You are on page 1of 7

Stage 1

Self test questions


1. Todays data transmission speeds are measured in Bps , Kbps ,Mbps,
and Gbps.
2. A(n) cable modem ,connects a personal computer to a cable-TV system that
offers an internet connection.
3. A space station that transmits data as microwaves is acommunications
satellite.
4. A company that connects you through your communications line to its server
, which connects you to the internet, is a(n)ISP.
5. A rectangular area on the computer screen that contains a document or
displays an activity is called a(n) Window.
6. Flaming is writing an online message that uses derogatory , obscene , or
inappropriate language.
7. A(n)Web browser is a software that enables users to view web pages and to
jump from one page to another.
8. A computer with a domain name is called a(n)server.
9. HTTP comprises the communications rules that allow browsers to connect
with web servers.
10.A(n) plug in is aprogram that adds a specific feature to a browser, allowing it
to play or view certain files.
11.Unsolicited email in the form of advertising or chain letters known asSpam.
12.The expression of how much data-text, voice,video,and so on can be sent
through communications channel in a given amount of time is known
as bandwidth.
13.A(n) URL is a string of characters that points to a specific piece of
information somewhere in the web.
14.Some websites may leave files on your hard disk that contain information
such as your name, password, and preferences; they are called cookies.
15.Using trusted institutional names to elicit confidential information is
called Phising.
16.The kind of spyware that can record each characters you type and transmit
that information to someone else on the internet , making it possible to
strangers to learn your passwords and other information, is called Key
logger.

Multiple Choice Questions


1. Kbps means how many bits per second?
a.
b.
c.
d.
e.

1 billion
1 thousand
1 million
1 hundred
1 trillion
1. A location on the internet is called a

a.
b.
c.
d.
e.

Network
User ID
Domain
Browser
Web
1. In the email address Kim_Lee@earthlink.net.us, Kim_Lee is the

a.
b.
c.
d.
e.

Domain
URL
Site
User ID
Location
1. Which of the following is not one of the four components of a URL?

a.
b.
c.
d.
e.

Web protocol
Name of the web server
Name of the browser
Name of the directory on the web server
Name of the file within the directory
1. Which of the following is the fastest method of data transmission?

a. ISDN
b. DSL
c. Modem

d. TI line
e. Cable modem
1. Which of the following is not netiquette rule?
a.
b.
c.
d.
e.

Consults FAQ
Flame only when necessary
Dont shout
Avoid huge file attachment
Avoid sloppiness and errors
1. Which protocol is used to retrieve email messages from the server to your
computer?

a.
b.
c.
d.

HTTP
SMTP
POP3
POP
1. Who owns internet?

a. Microsoft
b. IBM
c. Apple
d. U.S.government
e. No one owns the internet; the components that make up the internet
are owned and
shared by thousands of public and private entities.
1. Each time you connect to your ISP, it will assign your computer a new
address called a(n)
a.
b.
c.
d.
e.

Domain
IP address
Plug in
POP
URL
1. ISPs that dont run their own backbones connects to an internet backbones
through a

a.
b.
c.
d.
e.

NAP
Web portal
Web browser
URL
TCP/IP

1. Which of the following is not protocol?


a.
b.
c.
d.

TCP/IP
IE
HTTP
SMTP
1. The sending of phony email that pretends to be from a credit card company
or bank, luring you to website that attempts to obtain confidential information
from you is called

a. Spoofing
b. Phishing
c. Spamming
d. Keylogging
e. Cookies
True / false Questions
1. POP3 is used for sending email, and SMTP is used for retrieving email.(T)
2. A dial up modem is an ISP.(F)
3. Replying to spam email messages with statement remove will always get
spammers to stop sending you unsolicited email.(F)
4. All computer communications use the same bandwidth(F)
5. A TI line is the slowest but cheapest form of internet connection.(F)
6. A dynamic IP address gives you faster internet access than a static IP address
does(F)
7. A bookmark lets you return to a favorite website quickly(T)
8. Radio buttons are used for listening to radio stations on the internet(F)
9. Spoofing means using fake email sender names(T)
10.Hypertext refers to text presented with very large letters.(F)
Stage 2
Short answer Questions
1. Name three metods of data transmission that are faster than a regular
modem connection
T1 line , cable modem , satellite wireless connection
1. What does log on mean?

To make a connection to a remote computer


1. What is netiquette, and why is it important?
Network etiquette or appropriate online behavior. because internet is
used world wide , you will need a good behavior to use internet
1. Briefly define bandwidth.
An expression of how much data-text, voice , video ,or so on-can be sent
through a communications channel in a given amount of time.
1. Many web documents are linked.What does that mean?
Connected to the other documents or webages that contain related
information.
1. Compare and contrast a cable modem service to DSL service

DSL receive data at the rate 1.5-10 Mbps and can send data at only
128kbps-1.5mbps, you can download 6 minute music video in only 11
minutes. The advantage of DSL is that it is always on and its
transmission rate is relatively consistent.

Cable modem send data at rate 1.4Mbps-30Mbps, you can download


6 minute music video in only 2 minutes. The disadvantage of cabel
modem is that you and your cable TV viewing neighbours are sharing
the system and consequently, during the peek load times , your
service may be slowed to the speed of a regular dial-up modem. Also
using an internet connection that is always on-and that , in the case
of cable, you share with other people-invites outside interference
with your computer.

1. Explain the basics of how the internet works


Dial up with your client computers modem connecting via a local phone
call to your ISP.
1. What expanded functions does IMAP have?
If your access provider and email software support IMAP , you can search
through your email messages while they are still on the access providers
server before you download them
1. Briefly explain what TCP/IP does.

IP is used to send the packets across the internet to their final


destination, and TCP is used to reassemble the packets in the correct
order.
1. Why was ICANN established?
To regulate human friendly internet domain names-those addresses
ending with .com , .org , .net and so on, that overlie IP addresses and
identify the website type.
1. Whats the difference between a dynamic IP address and a static IP address?
Dynamic ip address is an IP address that will change everytime you
connect to internet ,Static IP address is an IP address that will remain the
same everytime you connect to the internet.
1. Explain what a blog is.
Short for web blog, an internet journal. Blogs are usually updated daily
;they reflect the personality and views of the blogger.
1. State your answer to a person who asks you the question Who owns the
internet?
Nobody owns internet , we the user of the internet owns it ourself.
1. What is B2B commerce?
Electronic sale or exchange of goods and services directly between ,
cutting out traditional intermediaries
1. List and briefly describe three kind of spyware

Adware

Is a kind of spyware that tracks web surfing or online buying so that


marketers can send you targeted and unsolicited pop-up or other ads.

Browser hijackers

Change setting in your browser without your knowledge , often changing


your browsers home page and replacing it with another web page

Search hijackers

Intercept your legitimate search requests made to real search engines and
return results from phony search services designed to send you to sites
they run.
Stage 3
Knowledge in action
7.
Email and IM are ways of sending text messages back and forth to other
people on the internet. They seem very similar : in both , you compose a message ,
and when its ready , you send it; and when someone else sends something to you,
you receive it on your devices and can read it.
But in practice, email and IM can be surprisingly different; each has its own rhythm,
its own strengths and weaknesses, its own sociology, its own etiquette. Instant
messaging is like using the telephone, whereas email is more like corresponding by
letter.
As you use email and IM during the course of the term, watch for differences
between them. Which medium is more appropriate for which kinds of relationships
and communications? Which medium is more stressful to use? Which takes more
time? Which is more convenient for you? Which one is more useful for getting real
work done? Which medium would you use if you knew that whatever you wrote was
eventually going to be published in a book. If you were restricted to using only one
of these communications methods. Which would it be?
Email is more formal than IM but it takes more time to sent, so I think
email is better for formal conditions and relationships such as from
employers to employee.
I think email is stressful to use , because we need to write it in formal
language, and it take more time to send an email rather than IM.
About which one is more convenient for me is depend on the conditions
and to whom my message will be sent. If my message is for my friends , I
may use IM ,but if it is for my boss, or my lecturer , I would rather use
Email, because email is more formal.
If I know that whatever I wrote will eventually going to be published in a
book , and if I was restricted to using only one of these communications
methods ,I would rather use email, because it s written in a formal
language.
10. As we have discussed in this chapter, the internet is both goldmine and
minefield. There are vast riches of information , entertainment, education, and
communication to be found, but there are also snoopers, spam, spoofing, phishing,
spyware, adware, browser hijackers, and key loggers. What should you do to avoid
these threats?
To avoid spam, snoopers , spoofing , and phishing , just believe that
everything in this world is not FREE. And to avoid spyware , adware ,
browser hijacker , and key logger is simple, be careful with FREE
download , be sure to prepare your computer with antivirus , or
antispyware before downloading.

You might also like