Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Discovering Computers 2018

Module 2 – Connecting and Communicating Online: The Internet, Websites,


and Media

The Checkpoint exercises test your knowledge of the modules concepts

True/False Mark T for True and F for False. If False, rewrite the statement so that it is
True.
T/F Statement:
1. No single person or government agency controls or owns the Internet.
2. The W3C is responsible for maintaining all networks and content on the Internet.
3. Users typically pay additional fees for mobile hot spot and tethering services.
4. A gigabyte (GB) is the basic storage unit of a computer or mobile device and
represent a single character.
5. Developers use HTML, CSS, and JavaScript to create webpages and help users
share content online.
6. Most browsers are available for download at no cost.
7. Mobile apps sometimes have fewer features than a web app.
8. A subject directory is software that finds websites, webpages, images, videos,
maps, and other information related to specific topics.
9. When you post digital content online, it is a good idea to tag it so that it is easy to
locate and organise.
10. The term blogosphere refers to the worldwide collection of blogs.
11. Tethering is the process of transferring data in a continuous and even flow,
which allows users to access and use a file while it is in transmitting.
12. One way to protect yourself from identity theft online is to retain all your cookies
in your browser.

Matching – Matching the terms with the definitions.


1. Catfishing a. Real-time type conversation that takes place on a computer or
mobile device with many other online users.
2. Chat b. Term used to refer to the major carriers of network traffic.
3. Curation c. Online practice of creating a fake profile to form relationships with
website unsuspecting users.
4. Cyberbullying d. Short descriptive label that you are assign to a digital content so
that it is easier to locate at a later time.
5. Domain name e. Harassment often involves teens and pre-teens, using
technology.
6. Internet f. Website or web app that allows users to collect and compile
backbone content from a variety of websites about a particular topic or
theme.
7. Tag g. Techniques that transforms a smartphone or Internet-capable
tablet into a portable communications device that shares its
Internet access with other computers and devices wirelessly.
8. Tethering h. Text-based name that corresponds to the IP address of a server
that hosts a website.
9. Web serve i. Collaborative website that allows users to create, add, modify, or
delete web content via a browser.
10. Wiki j. Computer that delivers requested webpages to your computer or
mobile device.

VERMAAT, M. E., SEBOK, S. L., FREUND, S. M., CAMPBELL, J. T., Frydenberg, M. 2017. Discovering
Computers 2018: Digital Technology, Data, and Devices. Boston:Cengage Learning. 1|Page
Questions:
1. Explain how ARPANET contributed to the growth of the Internet.
2. Describe the role of a host on a network.
3. Identify the role of the W3C.
4. Define the term, dongle and broadband. List popular wired and wireless broadband
Internet services.
5. State the purpose of a hot spot, and list tips for using hotspots safety.
6. ISP stands for ________.
7. Briefly describe how data and information travel the Internet.
8. Describe the purpose and composition of an IP address. Differentiate between IPv4 and
IPv6.
9. Define the term, domain name. List general steps to register for a domain name.
10. Describe how and why cybersquatters register domain name.
11. State the purpose of a DNS server.
12. Differentiate between static and dynamic webpages.
13. Distinguish among the web, a webpage, a website, and a web server.
14. Describe why webpage developers use HTML CSS and JavaScript.
15. Explain the purpose of a browser. Describe the functions of a tab browser.
16. List ways you can browse safely.
17. Name examples of popular browsers for personal computer and mobile devices.
18. Define the term, web address. Name a synonym.
19. Name and give examples of the components of web address.
20. Describe the purpose of a web feed.
21. Explain the kinship between web and mobile apps.
22. Describe the purpose of GPS receivers, and why manufacturers embed them in
smartphones.
23. Describe how to use a search engine. What are some ways you can we find a surge?
24. Besides web pages, identify other items a search engine can find.
25. Differentiate between a search engine and a subject directory.
26. Explain how to use an online social network for personal or business use.
27. List ways to use online social networks securely.
28. Is it ethical to use a fake name online? Why or why not? List techniques to protect
yourself from identity theft.
29. Describe the uses of tags.
30. Define the term, e-commerce. Differentiate among B2C C2C and B2B e-commerce.
31. Let uses and benefits of content aggregation websites and apps.
32. Identify and briefly describe the steps in web publishing.
33. The ________ web design approach adapts the layout of the website to fit the screen on
which it is being displayed.
34. List the seven criteria for evaluating a website's content.
35. ________ refers to any application that combines text with media.
36. Explain how webpages use graphics, animation, audio, video, virtual reality, and plug-
ins.
37. Define the terms, thumbnail and infographic.
38. Name the type of graphics formats used on the web and how they use compression.
39. List general steps to download digital media.
40. Describe the purpose of these Internet services and explain how each works: email,
email list, internet messaging, chat rooms, online discussions, VoIP and FTP.
41. Describe the components of an email address.
42. ________ refers to Internet communication in which both parties communicate at the
same time.

VERMAAT, M. E., SEBOK, S. L., FREUND, S. M., CAMPBELL, J. T., Frydenberg, M. 2017. Discovering
Computers 2018: Digital Technology, Data, and Devices. Boston:Cengage Learning. 2|Page
43. List steps to set up a personal VoIP service and make a call.
44. Describe how a home user interacts with digital communications.
45. Define the term, netiquette.
46. Describe cyberbullying, and explain why it is difficult to catch the perpetrators.

© Some rights reserved. This time-limited emergency licence (Covid-19) permits non-commercial use,
distribution, and reproduction in any medium, provided the original author and source are credited in the
customary fashion and provided re-used snippets link back to the original available from the publisher. The
moral rights of the author have been asserted.

VERMAAT, M. E., SEBOK, S. L., FREUND, S. M., CAMPBELL, J. T., Frydenberg, M. 2017. Discovering
Computers 2018: Digital Technology, Data, and Devices. Boston:Cengage Learning. 3|Page

You might also like