1.
What are the separate, definable parts that are sent when a message is sent through the Internet?
Correct Answer
D. Packets
Explanation
When a message is sent through the Internet, it is divided into separate, definable parts called packets. These packets contain the data of the message along with the necessary information for routing and reassembling at the destination. Each packet is sent individually and can take different paths to reach its destination. This division into packets allows for efficient and reliable transmission of data over the network.
2.
Which of the following is NOT a top-level domain?
Correct Answer
D. .comp
Explanation
The given answer ".comp" is not a valid top-level domain. Top-level domains are the last part of a domain name, such as .com, .org, or .net. These domains are used to categorize websites based on their purpose or geographical location. While .com, .us, and .name are all valid top-level domains, .comp does not exist as a recognized domain extension.
3.
What is the web address http://www.pod.edu/admissions/standards/entry.html also called?
Correct Answer
B. URL
Explanation
The web address http://www.pod.edu/admissions/standards/entry.html is also called a URL (Uniform Resource Locator). A URL is a specific web address that is used to locate and access resources on the internet. It consists of different components such as the protocol (in this case, "http"), the domain name ("www.pod.edu"), and the path ("/admissions/standards/entry.html").
4.
Which of the following is a narrowband connection?
Correct Answer
B. Modem
Explanation
A modem is a narrowband connection because it is designed to transmit data over a limited frequency range, typically using a telephone line. Unlike broadband connections such as cable modems, DSL, and T1 lines, which can transmit data at high speeds over a wide frequency range, a modem has a lower data transmission rate and is limited to a narrowbandwidth.
5.
Which type of software prevents unauthorized access to certain Web sites?
Correct Answer
C. Filtering
Explanation
Filtering software is designed to prevent unauthorized access to certain websites. It works by blocking or restricting access to specific websites or categories of websites based on predetermined criteria. This helps to ensure that users are only able to access approved websites and prevents them from accessing potentially harmful or inappropriate content. Filtering software is commonly used in schools, workplaces, and homes to enforce internet usage policies and protect users from malicious or inappropriate online content.
6.
What is term used to describe the disparity between people that have computers and those that do not?
Correct Answer
B. Digital Divide
Explanation
The term "Digital Divide" is used to describe the disparity between people who have access to computers and technology and those who do not. It refers to the gap in digital literacy, internet access, and technological resources between different socioeconomic groups or regions. This divide can have significant implications for education, employment opportunities, and overall access to information and communication in the modern digital age.
7.
Which of the following is not an Internet language?
Correct Answer
A. FTP
Explanation
FTP stands for File Transfer Protocol, which is a standard network protocol used for transferring files between a client and a server on a computer network. It is not considered an Internet language because it is primarily used for file transfer rather than for programming or scripting purposes. On the other hand, ActiveX, XML, and Java are all programming languages or technologies commonly used in Internet development and communication.
8.
Which TWO of the following are NOT examples of a portal?
Correct Answer(s)
B. HiTechHall
C. Google
Explanation
HiTechHall and Google are not examples of a portal because they are not websites that serve as a gateway or entry point to a variety of resources, services, and information. MSN and Yahoo! are examples of portals as they provide a range of services such as email, news, weather, and search engines.
9.
Which protocol is used to upload and download files from web servers?
Correct Answer
C. FTP
Explanation
FTP (File Transfer Protocol) is the correct answer because it is specifically designed for uploading and downloading files from web servers. Telnet is a protocol used for remote login and control of devices, not for file transfer. HTTP (Hypertext Transfer Protocol) is used for transferring web pages and data, but not specifically for file transfer. HTTPS (HTTP Secure) is a secure version of HTTP, but it does not focus on file transfer. Therefore, FTP is the most appropriate protocol for uploading and downloading files from web servers.
10.
What are the components of an email address?
Correct Answer
B. Username and host
Explanation
An email address consists of a username and a host. The username is the unique identifier for the individual or organization, while the host refers to the server that handles the email communication. The username is typically followed by the "@" symbol, which separates it from the host. The host can be a domain name or an IP address. Together, the username and host form a complete email address, allowing messages to be sent and received.
11.
What kind of server converts IP addresses to domain names?
Correct Answer
C. DNS
Explanation
DNS (Domain Name System) servers are responsible for converting IP addresses to domain names. When a user enters a domain name in their web browser, the DNS server translates that domain name into the corresponding IP address, allowing the user to access the desired website. DNS servers play a crucial role in internet communication by providing a way to easily identify and access websites using domain names instead of complex IP addresses.
12.
What type of portals serve employees within a corporation?
Correct Answer
B. Intranets
Explanation
Intranets serve employees within a corporation by providing them with a private network that allows them to access information, resources, and communication tools specific to their organization. It is a secure platform that enables employees to collaborate, share documents, access company policies, and stay updated on company news and announcements. Intranets are designed to enhance internal communication, streamline workflows, and improve productivity within the organization.
13.
An IP address is the same as a URL.
Correct Answer
B. False
Explanation
An IP address and a URL are not the same. An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It is used to identify and locate devices on a network. On the other hand, a URL (Uniform Resource Locator) is a specific web address that is used to locate and access a particular webpage or resource on the internet. While both are used in network communication, they serve different purposes and have different formats. Therefore, the statement that an IP address is the same as a URL is false.
14.
Internet2 will replace the Internet.
Correct Answer
B. False
Explanation
The statement "Internet2 will replace the Internet" is false. Internet2 is a separate network that was developed to provide high-speed connectivity and advanced services for research and education institutions. It was not designed to replace the existing Internet infrastructure that is used by the general public. The Internet and Internet2 are two distinct networks that serve different purposes. Therefore, the correct answer is false.
15.
Shockwave, RealOne, and Winamp are examples of plug-ins.
Correct Answer
A. True
Explanation
Shockwave, RealOne, and Winamp are all examples of plug-ins. A plug-in is a software component that adds specific features or functionality to a larger software application. In this case, Shockwave, RealOne, and Winamp are all plug-ins that can be added to web browsers or media players to enhance their capabilities. Therefore, the statement is true.
16.
With push technology, the user must request the data.
Correct Answer
B. False
Explanation
Push technology is a method where data is delivered to the user without the user explicitly requesting it. In this case, the statement says that with push technology, the user must request the data, which is incorrect. Therefore, the correct answer is False.
17.
Match this computer term with the correct definition:
http://
Correct Answer
B. Protocol
Explanation
A protocol is a set of rules that governs the communication between devices or systems. In the context of computer terms, a protocol refers to the specific set of rules and standards that determine how data is transmitted over a network. It defines the format, timing, sequencing, and error checking of data packets.
18.
Match this computer term with the correct definition:
.html
Correct Answer
C. Document extension
Explanation
The term ".html" refers to a document extension. In computer terminology, a document extension is a suffix added to the end of a file name to indicate the type of file it is. In this case, ".html" is commonly used to denote a Hypertext Markup Language file, which is used to create web pages. Therefore, ".html" is the correct match for the given definition.
19.
Match this computer term with the correct definition:
.gov
Correct Answer
A. Top level domain
Explanation
A top-level domain refers to the highest level in the hierarchical domain name system of the internet. It is the last part of a domain name, typically indicating the type of organization or the country associated with the website. ".gov" is a specific top-level domain used exclusively for government entities.
20.
What country attempts to limit its resident's access to controversial Web content by routing all incoming Internet traffic through a single control center?
Correct Answer
D. Saudi Arabia
Explanation
Saudi Arabia attempts to limit its resident's access to controversial Web content by routing all incoming Internet traffic through a single control center. This is done through a system known as the "Great Firewall of Saudi Arabia," which allows the government to monitor and filter internet traffic, blocking access to certain websites and online content that it deems inappropriate or against its strict social and religious norms. This control over internet access is part of Saudi Arabia's broader efforts to maintain strict control over information and maintain social and political stability within the country.
21.
An online shopping catalog for a large outdoor outfitter is almost certainly
Correct Answer
A. A data-driven Web site that separates site content from design
Explanation
The correct answer is "A data-driven Web site that separates site content from design". This means that the online shopping catalog is likely built using a database to store and retrieve product information, and the design of the website is separate from the content. This allows for easier updates and maintenance of the site, as changes to the design can be made without affecting the underlying content. It also suggests that the website is dynamic and can display different content based on user input or preferences.