Answers | Network+ CH.3 Quiz on Addressing, DBMS Chapter 1, and
Database Systems Design, Implementation & Management Study Guide
A security system separating 2 networks or even computers on the same network is called a .
- CORRECT ANSWER>>>>f irewall
Which of the following Internet services tends to provide the most consistent speeds? -
CORRECT ANSWER>>>> DSL
Contact your ISP if your actual Internet speed is than advertised. - CORRECT
ANSWER>>>> slower
Letting computer users drag images and documents across their computers' monitors made
the User Interface very popular - CORRECT ANSWER>>>>Graphical
The word modem stands for . - CORRECT ANSWER>>>>modulator-demodulator
The BitTorrent protocol is often called file sharing. - CORRECT ANSWER>>>>peer-to-
peer
WWW stands for ------------------- CORRECT ANSWER>>>>World Wide
Web Select the domain name. - CORRECT ANSWER>>>>www.cnet.com
Broadband is measured in . - CORRECT ANSWER>>>>Mbps
The volume of data that can be carried on an Internet transmission media in an amount of time is
called . - CORRECT ANSWER>>>>bandwidth
Which might be a choice for Internet service in your area? - CORRECT
ANSWER>>>>cable Internet
,What group determines the standards for the World Wide Web? -
CORRECT ANSWER>>>>The World Wide Web Consortium (W3C)
The highest level in the domain name hierarchy is known as the - CORRECT
ANSWER>>>> Top Level Domain
Pictures or videos taken and shared on Snapchat are called . - CORRECT
ANSWER>>>> snaps
All of the following are part of an RFID system except . - CORRECT
ANSWER>>>> network
A businesses brand is derived from all of the following except . - CORRECT
ANSWER>>>> what their competition perceived them to be
All of the following are true about Instagram except - CORRECT
ANSWER>>>>Instagram charges a fee to download the app.
If your debit card has been compromised U.S. Federal law says you are only liable for a
maximum of in fraudulent charges if you tell your bank within two business days of
learning about them. - CORRECT ANSWER>>>>$50.00
In the United States the federal covers most consumer oriented electronic transactions. -
CORRECT ANSWER>>>> EFT Act
What technology allows for the electronic communication of business oriented transactions
and information between people and organizations? - CORRECT ANSWER>>>>EDI
A global nonprofit organization that empowers people to create open resource materials that can
be shared or reused is called Commons. - CORRECT ANSWER>>>>Creative
There are risks associated with downloading content from the Internet. It is important to
consider all of the following when downloading from the Internet except - CORRECT
ANSWER>>>>your anti-virus software will ensure your files are safe.
Social networking is based on the six degrees of concept which posits that you can
connect with anyone through a chain of no more than six introductions or personal links.
- CORRECT ANSWER>>>>separation
Transferring a file from the Internet to your digital device is called . - CORRECT
ANSWER>>>> downloading
Snaps on Snapchat can be viewed for up to seconds (depending on what the user chooses)
and then disappear. - CORRECT ANSWER>>>>10
,The original wireless network privacy and protection standard for Wi-Fi was known as .-
CORRECT ANSWER>>>> WEP
A switch distinguishes between various devices within a network by theiraddresses. -
CORRECT ANSWER>>>> MAC
Because they're both Apple products, the browser that works most smoothly with Macintosh OS
X is . - CORRECT ANSWER>>>>safari
The protocol used for transmitting large files from one server to another over the Internet is
known as the Protocol (FTP). - CORRECT ANSWER>>>>File Transfer
The wireless network privacy standard that was introduced in 2003 but was quickly replaced
(due to numerous vulnerabilities) was known as - CORRECT ANSWER>>>> WPA
Your can provide hardware firewall protection for your home network where it connects to
the ISP's network, just as ISP networks have firewalls where they connect to the Internet.
- CORRECT ANSWER>>>>router
A name identifies a server site on the Internet. - CORRECT ANSWER>>>>domain
When you personally share an image on Pinterest it is known as a . - CORRECT
ANSWER >>>>pin
Software theft occurs when someone engages in all of the following except .-
CORRECT ANSWER>>>> erasing a program you purchased then sold to a friend
Personal branding can be accomplished digitally and in more traditional means including all of
the following except . - CORRECT ANSWER>>>>writing private journal entries
Twitter recommends using no more than ___ hashtags per Tweet. - CORRECT ANSWER>>>>2
A global nonprofit organization that empowers people to create open resource materials that can
be shared or reused is called Commons. - CORRECT ANSWER>>>>creative
There are risks associated with downloading content from the Internet. It is important to
consider all of the following when downloading from the Internet except - CORRECT
ANSWER>>>>your anti-virus software will ensure your files are safe.
Two main factors concerning your digital identity are privacy and -------- CORRECT
ANSWER>>>> security
If your debit card has been compromised and you wait more than two days, but fewer than two
months after you learn about the loss, you can be liable for up to ---------- CORRECT
ANSWER >>>>$500.00
, When copyrighted software is illegally copied, distributed, modified or sold and is considered
direct copyright infringement this is called . - CORRECT ANSWER>>>>software piracy
EDI stands for . - CORRECT ANSWER>>>>Electronic Data Interchange
A signal transmitted every few seconds by a wireless router so that users' computers can find the
Wi-Fi hotspot is called a(n) . - CORRECT ANSWER>>>> SSID
A transmission medium's capacity is called its - CORRECT ANSWER>>>> BANDWIDTH
he standard for wireless network privacy and protection is known as . - CORRECT
ANSWER >>>>wpa2
Paul Baran developed a technology called switching that made the Internet possible and
reliable. - CORRECT ANSWER>>>> packet
A URL identifies a particular address on the World Wide Web. - CORRECT
ANSWER>>>> file
Software that can be added to a browser to increase its functionality are called . - CORRECT
ANSWER>>>> plug-ins
URL stands forResource Locator. - CORRECT ANSWER>>>> Uniform
Sage was developed during the war. - CORRECT ANSWER>>>> cold
Which of the following statements about Facebook is true? - CORRECT
ANSWER>>>>Cyberstalking and online predators are a real problem on Facebook.
All of the following are protected against unauthorized use or distribution by intellectual
property laws except - CORRECT ANSWER>>>>open educational resources.
All of the following are considered e-commerce transactions except -
CORRECT ANSWER>>>>G2B
All of the following should be considered when using Twitter except - CORRECT
ANSWER>>>>if a Twitter user has been blocked you can file a formal complaint
through Twitter.
All of the following are true about Instagram except - CORRECT
ANSWER>>>>Instagram charges a fee to download the app.
All of the following are best practices when using LinkedIn except - CORRECT
ANSWER>>>>post vacation photos to show your friends where you've travelled.