Download as pdf or txt
Download as pdf or txt
You are on page 1of 44

New Perspectives on Computer

Concepts 2013 Comprehensive 15th


Edition Parsons Test Bank
Go to download the full and correct content document:
https://testbankfan.com/product/new-perspectives-on-computer-concepts-2013-compr
ehensive-15th-edition-parsons-test-bank/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

New Perspectives on Computer Concepts 2014


Comprehensive 17th Edition Parsons Test Bank

https://testbankfan.com/product/new-perspectives-on-computer-
concepts-2014-comprehensive-17th-edition-parsons-test-bank/

New Perspectives on Computer Concepts 2016


Comprehensive 18th Edition Parsons Test Bank

https://testbankfan.com/product/new-perspectives-on-computer-
concepts-2016-comprehensive-18th-edition-parsons-test-bank/

New Perspectives on Computer Concepts 2018


Comprehensive 20th Edition Parsons Test Bank

https://testbankfan.com/product/new-perspectives-on-computer-
concepts-2018-comprehensive-20th-edition-parsons-test-bank/

New Perspectives on Microsoft Excel 2013 Comprehensive


1st Edition Parsons Test Bank

https://testbankfan.com/product/new-perspectives-on-microsoft-
excel-2013-comprehensive-1st-edition-parsons-test-bank/
New Perspectives on Computer Concepts 2018 Introductory
20th Edition Parsons Test Bank

https://testbankfan.com/product/new-perspectives-on-computer-
concepts-2018-introductory-20th-edition-parsons-test-bank/

New Perspectives Computer Concepts Enhanced


Comprehensive 2016 19th Edition Parsons Test Bank

https://testbankfan.com/product/new-perspectives-computer-
concepts-enhanced-comprehensive-2016-19th-edition-parsons-test-
bank/

New Perspectives on Computer Concepts 2018 Introductory


20th Edition Parsons Solutions Manual

https://testbankfan.com/product/new-perspectives-on-computer-
concepts-2018-introductory-20th-edition-parsons-solutions-manual/

New Perspectives on Microsoft Excel 2010 Comprehensive


1st Edition Parsons Test Bank

https://testbankfan.com/product/new-perspectives-on-microsoft-
excel-2010-comprehensive-1st-edition-parsons-test-bank/

New Perspectives on Microsoft Excel 2010 Comprehensive


1st Edition Parsons Solutions Manual

https://testbankfan.com/product/new-perspectives-on-microsoft-
excel-2010-comprehensive-1st-edition-parsons-solutions-manual/
Chapter 6: The Internet

TRUE/FALSE

1. The octets in an IP address correspond to the parts of a Web site address.

ANS: F PTS: 1 REF: 305

2. All IP addresses are static.

ANS: F PTS: 1 REF: 306

3. All IP addresses are dynamic.

ANS: F PTS: 1 REF: 306

4. The www in a URL is part of a domain name.

ANS: F PTS: 1 REF: 308

5. You must pay for a domain name.

ANS: T PTS: 1 REF: 309

6. You may use an analog modem even if your phone service is digital.

ANS: T PTS: 1 REF: 313

7. With a voiceband modem, actual data transfer speeds are affected by factors such as the quality of your
phone line and connection.

ANS: T PTS: 1 REF: 313

8. Cable signals are not particularly vulnerable to environmental interference.

ANS: T PTS: 1 REF: 316

9. Most of today’s notebooks are not equipped for Wi-Fi.

ANS: F PTS: 1 REF: 322

10. You can use a hotspot for mobile Internet access.

ANS: F PTS: 1 REF: 323

11. To use portable satellite technology you must take your satellite with you.

ANS: T PTS: 1 REF: 324

12. The disadvantages of WAP-enabled devices include their high price.

ANS: F PTS: 1 REF: 325


13. Some cell phones connect to your computer and act as a wireless modem.

ANS: T PTS: 1 REF: 327

14. Cloud computing is the term given to analyzing cloud patterns and, with the help of the computer,
predicting the weather.

ANS: F PTS: 1 REF: 329

15. Cell phones that offer Wi-Fi are not capable of making VoIP calls.

ANS: F PTS: 1 REF: 332

16. FTP is a protocol used by Internet phone companies for free long distance.

ANS: F PTS: 1 REF: 335

17. P2P file sharing allows users to obtain files from other users on the Internet.

ANS: T PTS: 1 REF: 337

18. BitTorrent protocols dissect files into small chunks that might reside on different computers.

ANS: T PTS: 1 REF: 337

19. One of the most common ways of gaining unauthorized access to a network is by looking for open
ports.

ANS: T PTS: 1 REF: 340

20. Most firewall software is preconfigured to block only unnecessarily open ports targeted by hackers.

ANS: T PTS: 1 REF: 341

MODIFIED TRUE/FALSE

1. A(n) on-and-off connection can have a static or dynamic IP address. _________________________

ANS: F, always-on

PTS: 1 REF: 307

2. A domain name ends with an extension that indicates its top-level domain.
_________________________

ANS: T PTS: 1 REF: 307

3. Downstream speed is the rate of data transmitted from your computer to the Internet.
_________________________

ANS: F, Upstream
PTS: 1 REF: 310

4. Mobile Internet access allows you to easily move your access device, as in the case of
vehicle-mounted satellite dishes that can be deployed when the vehicle is parked.
_________________________

ANS: F, Portable

PTS: 1 REF: 311

5. Current dial-up technology can transport data at speeds up to 6 MB downstream for a distance of about
1.25 miles. _________________________

ANS: F, DSL

PTS: 1 REF: 314

6. DSL is digital, so data doesn't need to be changed into analog signals and then back to digital.
_________________________

ANS: T PTS: 1 REF: 315

7. Wi-Fi handoffs from one Wi-Fi network to another are clumsy and prone to packet loss.
_________________________

ANS: T PTS: 1 REF: 323

8. The big bonus of portable WiMAX is that you use the same Internet service provider whether you are
at home or on the road. _________________________

ANS: T PTS: 1 REF: 324

9. Some cell phones can act as a Wi-Fi hotspot by becoming the router for a wireless network.
_________________________

ANS: T PTS: 1 REF: 328

10. Google Apps provides a glimpse of what grid computing has to offer for productivity applications.
_________________________

ANS: F, cloud

PTS: 1 REF: 329

11. Most messaging is based on a client/server technology. _________________________

ANS: T PTS: 1 REF: 331

12. Distributed grids tap into thousands of PCs and Macs with Internet connections whose owners rent
their computer’s idle hours to a grid processing task. _________________________

ANS: F, donate

PTS: 1 REF: 334


13. In the context of networking, a(n) virus-protector is software or hardware designed to filter out
suspicious packets attempting to enter or leave a computer. _________________________

ANS: F, firewall

PTS: 1 REF: 341

14. NATs are intended to work within LANs to monitor and direct packets being transported from one
device to another. _________________________

ANS: F, Routers

PTS: 1 REF: 342

15. Setting up a secure VPN is easy. _________________________

ANS: F
difficult
hard
nontrivial

PTS: 1 REF: 345

MULTIPLE CHOICE

1. The Internet began with a project called ____.


a. NSF c. ARPANET
b. AOL d. WWW
ANS: C PTS: 1 REF: 302

2. There are estimated to be more than ____ users of the Internet.


a. 2 million c. 2 trillion
b. 2 billion d. 100 million
ANS: B PTS: 1 REF: 303

3. Network service providers include ____.


a. AT&T c. British Telecom
b. Deutsche Telekom d. all of the above
ANS: D PTS: 1 REF: 303

4. ISPs can maintain servers for ____.


a. music file sharing c. instant messaging
b. online discussions d. all of the above
ANS: D PTS: 1 REF: 304
5. The accompanying figure represents the connection of your computer to the Internet; the router
marked A should belong to a(n) ____.
a. ISP c. end user
b. NSP d. none of the above
ANS: A PTS: 1 REF: 304

6. The accompanying figure represents the connection of your computer to the Internet; the router
marked B should belong to a(n) ____.
a. ISP c. company
b. NSP d. none of the above
ANS: B PTS: 1 REF: 304

7. In the accompanying figure, C points to ____.


a. an ISP c. the Internet backbone
b. an NSP d. an Internet router
ANS: C PTS: 1 REF: 304

8. The octets in an IP address correspond to a ____.


a. network class c. network configuration
b. network location d. none of the above
ANS: A PTS: 1 REF: 305

9. Most Internet servers have an easy to remember name that is known as a(n) ____.
a. domain address c. FQDN
b. ISP d. NAP address
ANS: C PTS: 1 REF: 307
10. ____ is a valid top-level domain.
a. .ca c. .gog
b. .can d. .aol
ANS: A PTS: 1 REF: 307

11. Every domain name corresponds to a unique IP address that has been entered into the ____.
a. domain database c. name server
b. Domain Name System d. Internet Name Server
ANS: B PTS: 1 REF: 308

12. Until domain names are added to the DNS database, new sites can only be accessed by entering their
numeric ____.
a. ports c. protocols
b. domain names d. IP addresses
ANS: D PTS: 1 REF: 308

13. DNS cache ____ has been used by governments to keep citizens away from Web sites that supply
politically or culturally inflammatory information.
a. diversion c. poisoning
b. rerouting d. distraction
ANS: C PTS: 1 REF: 308

14. You need your own domain name if ____.


a. you use the Internet c. you have your own Web site
b. you have an always-on connection d. you have a router
ANS: C PTS: 1 REF: 309

15. Technical management of the Internet's Domain Name System is coordinated by ____.
a. the government c. CANN
b. ICANN d. the Internet
ANS: B PTS: 1 REF: 309

16. The elapsed time for data to make a round trip from point A to point B and back is called ____.
a. speed c. mHz
b. latency d. access time
ANS: B PTS: 1 REF: 309

17. The rate of data that is transmitted from your computer to the Internet is ____.
a. downstream speed c. download speed
b. upstream speed d. upload speed
ANS: B PTS: 1 REF: 310

18. The rate of data arriving at your computer is ____.


a. downstream speed c. download speed
b. upstream speed d. upload speed
ANS: A PTS: 1 REF: 310

19. A fixed Internet connection that uses a voiceband modem and telephone lines is a(n) ____ connection.
a. dial-up c. DSL
b. fixed d. ISDN
ANS: A PTS: 1 REF: 312

20. In the accompanying figure, the type of signal represented by A is a(n) ____.
a. digital signal c. sine signal
b. analog signal d. cosine signal
ANS: A PTS: 1 REF: 313

21. In the accompanying figure, the type of signal represented by B is a(n) ____.
a. digital signal c. sine signal
b. analog signal d. cosine signal
ANS: B PTS: 1 REF: 313

22. Digital telephone systems open up the possibilities for digital data transport options such as ____.
a. cable Internet service c. WiMAX
b. DSL d. Both B and C
ANS: B PTS: 1 REF: 313

23. ____ service offered slightly faster service than dial-up but has today been replaced by DSL.
a. ISDN c. Cable Internet
b. WiMAX d. Satellite Internet
ANS: A PTS: 1 REF: 313

24. DSL uses ____ to transmit data.


a. phone lines c. T1 lines
b. cable connections d. none of the above
ANS: A PTS: 1 REF: 314

25. A ____ is a device that connects a computer to a telephone line and converts computer data signals
into signals compatible with DSL.
a. DSL filter c. DSL modem
b. DSL converter d. DSL adapter
ANS: C PTS: 1 REF: 315

26. ____ currently offers the fastest Internet access speeds.


a. ISDN c. Satellite
b. DSL d. Cable
ANS: D PTS: 1 REF: 316

27. Cable Internet service needs ____.


a. circuitry to handle Ethernet protocols and a cable modem
b. a cable modem and router
c. Internet protocols and a cable modem
d. a cable modem and phone lines
ANS: A PTS: 1 REF: 317

28. Satellite data transport is subject to ____ delays of one second or more, which occur as your data is
routed between your computer and a satellite that orbits 22,200 miles above the Earth.
a. latency c. frequency
b. conditional d. concatenation
ANS: A PTS: 1 REF: 318

29. Satellite Internet service and TV service requires ____.


a. two satellite dishes c. two satellites dishes and two modems
b. a satellite dish and a modem d. one satellite dish and two modems
ANS: B PTS: 1 REF: 318

30. ____ wireless Internet service is designed to offer Internet access to homes and businesses by
broadcasting data signals over areas large enough to cover most cities and outlying areas.
a. Mobile c. WiFi
b. Cellular d. Fixed
ANS: D PTS: 1 REF: 319

31. An Ethernet-compatible network standard designated as IEEE 802.16 is ____.


a. WiFi c. WiMAX
b. WiLAN d. WiMAN
ANS: C PTS: 1 REF: 319

32. Portable Internet access includes all of the following EXCEPT ____.
a. WiFi c. portable WiMAX
b. portable satellite d. cellular
ANS: D PTS: 1 REF: 321

33. The ability to easily move your Internet service from one location to another is considered ____
Internet service.
a. mobile c. moving
b. portable d. cellular
ANS: B PTS: 1 REF: 321

34. ____ is an up-and-coming standard destined to be deployed by ISPs and cell phone carriers to allow
seamless handoff between one tower and another.
a. WiMAX c. Portable WiMAX
b. Mobile WiMAX d. Mobile WiFi
ANS: B PTS: 1 REF: 324

35. Data transport rates depend on the technology of the cellular system. The generation of cellular
technology associated with analog voice service is ____.
a. 1G c. 2.5G
b. 2G d. 3G
ANS: A PTS: 1 REF: 325

36. Sending computer data over a ____ system required a voiceband modem to convert digital data into
audible signals.
a. 1G c. 3G
b. 2G d. Both A and B
ANS: D PTS: 1 REF: 325

37. ____ replaced analog technology with digital technology and added support for text messages.
a. 1G c. 3G
b. 2G d. 4G
ANS: B PTS: 1 REF: 325

38. ____ technologies support digital transmission for both voice and data.
a. 1G c. 3G
b. 2G d. None of the above
ANS: C PTS: 1 REF: 325

39. 3G technologies have speeds ranging from 200 Kbps to ____.


a. 500 Kbps c. 2 Mbps
b. 1 Mbps d. 5 Mbps
ANS: D PTS: 1 REF: 325

40. Examples of 3G technologies include ____.


a. EDGE c. HSUPA
b. EV-DO d. all of the above
ANS: D PTS: 1 REF: 325

41. Interim 4G technologies such as ____ have been deployed since 2009.
a. LTE c. EV-DO
b. ITE d. none of the above
ANS: A PTS: 1 REF: 325

42. A communications protocol that provides Internet access from handheld devices is ____.
a. WAP c. HAP
b. WIP d. HIP
ANS: A PTS: 1 REF: 325

43. The disadvantage of WAP-enabled devices is their ____.


a. access speed c. portability
b. screen size d. all of the above
ANS: B PTS: 1 REF: 325

44. With ____ you can easily assemble a small network just about anywhere.
a. RF c. EVDO
b. MiFi d. All of the above
ANS: B PTS: 1 REF: 327

45. ____ computing depends on a grid of servers, storage devices, and protocols that offer
Internet-accessible computing services ranging from consumer-level media sharing to office
productivity applications and complex corporate data processing.
a. Cloud c. Ambient
b. Disperse d. Client
ANS: A PTS: 1 REF: 330

46. Most messaging is based on a(n) ____ model.


a. P2P c. LAN
b. client/server d. Internet
ANS: B PTS: 1 REF: 331

47. Messaging and chat protocols include all of the following EXCEPT ____.
a. IRC c. Jabber
b. MSNP d. Talkie
ANS: D PTS: 1 REF: 331

48. VoIP software is sometimes referred to as a(n) ____ client.


a. ISP c. HTTP
b. SIP d. none of these
ANS: B PTS: 1 REF: 331

49. VoIP systems are offered by companies such as ____.


a. AT&T c. Vonage
b. magicJack d. all of the above
ANS: D PTS: 1 REF: 331

50. To set up free VoIP, you and the people you communicate with can install free VoIP clients such as
____.
a. SysIP c. Presto
b. Blink d. none of these
ANS: B PTS: 1 REF: 332

51. The ____ protocol allows the transfer of files from one computer to another over any TCP/IP network.
a. ftp c. P2P
b. http d. GRID
ANS: A PTS: 1 REF: 335
52. The accompanying figure is a screenshot of FileZilla, in which the ____ file will go to the location
pointed to by box B.
a. downloaded c. redirected
b. uploaded d. remastered
ANS: B PTS: 1 REF: 336

53. The accompanying figure is a screenshot of FileZilla, in which the ____ of the transfer is indicated by
box C.
a. index c. progress
b. resolution d. accuracy
ANS: C PTS: 1 REF: 336

54. The accompanying figure is a screenshot of FileZilla, in which the file to be ____ is indicated by box
A.
a. uploaded c. reloaded
b. downloaded d. remastered
ANS: A PTS: 1 REF: 336

55. ____ is a file sharing protocol that distributes the role of the file server across a collection of dispersed
computers.
a. ftp c. P2P
b. http d. BitTorrent
ANS: D PTS: 1 REF: 337
56. With BitTorrent, as more computers request the file, they become part of a ____ that uses peer-to-peer
technology to exchange file pieces with each other.
a. swarm c. leech
b. seed d. choker
ANS: A PTS: 1 REF: 337

57. BitTorrent can be used to distribute ____.


a. spyware c. malicious code
b. adware d. all of the above
ANS: D PTS: 1 REF: 338

58. Network services such as the Web, ftp, and e-mail operate from ____.
a. routers c. ports
b. gateways d. portals
ANS: C PTS: 1 REF: 340

59. The use of automated software to locate computers that are vulnerable to unauthorized access is a port
____.
a. search c. dig
b. probe d. pry
ANS: B PTS: 1 REF: 340

60. The average “survival time” for an unprotected computer to remain uncompromised is only ____.
a. nine seconds c. nine hours
b. nine minutes d. nine days
ANS: B PTS: 1 REF: 340

61. Sharing files on a LAN or the Internet requires open ____.


a. ports c. sources
b. domains d. channels
ANS: A PTS: 1 REF: 342

62. ____ are intended to work within LANs to monitor and direct packets being transported from one
device to another.
a. Routers c. Filters
b. Gateways d. Firewalls
ANS: A PTS: 1 REF: 342

63. A ____ IP address is one which can be accessed by packets on the Internet.
a. static c. routable
b. dynamic d. private
ANS: C PTS: 1 REF: 343
64. The accompanying figure represents a virtual private network. In this figure, A points to ____ data.
a. encrypted c. routed
b. remote d. nonencrypted
ANS: A PTS: 1 REF: 345

65. The accompanying figure represents a virtual private network. In this figure, B points to a(n) ____.
a. corporate network c. router
b. remote access server d. ISP
ANS: C PTS: 1 REF: 345

66. The accompanying figure represents a virtual private network. In this figure, C points to a(n) ____
server.
a. unencrypted c. public
b. VPN d. channel
ANS: B PTS: 1 REF: 345

67. The accompanying figure represents a virtual private network. In this figure, D points to ____ data.
a. nonencrypted c. wireless
b. encrypted d. public
ANS: A PTS: 1 REF: 345
68. The accompanying figure represents a virtual private network. In this figure, E points to ____.
a. a server c. an Internet channel
b. the Internet d. an ISP
ANS: B PTS: 1 REF: 345

69. You can install personal VPN software such as ____.


a. WiTopia c. HotSpotVPN
b. StrongVPN d. all of the above
ANS: D PTS: 1 REF: 345

70. One important security precaution when connecting your computer to public networks is to install a(n)
____.
a. router c. office suite
b. repeater d. remote PC
ANS: A PTS: 1 REF: 345

Case-Based Critical Thinking Questions


Case 6-1

Tom is currently using dial-up for his Internet connection but he believes it is too slow for his needs
and ties up his phone line. He is looking for an alternative and has come to you for help.

71. Tom wants to know which Internet access is the fastest. You tell him ____.
a. DSL c. satellite
b. ISDN d. cable
ANS: D PTS: 1 REF: 316 TOP: Critical Thinking

72. Tom wants to know which of the services uses his existing telephone lines. You tell him ____.
a. DSL c. satellite
b. cable Internet service d. WiMAX
ANS: A PTS: 1 REF: 314 TOP: Critical Thinking

73. Tom wants to know what kind of service to opt for if cable Internet service is not available, or proves
slower or less dependable than expected. You tell him the next choice would be ____.
a. dial-up c. ISDN
b. DSL d. satellite
ANS: B PTS: 1 REF: 320 TOP: Critical Thinking

Case-Based Critical Thinking Questions


Case 6-2

Sally often travels for her business. She needs a way to access the Internet while away from home. She
has come to you for help.

74. Sometimes Sally wants to browse the Internet while sitting and enjoying a cup of coffee. She has heard
that there are some public WiFi options but she knows there are some limitations. You tell her ____.
a. they are very expensive
b. access speed is slow
c. wireless eavesdroppers can access personal info
d. all of the above
ANS: C PTS: 1 REF: 323 TOP: Critical Thinking

75. You describe WiMAX to Sally. You tell her ____.


a. you can use the same provider for home and mobile use
b. you must get a “day pass” to use WiMAX if you are outside your home
c. it is great and that there is wide coverage
d. all of the above
ANS: A PTS: 1 REF: 324 TOP: Critical Thinking

76. Another option Sally is considering is a portable satellite system. She asks you about the details and
you tell her ____.
a. a vehicle-mounted satellite dish can be deployed from a control panel inside the vehicle
b. signals can no longer be captured dependably if a fixed satellite dish moves out of
alignment
c. the challenge is to make sure the dish is correctly aimed from the location where it is used
d. all of the above
ANS: D PTS: 1 REF: 324 TOP: Critical Thinking

77. Sally has heard that cellular data service has poor quality. You tell her ____.
a. that it is always poor
b. that it is never poor
c. that it depends on the generation of technology being used
d. that it depends totally on the carrier
ANS: C PTS: 1 REF: 325 TOP: Critical Thinking

Case-Based Critical Thinking Questions


Case 6-3

Harry is concerned about Internet security. He knows very little about the subject but does know it has
been in the news a great deal lately. He needs your advice.

78. You and Harry are discussing firewalls. You explain that he has a firewall built into Windows. He says
he has one that came with his virus protection. He should ____.
a. disable both
b. use only the one that came with Windows
c. not enable the Windows firewall if his antivirus software firewall is activated
d. use both
ANS: C PTS: 1 REF: 341 TOP: Critical Thinking

79. Harry’s grandson has been coming to his house and downloading music. His grandson turned “file
sharing” on. He is concerned this causes security problems. Harry should ____.
a. deactivate it when not needed c. get an additional firewall
b. get anti-sharing software d. forget it and not worry
ANS: A PTS: 1 REF: 342 TOP: Critical Thinking

80. Harry’s daughter has a personal VPN. He has decided he wants to be current and wants one also. You
tell him ____.
a. that you will go buy one
b. that he already has one as a part of Windows
c. that he needs a specialist to install it
d. that it would provide extra security if he intends to use public Wi-Fi hotspots
ANS: D PTS: 1 REF: 345 TOP: Critical Thinking

COMPLETION

1. NSP equipment and links are tied together by ____________________.

ANS:
network access points
NAPs
network access points (NAPs)
NAPs (network access points)

PTS: 1 REF: 303

2. The Internet ____________________ is a network of high-capacity routers and fiber-optic


communications links that provides the main routes for data traffic across the Internet.

ANS: backbone

PTS: 1 REF: 303

3. A company that offers Internet access to individuals is a(n) ____________________.

ANS:
ISP
Internet Service Provider
ISP (Internet Service Provider)
Internet Service Provider (ISP)

PTS: 1 REF: 303

4. A(n) ____________________ contains circuitry that converts various data-carrying signals from your
computer to signals that can travel over various communications channels.

ANS: modem

PTS: 1 REF: 304

5. The primary protocol suite responsible for message transmission on the Internet is
____________________.

ANS:
TCP/IP
Transmission Control Protocol/Internet Protocol
TCP/IP (Transmission Control Protocol/Internet Protocol)
Transmission Control Protocol/Internet Protocol (TCP/IP)

PTS: 1 REF: 305

6. The rate of data arriving at your computer is ____________________ speed.


ANS: downstream

PTS: 1 REF: 310

7. The type of Internet access that allows you to send an e-mail from your cellphone as you ride on a
high-speed train is ____________________.

ANS: mobile

PTS: 1 REF: 311

8. A fixed Internet connection that uses a voiceband modem and telephone line to transport data is
____________________.

ANS: dial-up

PTS: 1 REF: 312

9. A high-speed, digital, always-on, Internet access technology that runs over standard phone lines is
____________________.

ANS:
DSL
Digital Subscriber Line
DSL (Digital Subscriber Line)
Digital Subscriber Line (DSL)

PTS: 1 REF: 314

10. A DSL ____________________ prevents voiceband signals from interfering with DSL signals.

ANS: filter

PTS: 1 REF: 315

11. An area in which the public can access a Wi-Fi network is called a(n) ____________________.

ANS:
hotspot
Wi-Fi hotspot

PTS: 1 REF: 322

12. A communications protocol that provides Internet access from handheld devices is called
____________________.

ANS:
WAP
Wireless Access Protocol
WAP (Wireless Access Protocol)
Wireless Access Protocol (WAP)

PTS: 1 REF: 325


13. For the “real” Internet, cellular service providers offer data services, sometimes referred to as mobile
____________________.

ANS: broadband

PTS: 1 REF: 326

14. An Internet ____________________ is a Web-based online discussion site where participants post
comments to discussion threads.

ANS: forum

PTS: 1 REF: 332

15. A(n) ____________________ is similar to an online diary that contains a series of entries on one or
more topics.

ANS:
blog
Web log

PTS: 1 REF: 333

16. A(n) ____________________ is a short message of 140 characters or less, posted to the Twitter Web
site.

ANS: tweet

PTS: 1 REF: 333

17. A computing system in which a network of computers are harnessed together to perform processing
tasks is called a(n) ____________________ computing system.

ANS: grid

PTS: 1 REF: 334

18. Any access to data or programs by hackers, criminals, or other unauthorized persons is called
____________________.

ANS: intrusion

PTS: 1 REF: 339

19. A(n) ____________________ IP address is a non-routable IP address that can be used within a LAN,
but not for Internet data transport.

ANS: private

PTS: 1 REF: 343

20. The process your router uses to keep track of packets and their corresponding private or public IP
addresses is network address ____________________.
ANS: translation

PTS: 1 REF: 343

MATCHING

Identify the letter of the choice that best matches the phrase or definition.
a. anonymous FTP g. asymmetric Internet connection
b. private IP address h. VPN
c. symmetric Internet connection i. NAP
d. static IP address j. dynamic IP address
e. Ping k. Internet backbone
f. routable IP address l. fixed wireless Internet service
1. Provides the main routes for data traffic across the Internet
2. An Internet utility that sends a signal to a specific Internet address and waits for a reply
3. Upstream and downstream speeds are the same
4. Wireless broadband service
5. Does not use a password
6. Upstream and downstream speeds are different
7. Non-routable IP address
8. Temporarily assigned address
9. Permanently assigned address
10. Tie network links together
11. Can be accessed by packets on the Internet
12. A corporate solution for Internet security

1. ANS: K PTS: 1 REF: 303


2. ANS: E PTS: 1 REF: 309
3. ANS: C PTS: 1 REF: 311
4. ANS: L PTS: 1 REF: 319
5. ANS: A PTS: 1 REF: 336
6. ANS: G PTS: 1 REF: 310
7. ANS: B PTS: 1 REF: 343
8. ANS: J PTS: 1 REF: 306
9. ANS: D PTS: 1 REF: 306
10. ANS: I PTS: 1 REF: 303
11. ANS: F PTS: 1 REF: 343
12. ANS: H PTS: 1 REF: 345

ESSAY

1. Explain the difference between portable Internet access and mobile Internet access.

ANS:
Portable Internet access is defined as the ability to easily move your Internet service from one location
to another. The required device is light and compact enough to easily carry. However, you must
remain in one location while you use the service.
Mobile Internet access offers a continuous Internet connection as you are walking or riding in a bus,
car, train, or plane. It is very similar in concept to cellular phone service that allows you to move freely
within the coverage area as it seamlessly hands off your signal from one tower to the next. Mobile
Internet access includes Wi-Fi, mobile WiMAX, and cellular broadband service.

PTS: 1 REF: 321 TOP: Critical Thinking

2. Explain what VoIP is and how it works.

ANS:
VoIP (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet
connection is used to place telephone calls instead of the regular phone system. It is based on SIP
(Session Initiation Protocol), so VoIP software is sometimes referred to as a SIP client. The earliest
VoIP connections were computer-to-computer connections. Both the person initiating the call and the
person receiving the call had to have computers with microphones and headsets or speakers. You
could only call people who were using the same VoIP software and who happened to be online when
you wanted to call them. These early VoIP systems worked more like instant messaging with voice
than a traditional phone call. You can still use VoIP to make calls from one computer to another, but
today’s VoIP systems allow you to use a standard telephone handset to make or receive calls. They
also allow you to receive calls from land line telephones and to place calls to these telephones.

Today’s VoIP systems convert voice communications to data packets. An IP address is attached to
each packet. If you are calling a friend with computer-based VoIP, for example, your friend’s IP
address will be attached to the packets. If you are calling a land line or other destination without its
own IP address, your VoIP packets will carry an IP address of a service that can route your packets to
their destination using land lines where necessary.

PTS: 1 REF: 331-332 TOP: Critical Thinking

3. Explain what BitTorrent is and how it works.

ANS:
BitTorrent is a file sharing protocol that distributes the role of file server across a collection of
dispersed computers. BitTorrent is, in some sense, an offshoot of grid computing concepts, in which an
ad-hoc collection of personal computers located anywhere on the Internet can cooperate to complete a
task normally handled by monolithic servers or supercomputers.

A BitTorrent network is designed to reduce the bandwidth bottleneck that occurs when many people
attempt to download the same very large file, such as a feature-length film, application software, or an
interactive 3-D computer game.

Suppose that 100 computers request a film at about the same time. A server breaks the movie file into
pieces and begins to download those pieces to the first computer that requested the movie. As more
computers request the file, they become part of a “swarm” that uses peer-to-peer technology to
exchange file pieces with each other. After the server has downloaded all the file pieces to the swarm,
its job is complete and it can service other requests. The swarm continues to exchange file pieces until
every computer in the swarm has the entire file.

PTS: 1 REF: 337 TOP: Critical Thinking


Another random document with
no related content on Scribd:
6, 19, 172
mizlāgōth,
184
mizrāḳōth,
184
Moab,
116 f.
Moabites, invasion by,
249 f.
Molech (Malcam, Milcom),
125, 293
Mount Gerizim,
Samaritan Temple on, xxi, xxxviii
Mount Moriah,
176
Mount Seir,
32, 251, 281
Mount Zion,
xxxviii f.
Mulberry trees,
100
Music, the Levitical service of,
lii, 305 f.
Musical guilds,
xxiii, 145, 333
Muski,
5
Muṣri,
19, 172
Nabonidus (Nabu-na’id),
344, 351
Nabopolassar,
344, 350
Nabulus,
49
nāgīd,
33, 92, 295
naḥal,
252
Names,
significant, 24, 145 f.;
lists of, in oriental Histories, 1 f., 79
Nathan the prophet,
113, 168, 207, 305
Navy,
206
nēbhel,
96 f.
Nebuchadnezzar (Nebuchadrezzar),
347 f., 351
Neco I and II,
327, 336, 343 f.
nēr (nīr),
259
Neriglissar (Nergalšar-uṣur),
351
Nethinim,
65, 137
New Testament (passages of) referred to:
Matthew i. 3‒6, 15
Matthew i. 7, 23
Matthew v. 22, 293
Matthew v. 39, 244
Matthew xxiii. 35, lviii, 277
Matthew xxv. 15, 290
Mark ii. 26, 102
Mark ix. 43, 293
Mark xi. 2, 7, 96
Mark xvi. 1, 235
Luke i. 5, 143
Luke i. 7, 266
Luke ii. 36, 335
Luke iii. 31, 22
Luke vii. 44‒46, 297
Luke xi. 51, 277
Luke xii. 55, 192
Luke xv. 18, 21, 296, 321
Luke xix. 4, 172
John i. 45, 16
John iii. 27, 296
John xi. 54, 222
John xii. 3, 7, 235
John xviii. 1, 303
John xix. 39, 40, 235
Acts vii. 60, 278
Acts viii. 40, 287
Acts ix. 32, 27
Acts xii. 1, 228
Acts xii. 21, 159
Acts xii. 23, 222
Acts xiii. 2, 138
Acts xxi. 37, 163
Acts xxii. 24, 163
Romans i. 1, 138
Romans xi. 2, xxxii
Galatians i. 15, 138
2 Thessalonians ii. 11, 243
1 Timothy iii. 15, 114
Hebrew ii. 16, 297
1 John i. 9, 215
Revelation ii. 20, 335
Revelation xxi, 12‒16, 182
Nimrod,
7
Nineveh,
327
Nisan, the first month,
89, 301, 310, 339
Nobles, the,
273
Numbering of the people, see David
Numbers high in Chronicles,
xlix, 92, 133, 135 ff., 164 f., 178, 195, 204, 210, 218 f.,
221 f., 225 f., 239, 281, 294

ōb,
325
Obelisk of Shalmaneser II,
122, 206
Oblations (tᵉrūmāh)
314
Obsolete English words:
At (after verbs of asking), 241
Grave (verb = carve), 174
Magnifical, 134
Play (= dance), 96, 106
Polls (= heads), 137
Skill (verb), 174, 333
Oded,
229, 295 f.
ōhel,
197, 274
Omar, the Mosque of,
181
‘ōnēn,
325
Onyx,
164
Ophel,
291, 328
Ophir,
164, 202, 257
Oracle, the,
180, 185, 187
Ornan,
131, 177
Osorkon,
226
Overseers,
173, 176, 333

P, or “Priestly” narrative,
xx, 2 f.
paḥōth,
205
Palace, the,
163, 166
Palmyra,
199
Paphos, the temple of,
180
Parbar,
151
Parvaim,
178
Passover, the,
of Hezekiah, 308 ff.;
of Josiah, 310, 320, 339 ff.
Pelethites,
120, 167
Pentateuch, the,
xiv, xx, 238, 337 ff.
Perfect heart, a,
93, 160, 165 f., 231, 248
Pestilence,
130 f.
Petrie, W. M. Flinders,
History of Egypt, 226, 344
Philistines,
the original seats of the, 7;
war with the, 74, 99 ff., 126, 286 f., 297;
invasion by, 262 f.
Phinehas,
69
Phœnician language,
173
Physicians,
235
Pillar,
271
Pillars (Jachin and Boaz),
179 f., 184
Plague,
193
Play on words,
15, 57, 254, 282
Poll-tax,
274, 347
Porch of the Temple,
177
Porters, see Doorkeepers
Posts (= runners),
309
Precious stones,
178
Priesthood, the double,
102, 167
Priests,
51 f., 303, 307, 312 ff.;
courses of, 66;
sons of the, 71;
David’s organisation of the, 141 ff.
Princes of the sanctuary,
142
Princes of the tribes of Israel,
155
Prophetess,
335
Psaltery,
96, 103, 146, 188, 204
Psalms xcvi, cv, cvi,
107
Pul,
34, 37
Punt (Put),
6

Rabbah,
121, 125
Ramoth-gilead,
51, 240, 245
Rechabites, the,
21
Recorder (= chronicler),
120, 332
Rehoboam,
211 ff.
Rephaim,
126 f.;
valley of, 81, 99
Rhodians,
5
River, the (= the Euphrates),
13, 206
Robertson Smith, W.,
Old Testament in the Jewish Church, 16;
Religion of the Semites, 83, 180, 213, 219, 224
Robinson’s Arch,
150
Ruler of the house of God, the,
66, 315, 340
Ryle,
Genesis, referred to, 2 f., 6;
(on Ezra and Nehemiah), 143, 163, 273, 296, 334 f.;
Prayer of Manasses, 328

Sabbath,
351
Sackcloth,
131
Sacrifice,
consumed by fire from heaven, 195;
daily morning and evening, 141, 276;
sevenfold, made by Hezekiah, 304;
of thank offerings and burnt offerings, 306 f.;
of peace offerings, 106, 132, 307, 328
St Mary’s Well,
323 f., 327
Salt,
covenant of, 219;
the valley of, 119, 281
Samaria,
266, 309
Samaritan schism, the,
xxi, xxxviii
Samuel,
the descent of, 41;
the seer, 70, 168, 234
Sargon,
309, 317
Satan (= the Adversary),
128
Saul,
genealogy of, 62 f., 72;
defeat, death and burial of, 73 ff.
Saws,
126
Scorpion,
209
Scribe,
120, 142, 157
Sea of the Temple, the,
119, 181 f., 184, 300
Seer,
70, 168, 234
Sennacherib, threatened invasion by,
316 ff.
sēpher hattōrah,
338
Septuagint, the, version of Chronicles,
lviii f.
Shalmaneser,
122, 206, 309
Sharon,
35;
the great maritime plain, 156
Sheba,
6 f.;
Queen of, 202 ff.
shēbhet,
83
Shechem,
48, 56, 207
shelaḥ,
270, 319
shĕlāṭīm,
118, 270
Shemaiah,
210, 215
Sheminith,
set to the, 104
Shephēlāh,
156, 172, 207, 288, 298
Shewbread,
71 f., 139, 141, 162, 174, 221, 304
Shields of gold,
118, 205, 270, 323
Shihor, brook of,
96
Shishak, invasion by,
214 ff.
Siloam, the Lower Pool of,
318
Singers, the families of the,
xvi, xlii, 38, 42, 104, 145 ff., 341
ṣinnah,
205
sippim,
269
Slings,
288
Smith, G. A.,
Historical Geography of the Holy Land, 74 f., 81, 83,
171, 184, 192, 207, 212, 226, 249 f., 255, 294,
297;
Jerusalem, 78 f., 163, 288, 291, 318 f., 324, 327;
(in Encyclopedia Biblia), 118;
Early Poetry of Israel, 294
Sojourners,
165 f.
Solomon,
133 ff., 160 ff.;
twice crowned, 167;
great sacrifice of, 169 f.;
vision of, 170 f.;
horses and chariots of, 171 f.;
makes preparations for building the Temple, 173 ff.;
begins to build the Temple, 176 ff.;
brings the Ark into the sanctuary, 186 f.;
blessing and prayer of, 189 ff.;
the night vision of, 197 f.;
cities of, 198 ff.;
arrangements of, for the Temple worship, 201 f.;
the fleet of, 202;
the greatness of, 204 ff.
Sorcery,
325
Spices,
204, 235
Stir up the spirit,
37, 262, 352
Store cities,
233, 238
Strangers, see Aliens
Suburbs,
47, 95, 212, 316
Sun-images,
224, 331
Sycomore,
156, 172, 207
Syria, Syrians,
9, 17, 116, 124;
invasion by, 278
Syriac Version, the,
lix
Syro-Ephraimite war, the,
294 f.

Tabali,
5
Tabernacle,
70, 94, 133, 274 f.
Tabor,
50
Tadmor,
199
Tamar,
199
ṭaph,
252
Tarshish (= Tartessus),
5, 54, 205 f., 257 f.
Tarsus,
5
Task-work,
126, 134, 200
Tekoa,
18, 26, 254
Tell el-Amarna letters,
5, 58, 78, 121, 212
Teman,
11
Temple, the,
gates of, 68, 268 f., 272 f., 291;
David’s preparations for building, 133 ff.;
measurements of, 134, 177;
the pattern of, 161 ff.;
Solomon prepares to build, 173 ff.;
description of, 176 ff.;
dedication of, 186;
restoration of, 274 ff.;
cleansing of, 301 ff.;
repair of, 332 ff.;
Cyrus decrees the rebuilding of, 351 f.
Tenderhearted,
220
Tent,
69, 94, 101, 106, 186, 274
tĕrū‘ah,
106, 230
tĕrūmāh,
314
Testimony, the,
270 f., 274
Text of Chronicles, the,
xxii, lviii, 7, 13, 15, 16, 18, 21, 27, 28, 35, 41, 42, 46,
49, 54, 55, 56, 58, 59, 60, 68, 82, 85, 115, 182,
214, 217, 227, 248, 255, 259, 323, 336
Thistle (= thorn),
283
Threshing-floor,
97, 131 f., 242
Thucydides referred to,
xlviii
Tigris,
122
Tilgath-pilneser (Tiglath-pileser),
34, 37, 292, 297 ff., 309
Times (= changes, opportunities),
93, 168
Tisri, the seventh month,
186
Tithe,
313 f.
Titus, Arch of,
230
tōrah,
191, 228, 338
Torrey, C. C.,
Ezra Studies, xxxiii f., xlvi, lviii, lx, 38, 218, 237, 264 f.,
343, 345
Treasuries, the,
161
Trees, large,
76, 294
Tree-worship,
224
Trumpets, silver,
105, 112, 188, 196, 221, 230, 305
Tyre,
5, 8, 134
Tyrseni,
5
Uriah,
86, 120
Urim and Thummim,
99
Uzziah,
285 ff.

Valley of salt, the,


119, 281
Veil of the Temple, the,
179
Ventriloquism,
325
Vessels of gold,
185 f.
Vulgate, the,
lix

Wardrobe, keeper of the,


335
Wellhausen, J., references to,
lvi, lix, 20, 237, 271
Wilson’s Arch,
150
Wrath,
247, 249, 277, 323

Zadok,
39 f., 92, 102, 111, 142, 155, 167, 314
Zechariah, martyrdom of,
277
Zedekiah the king,
349 f.
Zedekiah the prophet,
242, 244
Zemaraim, the battle of,
218 ff.
Zerah the Ethiopian,
225 f.
Zidon, Zidonians,
8, 134
Ziz,
252
Zobah,
116 f., 122, 124, 199

CAMBRIDGE: PRINTED BY JOHN CLAY, M.A.


AT THE UNIVERSITY PRESS
WESTERN ASIA
(EARLY TIMES)

Cambridge University Press.


Copyright Cambridge University Press.
THE ENVIRONS OF JERUSALEM
Cambridge University Press

You might also like