and persuasively presented, whether it is the first original posting, acknowledging faculty’s feedback, or asking for further clarifications. Comments like “well done,” “oh I see,” “wow,” etc. are NOT considered substantive.
2. Posted comments from students should reflect understanding of the course objectives and original thought and reflection on the course topic and concepts.
3. Comments should extend the thoughts and ideas offered by your instructor and/or your classmates (if the course includes multiple students). The best contributions will reflect not only excellent preparation but interpretive and integrative thinking as well.
4. Comments should show evidence of thorough reading and analysis of the material being studied and discussed.
5. Student comments should show a willingness to test new ideas and risk comments that are not mainstream and “safe.”
NOTE: You must post in the Module Discussion Board three times per week in order to qualify for full credit. The first post should be your primary response to the discussion topic/question. Subsequent posts should be directed to comments made by your instructor and/or your classmates (if the course includes multiple students). Please do your best to make your primary post early in the week (at least by Wednesday)
MOD 4
Posted by Deborah Colon-mateo at 03/31/12 09:44 PM
Discussion Board #4
Please make sure that you provide your initial response to ALL three (3) questions by Wednesday in order to allow enough time in the week for my feedback from other students. All grades are post by the first of the following week.
1. What types ofoperating systems are used on today’s personal computers, mobile devices, and servers?
2. What are the six steps used when booting a PC?
3. Why is it important to have a recovery disk?
“Substantive posts” mean replying to another student’s posts or the Professors posts in a non-combative manner with a minimum of 150 words. Please use common sense when replying to other students.
Be sure to follow Discussion Board guidelines in your response. AAU’s grading policy states–Points for participation will be awarded based on the following criteria:
MOD 5
Please make sure that you provide your initial response to ALL three (3) questions by Wednesday in order to allow enough time in the week for my feedback from other students. All grades are post by the first of the following week.
1. What are the differences between a LAN and a WAN?
2. What are the roles of communications protocols?
3. What are the security measures used for wired and wireless networks?
“Substantive posts” mean replying to another student’s posts or the Professors posts in a non-combative manner with a minimum of 150 words. Please use common sense when replying to other students.
Be sure to follow Discussion Board guidelines in your response. AAU’s grading policy states–Points for participation will be awarded based on the following criteria:
MOD 6
Please make sure that you provide your initial response to ALL three (3) questions by Wednesday in order to allow enough time in the week for my feedback from other students. All grades are post by the first of the following week.
1. What are the two protocols used on the Internet? And what they are used for?
2. What are the main differences between static IP addresses, dynamic IP addresses, private IP addresses, and domain names?
3. What are the advantages and disadvantages of dial-up, cable, DSL, ISDN, satellite, and fixed wireless Internet services?
“Substantive posts” mean replying to another student’s posts or the Professors posts in a non-combative manner with a minimum of 150 words. Please use common sense when replying to other students.
MOD 7
Posted by Deborah Colon-mateo at 03/31/12 09:47 PM
Discussion Board #7
Please make sure that you provide your initial response to ALL three (3) questions by Wednesday in order to allow enough time in the week for my feedback from other students. All grades are post by the first of the following week.
1. What are the two Web page authoring tools?
2. Why is e-commerce becoming so popular with consumers and vendors?
3. What are the difference between a POP and Web-based e-mail?
“Substantive posts” mean replying to another student’s posts or the Professors posts in a non-combative manner with a minimum of 150 words. Please use common sense when replying to other students.
Be sure to follow Discussion Board guidelines in your response. AAU’s grading policy states–Points for participation will be awarded based on the following criteria:
MOD 8
Posted by Deborah Colon-mateo at 03/31/12 09:47 PM
Discussion Board #8
Please make sure that you provide your initial response to ALL three (3) questions by Wednesday in order to allow enough time in the week for my feedback from other students. All grades are post by the first of the following week.
1. What are some advantages, disadvantages, and uses for digital media?
2. What are the formats used for digital media?
3. What are the different digital video formats?
“Substantive posts” mean replying to another student’s posts or the Professors posts in a non-combative manner with a minimum of 150 words. Please use common sense when replying to other students.
Be sure to follow Discussion Board guidelines in your response. AAU’s grading policy states–Points for participation will be awarded based on the following criteria:
check your understandings
1. The “brain” of your computer is called the:
a. microchip.
b. microprocessor.
c. memory chip.
d. hard drive.
1
2. A computer’s operating system is responsible for which of the following?
a. Running application software
b. Manipulating files on storage devices
c. Transferring data to and from printers
d. All of the choices apply
1
3. When the computer is busy, the mouse pointer arrow shape turns into a(n):
a. hourglass.
b. square.
c. circle.
d. both a and c.
1
4. Which of the following mouse actions allows you to manipulate on-screen objects?
a. Click
b. Double-click
c. Right-click
d. All of the choices apply
1
5. Function keys on the keyboard activate all of the following, except:
a. Save.
b. Help.
c. Print.
d. Delete.
0
6. Which of the following keyboard keys displays previous screen information?
a. Page down key
b. End key
c. Page up key
d. Delete key
1
7. Which of the following keyboard keys capitalizes all the letters you type when it is engaged?
a. End key
b. Caps lock key
c. Tab key
d. Home key
1
8. Which of the following is used to delete one character to the left of the insertion point?
a. Esc key
b. Ctrl key
c. Backspace key
d. None of the choices apply
1
9. The __________ displays a series of tools for accomplishing various tasks.
a. scroll bar
b. toolbar
c. menu bar
d. title bar
1
10. Which of the following shrinks the window to a button at the bottom of the screen?
a. Minimize button
b. Maximize button
c. Close button
d. None of the choices apply
1
11. Which of the following is needed to send and receive e-mail?
a. Internet connection
b. E-mail account
c. Software
d. All of the choices apply
1
12. To create a secure password, do all of the following, except:
a. use at least five characters, mixing numbers and letters.
b. use your family name or name of family member.
c. do not use a word from the dictionary.
d. do not forget your password.
1
13. Another name for computer virus is:
a. spyware.
b. shareware.
c. software.
d. malware.
1
14. Internet scams in the form of spam messages try to get you to do all of the following, except:
a. download a virus.
b. divulge your bank account numbers.
c. subscribe to weekly newsletters.
d. send in money for products you will never receive.
1
15. An e-mail scam that arrives in your e-mailbox looking like an official correspondence from a major company is called:
a. phishing.
b. fishing.
c. flushing.
d. none of the choices apply.
1
16. The digital revolution became a significant factor in the 1980s but ended in the 1990s with the dot com bubble burst.
a. True
b. False
1
17. Digital electronics use electronic __________ to represent data.
a. circuits
b. switches
c. transistors
d. components
1
18. __________ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices.
a. Digitization
b. Digital conversion
c. Scanning
d. Rasterization
1
19. Symbols that represent facts, objects, and ideas are:
a. data.
b. programming.
c. processing.
d. globalization.
1
20. A(n) __________ is a microprocessor-based computing device designed to meet the computing needs of an individual.
a. personal computer
b. mainframe
c. ALU
d. server
0
21. The purpose of a server is to serve computers on a network.
a. True
b. False
1
22. A(n) __________ is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.
a. mainframe
b. minicomputer
c. supercomputer
d. workstation
0
23. A compute-intensive problem runs on a:
a. server.
b. mainframe.
c. supercomputer.
d. super PC
1
24. A special-purpose microprocessor that is built into the machine it controls is a(n):
a. supercomputer.
b. mainframe.
c. microcontroller.
d. workstation.
1
25. Data becomes __________ when it is presented in a format that people can understand and use.
a. information
b. processed
c. graphs
d. presentation
1
26. The type of data where text, numbers, graphics, sound, and video have been converted into discrete digits is:
a. information.
b. analog.
c. digital.
d. ASCII.
1
27. The type of data that is represented using an infinite scale of values is:
a. information.
b. analog.
c. digital.
d. ASCII.
1
28. Data transmission speeds are typically expressed as __________ and storage is typically expressed as __________.
a. bits/bytes
b. bytes/hertz
c. hertz/bits
d. mites/bytes
1
29. 1,024 bytes is a __________; 1,048,576 bytes is a __________; and 1,073,741,824 bytes is a __________.
a. kilobyte/megabyte/gigabyte
b. megabyte/gigabyte/kilobyte
c. gigabyte/megabyte/terabyte
d. terabyte/gigabyte/megabyte
1
30. A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n):
a. integrated circuit.
b. computer chip.
c. microchip.
d. all of the choices apply.
1
Question Points
1. The term __________ designates equipment that might be added to a computer system to enhance its functionality.
a. digital device
b. system add-on
c. disk pack
d. peripheral device
1
2. The main component of a typical desktop computer is the __________, which houses the processor, memory, some storage devices, and display and sound circuitry.
a. kiosk
b. system unit
c. form factor
d. platform
1
3. __________ are the form factor of choice for computer owners who might want to upgrade components in the future because it is easy to get inside the case and swap out parts.
a. Cube units
b. Base units
c. Tower units
d. Minicases
1
4. The term __________ refers to the size and dimensions of a computer component.
a. form factor
b. system specification
c. disk header
d. peripheral metric
1
5. A __________ computer is a small, lightweight personal computer with screen, keyboard, storage, and processing components integrated into a single unit.
a. tower
b. tablet
c. desktop
d. portable
1
6. Currently, there are three personal computer platforms: PC, Mac, and Linux.
a. True
b. False
1
7. __________ is a temporary holding area for data, application program instructions, and the operating system.
a. ROM
b. EEPROM
c. Disk storage
d. RAM
1
8. RAM can be thought of as the __________ for the computer’s processor.
a. factory
b. operating room
c. waiting room
d. planning room
1
9. Unlike disk storage most RAM is:
a. virtual.
b. integrated.
c. non-volatile.
d. volatile.
1
10. If the system runs out of RAM, the operating system uses an area of the hard disk called __________ to store parts of a program or data file until they are needed.
a. volatile memory
b. capacitor memory
c. virtual memory
d. integrated memory
1
11. __________ is a type of memory circuitry that holds the computer’s startup routine.
a. RIM (Read initial memory)
b. RAM (Random access memory)
c. ROM (Read only memory)
d. REM (Ready ever memory)
1
12. Hard disk storage technology can be classified as __________ storage.
a. optical
b. magnetic
c. fluid-state
d. pipelined
1
13. CD and DVD storage technologies can be classified as __________ storage.
a. solid state
b. bubble
c. magnetic
d. optical
1
14. Which of the following is an example of a rerecordable optical storage medium?
a. BD-RE
b. CD-RW
c. DVD+RW
d. All of the choices apply
1
15. Also called flash memory storage, solid state storage:
a. contains platters made of aluminum or glass.
b. provides fairly fast access to data.
c. includes moving parts.
d. all of the choices apply.
1. System software is designed t accomplish __________ tasks.
a. real-world
b. computer-centric
c. gaming
d. only operating systems
1
2. Application software is designed to accomplish __________ tasks and includes __________.
a. real-world/statistical software
b. computer-centric tasks/device drivers
c. gaming tasks/utilities
d. only systems tasks/Windows Vista
1
3. What are two main categories of software?
a. System and application
b. System and methodical
c. Application and processing
d. Authoring and publishing
1
4. Software most commonly associated with productivity software is:
a. the Windows Vista operating system.
b. real-time players.
c. word processing software.
d. browsers.
1
5. Productivity software that provides you with the ability to create, spell-check, edit, and format is considered __________ software.
a. word processing
b. desktop processing
c. Web authoring
d. spreadsheet
0
6. Productivity software that has sophisticated features to help you produce professional quality output is considered __________ software.
a. word processing
b. desktop publishing
c. Web authoring
d. spreadsheet
1
7. Spreadsheets are particularly useful for:
a. what-if analysis.
b. use as a calculator.
c. creating tables.
d. none of the choices apply.
1
8. 3-D graphics software provides a set of tools for creating __________ that represents three-dimensional objects.
a. models
b. prototypes
c. wireframes
d. photos
1
9. Software designed to generate unique musical compositions simply by selecting the musical style, instrument, key, and tempo is:
a. ear training.
b. notation.
c. computer-aided music.
d. MIDI.
1
10. A type of software that provides a set of tools for transferring video footage from a camcorder to a computer is __________ software.
a. role-playing
b. video editing
c. simulation
d. ear training
1
11. A __________ is a legal contract that defines the ways in which you may use a computer program.
a. software license
b. software agreement
c. software copyright
d. purchase agreement
1
12. Software that is available without restriction is:
a. shareware.
b. open source.
c. public domain.
d. GPL.
1
13. When installing software, you should:
a. always select the full installation.
b. always select the custom installation.
c. always select minimum installation.
d. select custom when you don’t need all the features.
1
14. To get rid of software you no longer want, you:
a. delete the icon.
b. delete the files.
c. run an uninstall routine.
d. none of the choices apply.
1
15. Antivirus software does not require any updates.
a. True
b. False
1
Question Points
1. Most personal computers today are sold with preinstalled operating systems including all of the following, except:
a. Linux.
b. Windows.
c. Mac OS.
d. HP.
1
2. The most obvious responsibility of your computer’s operating system is to:
a. provide an environment for running software.
b. allow device drivers to work.
c. provide a graphic interface for your interactions with the computer.
d. allow you to use your keyboard.
1
3. An operating system’s __________ capability supports a division of labor among all the processing units.
a. multitasking
b. multithreading
c. multiprocessing
d. multicomputing
1
4. The combination of hardware and software that helps people and computers communicate with each other is a user:
a. interface.
b. configuration.
c. database.
d. position.
1
5. The six steps in the boot process are powering up, starting the boot program, powering-on self-test, identifying peripheral devices, loading the operating system, and checking configuration and customization.
a. True
b. False
1
6. The Palm OS __________ is currently used for popular Palm brand PDAs and smartphones.
a. Garnet
b. Windows Mobile
c. iPhone
d. Symbian
1
7. Five operating systems dominate the realm of handheld computers: Windows Mobile OS, iPhone OS X, Symbian OS, Android OS, and Palm OS.
a. True
b. False
1
8. Current versions of Windows support file names up to __________ characters long.
a. 125
b. 200
c. 255
d. unlimited
1
9. An optional file identifier that is separated from a main file name by a period is a:
a. file convention.
b. file extension.
c. file path.
d. file folder.
1
10. File endings with .exe are __________ files.
a. executable
b. executive
c. exception
d. all of the choices apply
1
11. A file extension is always the same as a file format.
a. True
b. False
1
12. An extension of .sys designated a __________ type of file.
a. configuration
b. support
c. sound
d. database
1
13. An extension of .ocx designates a __________ type of file.
a. configuration
b. support
c. sound
d. database
1
14. An extension of .wav designates a __________ type of file.
a. configuration
b. support
c. sound
d. database
1
15. A(n) __________ disk is a bootable CD, DVD, or other media that contains a complete copy of your computer’s hard disk as it existed when shipped from the manufacturer.
a. boot
b. recovery
c. OS
d. complete
1
Question Points
1. A WAN provides connectivity within a limited geographical area often within a single building.
a. True
b. False
1
2.
The type of network shown in the accompanying figure is known as a:
a. LAN.
b. WAN.
c. MAN.
d. TAN.
1
3. Which of the following can serve as a node on the network in a LAN?
a. Computer
b. Networked peripheral
c. Network device
d. All of the choices apply
1
4. Which of the following is not a type of network device?
a. Hub
b. Switch
c. Workstation
d. Router
1
5. A peer-to-peer network:
a. contains one or more computers configured with server software.
b. contains one or more computers configured with client software.
c. allows workstations to share resources, such as files and applications.
d. has a computer that provides a centralized repository for data.
1
6. A __________ topology features a central connection point for all workstations and peripherals.
a. mesh
b. star
c. bus
d. ring
1
7. The physical arrangement of devices in a network is referred to as its physical:
a. topography.
b. logography.
c. logology.
d. topology.
1
8. In a __________ topology, network nodes are connected in a closed circle.
a. circle
b. closed
c. ring
d. star
1
9. A tree topology:
a. is a blend of star and ring networks.
b. consists of multiple star networks connected into a bus configuration by a backbone.
c. does not offer flexibility for expansion.
d. is no longer used.
1
10. A bus topology connects all devices to a common backbone, which functions as a shared communications link.
a. True
b. False
1
11. Thomas has been asked by a friend to overhaul an existing network so that it is more robust. She wants each device on the network to connect to all of the other devices on the network. Which network topology will Thomas most likely use?
a. Star topology
b. Bus topology
c. Mesh topology
d. Ring topology
1
12. A __________ is a physical path or a frequency used to connect the nodes of a network.
a. logical channel
b. communications channel
c. connecting link
d. node link
1
13. In the context of networks, the communications __________ refers to the set of rules for efficiently transmitting data from one network node to another.
a. protocol
b. topology
c. range
d. transmission
1
14. Which of the following is not an advantage of using a wired network?
a. Increased security
b. Fast access
c. Simple to configure
d. Limited mobility
1
15. Which of the following is a disadvantage of using a wireless network when compared to a wired network?
a. Speed
b. Range
c. Security
d. All of the choices apply
Network links tied together form a:
a. NAP.
b. VPN.
c. WAN.
d. LAN.
0
2. A network of high-capacity communication links is the Internet:
a. backbone.
b. gateway.
c. provider.
d. signal.
1
3. A company that offers Internet access to individuals is a(n):
a. InfoWeb.
b. DSL (Digital Subscriber Line).
c. Integrated Services Digital Network (ISDN).
d. Internet Serve Provider (ISP).
1
4. An ISP may provide __________ services.
a. E-mail
b. Web server
c. instant messaging
d. all of the choices apply
1
5. A __________ IP address is a permanently assigned address; __________ IP address is a temporarily assigned address; and a __________ IP address is essentially hidden from hackers.
a. static/dynamic/private
b. public/dynamic/private
c. static/private/dynamic
d. dynamic/static/private
1
6. Every domain name corresponds to a unique IP address that has been entered in a:
a. domain database.
b. domain name server.
c. name serve.
d. none of the choices apply.
1
7. Prefixes such as http://, www, and ftp: correspond to:
a. parts of the Internet.
b. domain names.
c. protocols.
d. addresses.
1
8. A fixed Internet connection that uses a voiceband modem and telephone lines is a __________ connection.
a. dial-up
b. fixed
c. DSL
d. ISDN
1
9. All of the following are considered high-speed connections, except:
a. ISDN.
b. DSL.
c. cable.
d. satellite.
1
10. DSL uses __________ to transmit data.
a. phone lines
b. cable connections
c. T1 lines
d. none of the choices apply
1
11. __________ currently offers the fastest Internet access speeds.
a. ISDN
b. DSL
c. Satellite
d. Cable
1
12. Satellite Internet service and TV service requires:
a. two satellite dishes.
b. a satellite dish and a modem.
c. two satellite dishes and two modems.
d. one satellite dish and two modems.
1
13. __________ is a wireless broadband service.
a. InfoWeb
b. Fixed wireless Internet service
c. Digital subscriber line
d. Integrated services digital network
1
14. Portable Internet access includes all of the following, except:
a. WiFi.
b. portable satellite.
c. portable wireless.
d. cellular.
1
15. __________ are intended to work on LANs to monitor and direct packets being transported from one device to another.
a. Routers
b. Gateways
c. Filters
d. Firewalls
Question Points
1. A(n) __________ is client software that displays Web page elements and handles links between pages.
a. explorer
b. browser
c. navigator
d. manager
1
2. HTML is called a markup language because authors mark up their documents by inserting HTML tags, which represent special instructions that specify how the document should appear when displayed on a computer screen or printed.
a. True
b. False
1
3. The __________ for a Web site’s main page, such as www.cnn.com, is usually short and to the point.
a. domain name
b. uniform resource locator (URL)
c. HTML
d. boolean operator
1
4. __________ is a protocol that works in conjunction with TCP/IP to get Web resources to your desktop.
a. HTML
b. URL
c. HTTP
d. FTP
1
5. A Web server’s response to a browser’s request includes an HTTP __________ that indicates whether the browser’s request could be fulfilled.
a. socket code
b. protocol code
c. status code
d. completion code
1
6. A __________ enables a Web server to keep track of your activity and compile a list of your purchases.
a. cookie
b. plug-in
c. socket
d. style sheet
1
7. __________ provides tools specifically designed to enter and format Web page text, graphics, and links.
a. A text editor
b. Web authoring software
c. Web Creator
d. W3C
1
8. When you purchase a textbook online from a site such as www.amazon.com, you are participating in __________; however, when you purchase a used digital camera directly from the owner on an online auction, you are participating in __________ e-commerce.
a. B2C/C2C
b. C2C/B2C
c. G2B/B2B
d. B2G/C2C
1
9. As Jessica begins her research of just how shopping carts work, she is surprised to find that many e-commerce sites store information about her Web visits on her hard drive. What do these sites use to store visit information?
a. Certificate authorities
b. Cookies
c. Digital certificates
d. Web servers
1
10. Most e-mail software has an HTML option. If the recipient of your HTML e-mail does not have HTML-compliant e-mail software, your message will be delivered as plain, unformatted __________ text.
a. binary
b. MIME
c. ASCII
d. RTF
1
11. __________ temporarily stores new messages in your inbox on an e-mail server. When you request your mail, it is downloaded and stored on your computer.
a. Web-based mail
b. POP (Post Office Protocol)
c. IMAP (Internet Messaging Access Protocol)
d. SMTP (Simple Mail Transfer Protocol)
1
12. Web-based e-mail allows you to use a(n) __________ to access and view your e-mail messages.
a. operating system
b. server
c. browser
d. crawler
1
13. __________ e-mail stores your e-mail messages on a server, where you have less control over who can access them.
a. POP
b. IMAP
c. SMTP
d. Web-based
1
14. To avoid becoming a spam victim you should:
a. reply to spam when you receive it.
b. always click on the links in e-mail messages.
c. provide your e-mail address to all sites that request it.
d. use a disposable e-mail address when you register for online sites.
1
15. __________ schemes redirect users to fake sites by poisoning a domain name server with a fake IP address, whereas __________ is an e-mail scam designed to persuade you into revealing confidential information by replying to an e-mail.
a. Filtering/pharming
b. Hypertexting/spoofing
c. Proxy/anonymizing
d. Pharming/phishing
Question Points
1. Digital audio is music, speech, and other sounds represented in a binary format for use in digital devices.
a. True
b. False
1
2. A(n) __________ is a device that contains a variety of input and output jacks plus audio-processing circuitry.
a. amplifier
b. macro recorder
c. sound card
d. video card
1
3. __________ audio file format does not use compression to reduce file size.
a. MP3
b. RealAudio
c. AIFF
d. AAC
1
4. Windows Media Player does not play __________ files.
a. Wave
b. AIFF
c. MP3
d. AAC
1
5. You have just decreased the number of pixels, resolution and file size of your graphic by selecting a portion of the image. What have you done to your graphic?
a. You have zoomed in on your graphic.
b. You have cropped your graphic.
c. You have pixelated your graphic.
d. You have rastered your graphic.
1
6. A True Color or 24-bit bitmap can produce a maximum of __________ colors.
a. 16.7 million
b. 10 million
c. 256
d. 2
1
7. A __________ palette contains a standard set of colors used by most Internet Web browses.
a. Web
b. grayscale
c. monitor
d. system
1
8. __________ is a graphics format with built-in compression that stores True Color bitmap data very efficiently in a small file.
a. GIF
b. BMP
c. PCX
d. JPEG
1
9. __________ video refers to videos that are constructed and displayed using a personal computer.
a. RAM
b. Frame
c. Desktop
d. Real
1
10. __________ video refers to small-format video designed to be viewed on a cell phone screen, for example.
a. CSS
b. PDA
c. Micro
d. Real
1
11. The process of converting analog video signals into a digital format is referred to as:
a. video streaming.
b. video conversion.
c. video capture.
d. video cataloging.
1
12. Most desktop video has a frame rate of __________ frames per second.
a. 30
b. 15
c. 50
d. 48
1
13. Digital video file formats are sometimes referred to as __________ formats.
a. baseline
b. integrated
c. container
d. tracked
1
14. __________ is a popular format for Web-based video that requires Adobe Flash Player.
a. RealMedia
b. Flash Video
c. QuickTime Movie
d. Audio Video Interleave
1
15. __________ shifting is the process of converting media files from a format suitable to one device to a format suitable for a different kind of device.
a. Device
b. Format
c. Player
d. Plug-in
1
1
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
