Using information technology chapter 2
Stage 1
Self test questions
- Today’s data transmission speed’s are measured in Bps , Kbps , Mbps, and Gbps.
- A(n) cable modem ,connects a personal computer to a cable-TV system that offers an internet connection.
- A space station that transmits data as microwaves is a communications satellite.
- A company that connects you through your communications line to it’s server , which connects you to the internet, is a(n)ISP.
- A rectangular area on the computer screen that contains a document or displays an activity is called a(n) Window.
- Flaming is writing an online message that uses derogatory , obscene , or inappropriate language.
- A(n)Web browser is a software that enables users to view web pages and to jump from one page to another.
- A computer with a domain name is called a(n)server.
- HTTP comprises the communications rules that allow browsers to connect with web servers.
- A(n) plug in is aprogram that adds a specific feature to a browser, allowing it to play or view certain files.
- Unsolicited email in the form of advertising or chain letters known as Spam.
- The expression of how much data-text, voice,video,and so on – can be sent through communications channel in a given amount of time is known as bandwidth.
- A(n) URL is a string of characters that points to a specific piece of information somewhere in the web.
- Some websites may leave files on your hard disk that contain information such as your name, password, and preferences; they are called cookies.
- Using trusted institutional names to elicit confidential information is called Phising.
- The kind of spyware that can record each characters you type and transmit that information to someone else on the internet , making it possible to strangers to learn your passwords and other information, is called Key logger.
Multiple –Choice Questions
- Kbps means how many bits per second?
b. 1 thousand
c. 1 million
d. 1 hundred
e. 1 trillion
- A location on the internet is called a
b. User ID
c. Domain
d. Browser
e. Web
- In the email address Kim_Lee@earthlink.net.us, Kim_Lee is the
b. URL
c. Site
d. User ID
e. Location
- Which of the following is not one of the four components of a URL?
b. Name of the web server
c. Name of the browser
d. Name of the directory on the web server
e. Name of the file within the directory
- Which of the following is the fastest method of data transmission?
b. DSL
c. Modem
d. TI line
e. Cable modem
- Which of the following is not netiquette rule?
b. Flame only when necessary
c. Don’t shout
d. Avoid huge file attachment
e. Avoid sloppiness and errors
- Which protocol is used to retrieve email messages from the server to your computer?
b. SMTP
c. POP3
d. POP
- Who owns internet?
b. IBM
c. Apple
d. U.S.government
e. No one owns the internet; the components that make up the internet are owned and shared by thousands of public and private entities.
- Each time you connect to your ISP, it will assign your computer a new address called a(n)
b. IP address
c. Plug – in
d. POP
e. URL
- ISPs that don’t run their own backbones connects to an internet backbones through a
b. Web portal
c. Web browser
d. URL
e. TCP/IP
- Which of the following is not protocol?
b. IE
c. HTTP
d. SMTP
- The sending of phony email that pretends to be from a credit card company or bank, luring you to website that attempts to obtain confidential information from you is called
b. Phishing
c. Spamming
d. Keylogging
e. Cookies
True / false Questions
- POP3 is used for sending email, and SMTP is used for retrieving email. (T)
- A dial up modem is an ISP.(F)
- Replying to spam email messages with statement “remove” will always get spammers to stop sending you unsolicited email.(F)
- All computer communications use the same bandwidth(F)
- A TI line is the slowest but cheapest form of internet connection.(F)
- A dynamic IP address gives you faster internet access than a static IP address does(F)
- A bookmark lets you return to a favorite website quickly(T)
- Radio buttons are used for listening to radio stations on the internet(F)
- Spoofing means using fake email sender names(T)
- Hypertext refers to text presented with very large letters.(F)
Short answer Questions
- Name three metods of data transmission that are faster than a regular modem connection
- What does log on mean?
- What is netiquette, and why is it important?
- Briefly define bandwidth.
- Many web documents are “linked”.What does that mean?
- Compare and contrast a cable modem service to DSL service
- DSL receive data at the rate 1.5-10 Mbps and can send data at only 128kbps-1.5mbps, you can download 6 minute music video in only 11 minutes. The advantage of DSL is that it is always on and its transmission rate is relatively consistent.
- Cable modem send data at rate 1.4Mbps-30Mbps, you can download 6 minute music video in only 2 minutes. The disadvantage of cabel modem is that you and your cable TV viewing neighbours are sharing the system and consequently, during the peek load times , your service may be slowed to the speed of a regular dial-up modem. Also using an internet connection that is always on-and that , in the case of cable, you share with other people-invites outside interference with your computer.
- Explain the basics of how the internet works
- What expanded functions does IMAP have?
- Briefly explain what TCP/IP does.
- Why was ICANN established?
- What’s the difference between a dynamic IP address and a static IP address?
- Explain what a blog is.
- State your answer to a person who asks you the question “Who owns the internet?”
- What is B2B commerce?
- List and briefly describe three kind of spyware
- Adware
- Browser hijackers
- Search hijackers
Stage 3
Knowledge in action
7. Email and IM are ways of sending text messages back and forth to other people on the internet. They seem very similar : in both , you compose a message , and when it’s ready , you send it; and when someone else sends something to you, you receive it on your devices and can read it.
But in practice, email and IM can be surprisingly different; each has its own rhythm, its own strengths and weaknesses, its own sociology, its own etiquette. Instant messaging is like using the telephone, whereas email is more like corresponding by letter.
As you use email and IM during the course of the term, watch for differences between them. Which medium is more appropriate for which kinds of relationships and communications? Which medium is more stressful to use? Which takes more time? Which is more convenient for you? Which one is more useful for getting real work done? Which medium would you use if you knew that whatever you wrote was eventually going to be published in a book. If you were restricted to using only one of these communications methods. Which would it be?
Email is more formal than IM but it takes more time to sent, so I think email is better for formal conditions and relationships such as from employers to employee.
I think email is stressful to use , because we need to write it in formal language, and it take more time to send an email rather than IM.
About which one is more convenient for me is depend on the conditions and to whom my message will be sent. If my message is for my friends , I may use IM ,but if it is for my boss, or my lecturer , I would rather use Email, because email is more formal.
If I know that whatever I wrote will eventually going to be published in a book , and if I was restricted to using only one of these communications methods ,I would rather use email, because it s written in a formal language.
10. As we have discussed in this chapter, the internet is both goldmine and minefield. There are vast riches of information , entertainment, education, and communication to be found, but there are also snoopers, spam, spoofing, phishing, spyware, adware, browser hijackers, and key loggers. What should you do to avoid these threats?
To avoid spam, snoopers , spoofing , and phishing , just believe that everything in this world is not “FREE”. And to avoid spyware , adware , browser hijacker , and key logger is simple, be careful with “FREE download” , be sure to prepare your computer with antivirus , or antispyware before downloading.
0 comments: