Using information technology chapter 2

Stage 1
Self test questions
  1. Today’s data transmission speed’s are measured in Bps , Kbps , Mbps, and Gbps.
  2. A(n) cable modem ,connects a personal computer to a cable-TV system that offers an internet connection.
  3. A space station that transmits data as microwaves is a communications satellite.
  4. A company that connects you through your communications line to it’s server , which connects you to the internet, is a(n)ISP.
  5. A rectangular area on the computer screen that contains a document or displays an activity is called a(n) Window.
  6. Flaming is writing an online message that uses derogatory , obscene , or inappropriate language.
  7. A(n)Web browser is a software that enables users to view web pages and to jump from one page to another.
  8. A computer with a domain name is called a(n)server.
  9. HTTP comprises the communications rules that allow browsers to connect with web servers.
  10. A(n) plug in is aprogram that adds a specific feature to a browser, allowing it to play or view certain files.
  11. Unsolicited email in the form of advertising or chain letters known as Spam.
  12. The expression of how much data-text, voice,video,and so on – can be sent through communications channel in a given amount of time is known as bandwidth.
  13. A(n) URL is a string of characters that points to a specific piece of information somewhere in the web.
  14. Some websites may leave files on your hard disk that contain information such as your name, password, and preferences; they are called cookies.
  15. Using trusted institutional names to elicit confidential information is called Phising.
  16. The kind of spyware that can record each characters you type and transmit that information to someone else on the internet , making it possible to strangers to learn your passwords and other information, is called Key logger.

Multiple –Choice Questions
  1. Kbps means how many bits per second?
a.  1 billion
b.  1 thousand
c.  1 million
d.  1 hundred
e.  1 trillion
  1. A location on the internet is called a
a.  Network
b.  User ID
c.  Domain
d.  Browser
e.  Web
  1. In the email address, Kim_Lee is the
a.  Domain
b.  URL
c.  Site
d.  User ID
e.  Location
  1. Which of the following is not one of the four components of a URL?
a.  Web protocol
b.  Name of the web server
c.  Name of the browser
d.  Name of the directory on the web server
e.  Name of the file within the directory
  1. Which of the following is the fastest method of data transmission?
a.  ISDN
b.  DSL
c.  Modem
d.  TI line
e.  Cable modem
  1. Which of the following is not netiquette rule?
a.  Consults FAQ
b.  Flame only when necessary
c.  Don’t shout
d.  Avoid huge file attachment
e.  Avoid sloppiness and errors
  1. Which protocol is used to retrieve email messages from the server to your computer?
a.  HTTP
b.  SMTP
c.  POP3
d.  POP
  1. Who owns internet?
a.  Microsoft
b.  IBM
c.  Apple
d.  U.S.government
e.  No one owns the internet; the components that make up the internet are owned and     shared by thousands of public and private entities.
  1. Each time you connect to your ISP, it will assign your computer a new address called a(n)
a.  Domain
b.  IP address
c.  Plug – in
d.  POP
e.  URL
  1. ISPs that don’t run their own backbones connects to an internet backbones through a
a.  NAP
b.  Web portal
c.  Web browser
d.  URL
e.  TCP/IP
  1. Which of the following is not protocol?
a.  TCP/IP
b.  IE
c.  HTTP
d.  SMTP
  1. The sending of phony email that pretends to be from a credit card company or bank, luring you to website that attempts to obtain confidential information from you is called
a.  Spoofing
b.  Phishing
c.  Spamming
d.  Keylogging
e.  Cookies
True / false Questions
  1. POP3 is used for sending email, and SMTP is used for retrieving email. (T)
  2. A dial up modem is an ISP.(F)
  3. Replying to spam email messages with statement “remove” will always get spammers to stop sending you unsolicited email.(F)
  4. All computer communications use the same bandwidth(F)
  5. A TI line is the slowest but cheapest form of internet connection.(F)
  6. A dynamic IP address gives you faster internet access than a static IP address does(F)
  7. A bookmark lets you return to a favorite website quickly(T)
  8. Radio buttons are used for listening to radio stations on the internet(F)
  9. Spoofing means using fake email sender names(T)
  10. Hypertext refers to text presented with very large letters.(F)
Stage 2
Short answer Questions
  1. Name three metods of data transmission that are faster than a regular modem connection
T1 line , cable modem , satellite wireless connection
  1. What does log on mean?
To make a connection to a remote computer
  1. What is netiquette, and why is it important?
“Network etiquette” or appropriate online behavior. because internet is used world wide , you will need a good behavior to use internet
  1. Briefly define bandwidth.
An expression of how much data-text, voice , video ,or so on-can be sent through a communications channel in a given amount of time.
  1. Many web documents are “linked”.What does that mean?
Connected to the other documents or webages that contain related information.
  1. Compare and contrast a cable modem service to DSL service
  • DSL receive data at the rate 1.5-10 Mbps and can send data at only 128kbps-1.5mbps, you can download 6 minute music video in only 11 minutes. The advantage of DSL is that it is always on and its transmission rate is relatively consistent.
  • Cable modem send data at rate 1.4Mbps-30Mbps, you can download 6 minute music video in only 2 minutes. The disadvantage of cabel modem is that you and your cable TV viewing neighbours are sharing the system and consequently, during the peek load times , your service may be slowed to the speed of a regular dial-up modem. Also using an internet connection that is always on-and that  , in the case of cable, you share with other people-invites outside interference with your computer.
  1. Explain the basics of how the internet works
Dial up with your client computer’s modem connecting via a local phone call to your ISP.
  1. What expanded functions does IMAP have?
If your access provider and email software support IMAP , you can search through your email messages while they are still on the access provider’s server before you download them
  1. Briefly explain what TCP/IP does.
IP is used to send the packets across the internet to their final destination, and TCP is used to reassemble the packets in the correct order.
  1. Why was ICANN established?
To regulate human friendly internet domain names-those addresses ending with .com , .org , .net and so on, that overlie IP addresses and identify the website type.
  1. What’s the difference between a dynamic IP address and a static IP address?
Dynamic ip address is an IP address that will change everytime you connect to internet ,Static IP address is an IP address that will remain the same everytime you connect to the internet.
  1. Explain what a blog is.
Short for web blog, an internet journal. Blogs are usually updated daily ;they reflect the personality and views of the blogger.
  1. State your answer to a person who asks you the question “Who owns the internet?”
Nobody owns internet , we the user of the internet owns it ourself.
  1. What is B2B commerce?
Electronic sale or exchange of goods and services directly between , cutting out traditional intermediaries
  1. List and briefly describe three kind of spyware
  • Adware
Is a kind of spyware that tracks web surfing or online buying so that marketers can send you targeted and unsolicited pop-up or other ads.
  • Browser hijackers
Change setting in your browser without your knowledge , often changing your browser’s home page and replacing it with another web page
  • Search hijackers
Intercept your legitimate search requests made to real search engines and return results from phony search services designed to send you to sites they run.
Stage 3
Knowledge in action
7.            Email and IM are ways of sending text messages back and forth to other people on the internet. They seem very similar : in both , you compose a message , and when it’s ready , you send it; and when someone else sends something to you, you receive it on your devices and can read it.
But in practice, email and IM can be surprisingly different; each has its own rhythm, its own strengths and weaknesses, its own sociology, its own etiquette. Instant messaging is like using the telephone, whereas email is more like corresponding by letter.
As you use email and IM during the course of the term, watch for differences between them. Which medium is more appropriate for which kinds of relationships and communications? Which medium is more stressful to use? Which takes more time? Which is more convenient for you? Which one is more useful for getting real work done? Which medium would you use if you knew that whatever you wrote was eventually going to be published in a book. If you were restricted to using only one of these communications methods. Which would it be?
Email is more formal than IM but it takes more time to sent, so I think email is better for formal conditions and relationships such as from employers to employee.
I think email is stressful to use , because we need to write it in formal language, and it take more time to send an email rather than IM.
About which one is more convenient for me is depend on the conditions and to whom my message will be sent. If my message is for my friends , I may use IM ,but if it is for my boss, or my lecturer , I would rather use Email, because email is more formal.
If I know that whatever I wrote will eventually going to be published in a book , and if I was restricted to using only one of these communications methods ,I would rather use email, because it s written in a formal language.
10. As we have discussed in this chapter, the internet is both goldmine and minefield. There are vast riches of information , entertainment, education, and communication to be found, but there are also snoopers, spam, spoofing, phishing, spyware, adware, browser hijackers, and key loggers. What should you do to avoid these threats?
To avoid spam, snoopers , spoofing , and phishing , just believe that everything in this world is not “FREE”. And to avoid spyware , adware , browser hijacker , and key logger is simple, be careful with “FREE download” , be sure to prepare your computer with antivirus , or antispyware before downloading.

About the author

Hi this is Aamir Awan ....I'm really glad you decided to check this out. I've held off doing this for a while because I knew there were already a bunch of really great learning sites out there. But after the tremendous response I received when I asked the folks who subscribe to my newsletter about it, I thought it was about time. I hope you enjoy your stay. If you have any questions or concerns, feel free to contact me about them and I'll do all I can do help. Oh - and have fun!


Fight Spam! Click Here! LangProff