Deck 19: Networks

ملء الشاشة (f)
exit full mode
سؤال
A communications protocol is a set of rules for efficiently transmitting data from one network device to another.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Social networking services, such as Facebook and LinkedIn, are designed for people to reconnect with old friends and coworkers, and make new social or professional contacts.
سؤال
Forum rooms provide a synchronous environment in which a group of participants share text-based information.
سؤال
Ethernet is a wireless network technology and does not require a cable to connect network devices.
سؤال
A built-in referral system in the social network helps participants contact other participants with similar interests.
سؤال
When communication is synchronous , messages are held until the recipient is ready to view them.
سؤال
Software for accessing files stored in the cloud storage can only be built into software applications and browsers.
سؤال
Packets traveling on a single line always go to a single destination.
سؤال
Internet connections are classified as always-on connections if they remain active even when you are not online.
سؤال
In a network configured with a router, all network data travels to the router before continuing to its destination.
سؤال
A Wi-Fi hotspot is basically a wireless local area network that provides access to guests using laptop computers or mobile devices.
سؤال
All networks are secured.
سؤال
Homegroups are designed for computers with either the Windows operating system or Apple's OS X operating system.
سؤال
Cyberfraud is the repeated use of Internet-based communications technologies to deliberately harm other people through intimidation, humiliation, or embarrassment.
سؤال
A computer can have a permanently assigned dynamic IP address.
سؤال
NSP equipment and links are tied together by network service points.
سؤال
If your password is strong enough, do not change it.
سؤال
Text messaging is an asynchronous service; messages are delivered to a mobile device, where they are stored, and the recipient should delete them after they are viewed.
سؤال
A domain name ends with an extension that indicates its bottom-level domain.
سؤال
You always can assign a unique IP address to your computer.
سؤال
<strong>  Referring to the accompanying figure, the connection point between the printer and the network is referred to as a _____.</strong> A) link B) point C) device D) node <div style=padding-top: 35px> Referring to the accompanying figure, the connection point between the printer and the network is referred to as a _____.

A) link
B) point
C) device
D) node
سؤال
The Internet is a global network that connects millions of smaller networks, computers, and other devices that exchange data using a standard communications protocol called _____.

A) IP/TCP
B) TPC/IP
C) TCP/IP
D) TCP
سؤال
The first time you want to connect to a secured network, you are required to enter the correct _____.

A) decryption key
B) user name and password
C) password
D) encryption key
سؤال
Your computer acts as a _____ that receives data or services.

A) network server
B) client
C) destination computer
D) data processing unit
سؤال
Early communications networks, such as the telephone system, used a technology called _____ switching, which essentially established a dedicated, private link between two telephones for the duration of a call.

A) circuit
B) packet
C) connection
D) line
سؤال
Which of the following Internet Protocol addresses are divided into eight segments?

A) IPv6
B) IPv8
C) IPv4
D) IPv10
سؤال
NSP stands for _____.

A) Network System Provider
B) Network Support Provider
C) Network Service Protocol
D) Network Service Provider
سؤال
Packets can originate from _____ sources.

A) only one
B) not more than two
C) several
D) not more than five
سؤال
Discoverable network devices are listed under the _____ heading of File Explorer.

A) Homegroup
B) Network
C) Computer
D) Shared
سؤال
A router's wired _____ port can connect to a modem for Internet access.

A) uplink
B) outlink
C) inlink
D) onlink
سؤال
The most popular type of wireless network is called _____.

A) Bluetooth
B) Ethernet
C) VPN
D) Wi-Fi
سؤال
A _____ network typically connects personal computers within a very limited geographical area.

A) local area
B) wide area
C) virtual
D) private
سؤال
Homegroups are designed for computers with the _____ operating system.

A) Windows
B) OS X
C) iOS
D) Android
سؤال
Which of the following is the domain name of the following Web address: www.msu.edu/infotech?

A) www.msu.edu
B) msu.edu
C) edu
D) msu.edu/infotech
سؤال
<strong>  Referring to the accompanying figure, the _____ is serving the purpose of linking two or more nodes of the network.</strong> A) file server B) printer C) router D) modem <div style=padding-top: 35px> Referring to the accompanying figure, the _____ is serving the purpose of linking two or more nodes of the network.

A) file server
B) printer
C) router
D) modem
سؤال
All of the following are secure network icons, except _____.

A) <strong>All of the following are secure network icons, except _____.</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
B) <strong>All of the following are secure network icons, except _____.</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
C) <strong>All of the following are secure network icons, except _____.</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
D) <strong>All of the following are secure network icons, except _____.</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
سؤال
SSID stands for _____.

A) service set identifier
B) service system identifier
C) system set identifier
D) single service identifier
سؤال
To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.

A) <strong>To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
B) <strong>To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
C) <strong>To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
D) <strong>To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
سؤال
Which of the following links devices within an organization?

A) Internet
B) intranet
C) extranet
D) virtual network
سؤال
A virtual private network (VPN) is a type of _____ that allows remote users to connect to a private network using a public communications system such as the Internet.

A) local area network
B) intranet
C) extranet
D) wide area network
سؤال
Which of the following is the newest instant messaging platform?

A) AOL's AIM
B) Google Talk
C) Windows Messenger
D) ICQ
سؤال
A series of entries posted online similar to the entries in a diary is called a(n) _____.

A) blog
B) podcast
C) chat room
D) Facebook
سؤال
Which of the following is Microsoft's cloud storage service?

A) SkyDrive
B) iCloud
C) Dropbox
D) Just Cloud
سؤال
_____ provides a way to transfer files from one computer to another over a network.

A) TCP
B) FTP
C) IPv6
D) IP
سؤال
Which of the following is a video conferencing application?

A) Pinterest
B) Google Talk
C) Windows Messenger
D) GoToMeeting
سؤال
Fast Internet connections, called broadband, blaze away at _____ or more.

A) 200 Mbps
B) 100 Mbps
C) 100Kbps
D) 50 Mbps
سؤال
Which of the following top-level domains is designed for unrestricted use?

A) gov
B) edu
C) int
D) net
سؤال
Which of the following top-level domains is restricted to organizations established by international treaties?

A) gov
B) info
C) int
D) biz
سؤال
Which of the following is the most common Internet connection?

A) symmetrical
B) always-on
C) asymmetrical
D) downstream
سؤال
Which of the following is a broadband Internet access technology that works over standard phone lines?

A) cable Internet service
B) dial-up Internet service
C) satellite Internet service
D) DSL
سؤال
Which of the following types of communications tools is used for social networking (Facebook)?

A) Public Asynchronous
B) Private Asynchronous
C) Public Synchronous
D) Private Synchronous
سؤال
Which of the following types of communications tools is used for chat rooms?

A) Public Asynchronous
B) Private Asynchronous
C) Public Synchronous
D) Private Synchronous
سؤال
All of the Internet's domain names and corresponding IP addresses are stored on a system of computers called the _____.

A) Domain Name System
B) Domain Name Server
C) Domain Name Service
D) Domain Name Database
سؤال
Which of the following types of communications tools is used for forums and discussion groups?

A) Public Asynchronous
B) Private Asynchronous
C) Public Synchronous
D) Private Synchronous
سؤال
Which of the following is LEAST likely related to a slow Internet connection?

A) the number of users logged in to your Internet service
B) the amount of traffic that is circulating on the Internet
C) environmental factors that affect the speed of wireless connections
D) the speed of your computer's processor
سؤال
Window's network troubleshooter provides a set of utilities to identify and fix all of the following problems, EXCEPT _____.

A) Internet connections
B) Windows registry
C) shared folders
D) network circuitry
سؤال
Mobile broadband service is offered by the following wireless cellular phone service providers, EXCEPT _____.

A) Comcast
B) Verizon
C) AT&T
D) Sprint
سؤال
<strong>  The tool shown in the accompanying figure allows you _____.</strong> A) to check the speed of your computer B) to check the speed of your Internet connection C) both a and b D) neither a nor b <div style=padding-top: 35px> The tool shown in the accompanying figure allows you _____.

A) to check the speed of your computer
B) to check the speed of your Internet connection
C) both a and b
D) neither a nor b
سؤال
Which of the following types of communications tools is used for voice over IP (Skype)?

A) Public Asynchronous
B) Private Asynchronous
C) Public Synchronous
D) Private Synchronous
سؤال
If your network fails and you cannot get an e-mail or browse the Internet, you should check that _____.

A) airplane mode is enabled
B) the router is functioning correctly
C) the wireless signal is strong enough
D) All of the above
سؤال
Each connection point on a network is referred to as a network ____________________.
سؤال
Network data is often stored on a network ____________________, such as one that handles e-mail or movie downloads.
سؤال
Case-Based Critical Thinking Questions Case 19-1 Leon made a presentation about netiquette. His presentation was followed by a very useful discussion. Answer the following questions that the audience asked him. Which of the following is among the most important rules of netiquette?

A) Distinguish between business and personal
B) Proofread messages before you send them
C) Respond promptly
D) All of the above
سؤال
____________________ is online jargon for "Internet etiquette."
سؤال
The ____________________ is maintained by network service providers (NSPs).
سؤال
A Wi-Fi ____________________ is basically a wireless local area network that provides access to guests using laptop computers or mobile devices.
سؤال
A(n) ____________________ name is a key component of e-mail addresses and Web site addresses.
سؤال
Case-Based Critical Thinking Questions Case 19-1 Leon made a presentation about netiquette. His presentation was followed by a very useful discussion. Answer the following questions that the audience asked him. Which of the following is not appropriate etiquete for e-mail communications?

A) Promptly respond to messages
B) Type important messages in all uppercase
C) Be careful with wording
D) Do not spread false information
سؤال
Please briefly describe the following three ways of connecting to the Internet: Cable Internet service, digital subscriber line, and dial-up Internet service.
سؤال
When a communications tool is ____________________, interchanges happen in real time and all parties must be online at the same time.
سؤال
The capacity of an Internet connection is sometimes referred to as ____________________ and can be measured in bits per second.
سؤال
A(n) ____________________ area network is one that covers a large geographical area and typically consists of several smaller networks.
سؤال
The chapter listed nine of the most commonly used top-level domains. Please name five of the nine and include a description of who can use each domain.
سؤال
When your computer is connected to a local area network, you have access to files designated as "____________________" on other network computers.
سؤال
Case-Based Critical Thinking Questions Case 19-1 Leon made a presentation about netiquette. His presentation was followed by a very useful discussion. Answer the following questions that the audience asked him. Which of the following should be avoided when communicating with businesses?

A) Use of smileys
B) Use of uppercase and lowercase letters
C) Use of more formal language
D) Tailoring your message
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 19: Networks
1
A communications protocol is a set of rules for efficiently transmitting data from one network device to another.
True
2
Social networking services, such as Facebook and LinkedIn, are designed for people to reconnect with old friends and coworkers, and make new social or professional contacts.
True
3
Forum rooms provide a synchronous environment in which a group of participants share text-based information.
False
4
Ethernet is a wireless network technology and does not require a cable to connect network devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
5
A built-in referral system in the social network helps participants contact other participants with similar interests.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
6
When communication is synchronous , messages are held until the recipient is ready to view them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
7
Software for accessing files stored in the cloud storage can only be built into software applications and browsers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
8
Packets traveling on a single line always go to a single destination.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
9
Internet connections are classified as always-on connections if they remain active even when you are not online.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
10
In a network configured with a router, all network data travels to the router before continuing to its destination.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
11
A Wi-Fi hotspot is basically a wireless local area network that provides access to guests using laptop computers or mobile devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
12
All networks are secured.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
13
Homegroups are designed for computers with either the Windows operating system or Apple's OS X operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
14
Cyberfraud is the repeated use of Internet-based communications technologies to deliberately harm other people through intimidation, humiliation, or embarrassment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
15
A computer can have a permanently assigned dynamic IP address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
16
NSP equipment and links are tied together by network service points.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
17
If your password is strong enough, do not change it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
18
Text messaging is an asynchronous service; messages are delivered to a mobile device, where they are stored, and the recipient should delete them after they are viewed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
19
A domain name ends with an extension that indicates its bottom-level domain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
20
You always can assign a unique IP address to your computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
21
<strong>  Referring to the accompanying figure, the connection point between the printer and the network is referred to as a _____.</strong> A) link B) point C) device D) node Referring to the accompanying figure, the connection point between the printer and the network is referred to as a _____.

A) link
B) point
C) device
D) node
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
22
The Internet is a global network that connects millions of smaller networks, computers, and other devices that exchange data using a standard communications protocol called _____.

A) IP/TCP
B) TPC/IP
C) TCP/IP
D) TCP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
23
The first time you want to connect to a secured network, you are required to enter the correct _____.

A) decryption key
B) user name and password
C) password
D) encryption key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
24
Your computer acts as a _____ that receives data or services.

A) network server
B) client
C) destination computer
D) data processing unit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
25
Early communications networks, such as the telephone system, used a technology called _____ switching, which essentially established a dedicated, private link between two telephones for the duration of a call.

A) circuit
B) packet
C) connection
D) line
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following Internet Protocol addresses are divided into eight segments?

A) IPv6
B) IPv8
C) IPv4
D) IPv10
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
27
NSP stands for _____.

A) Network System Provider
B) Network Support Provider
C) Network Service Protocol
D) Network Service Provider
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
28
Packets can originate from _____ sources.

A) only one
B) not more than two
C) several
D) not more than five
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
29
Discoverable network devices are listed under the _____ heading of File Explorer.

A) Homegroup
B) Network
C) Computer
D) Shared
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
30
A router's wired _____ port can connect to a modem for Internet access.

A) uplink
B) outlink
C) inlink
D) onlink
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
31
The most popular type of wireless network is called _____.

A) Bluetooth
B) Ethernet
C) VPN
D) Wi-Fi
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
32
A _____ network typically connects personal computers within a very limited geographical area.

A) local area
B) wide area
C) virtual
D) private
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
33
Homegroups are designed for computers with the _____ operating system.

A) Windows
B) OS X
C) iOS
D) Android
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following is the domain name of the following Web address: www.msu.edu/infotech?

A) www.msu.edu
B) msu.edu
C) edu
D) msu.edu/infotech
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
35
<strong>  Referring to the accompanying figure, the _____ is serving the purpose of linking two or more nodes of the network.</strong> A) file server B) printer C) router D) modem Referring to the accompanying figure, the _____ is serving the purpose of linking two or more nodes of the network.

A) file server
B) printer
C) router
D) modem
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
36
All of the following are secure network icons, except _____.

A) <strong>All of the following are secure network icons, except _____.</strong> A)   B)   C)   D)
B) <strong>All of the following are secure network icons, except _____.</strong> A)   B)   C)   D)
C) <strong>All of the following are secure network icons, except _____.</strong> A)   B)   C)   D)
D) <strong>All of the following are secure network icons, except _____.</strong> A)   B)   C)   D)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
37
SSID stands for _____.

A) service set identifier
B) service system identifier
C) system set identifier
D) single service identifier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
38
To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.

A) <strong>To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.</strong> A)   B)   C)   D)
B) <strong>To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.</strong> A)   B)   C)   D)
C) <strong>To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.</strong> A)   B)   C)   D)
D) <strong>To see a list of available networks when using Windows 7 or 8, click the _____ network icon, located in the notification area of the desktop.</strong> A)   B)   C)   D)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following links devices within an organization?

A) Internet
B) intranet
C) extranet
D) virtual network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
40
A virtual private network (VPN) is a type of _____ that allows remote users to connect to a private network using a public communications system such as the Internet.

A) local area network
B) intranet
C) extranet
D) wide area network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
41
Which of the following is the newest instant messaging platform?

A) AOL's AIM
B) Google Talk
C) Windows Messenger
D) ICQ
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
42
A series of entries posted online similar to the entries in a diary is called a(n) _____.

A) blog
B) podcast
C) chat room
D) Facebook
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which of the following is Microsoft's cloud storage service?

A) SkyDrive
B) iCloud
C) Dropbox
D) Just Cloud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
44
_____ provides a way to transfer files from one computer to another over a network.

A) TCP
B) FTP
C) IPv6
D) IP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
45
Which of the following is a video conferencing application?

A) Pinterest
B) Google Talk
C) Windows Messenger
D) GoToMeeting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
46
Fast Internet connections, called broadband, blaze away at _____ or more.

A) 200 Mbps
B) 100 Mbps
C) 100Kbps
D) 50 Mbps
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which of the following top-level domains is designed for unrestricted use?

A) gov
B) edu
C) int
D) net
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which of the following top-level domains is restricted to organizations established by international treaties?

A) gov
B) info
C) int
D) biz
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following is the most common Internet connection?

A) symmetrical
B) always-on
C) asymmetrical
D) downstream
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
50
Which of the following is a broadband Internet access technology that works over standard phone lines?

A) cable Internet service
B) dial-up Internet service
C) satellite Internet service
D) DSL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
51
Which of the following types of communications tools is used for social networking (Facebook)?

A) Public Asynchronous
B) Private Asynchronous
C) Public Synchronous
D) Private Synchronous
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
52
Which of the following types of communications tools is used for chat rooms?

A) Public Asynchronous
B) Private Asynchronous
C) Public Synchronous
D) Private Synchronous
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
53
All of the Internet's domain names and corresponding IP addresses are stored on a system of computers called the _____.

A) Domain Name System
B) Domain Name Server
C) Domain Name Service
D) Domain Name Database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following types of communications tools is used for forums and discussion groups?

A) Public Asynchronous
B) Private Asynchronous
C) Public Synchronous
D) Private Synchronous
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
55
Which of the following is LEAST likely related to a slow Internet connection?

A) the number of users logged in to your Internet service
B) the amount of traffic that is circulating on the Internet
C) environmental factors that affect the speed of wireless connections
D) the speed of your computer's processor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
56
Window's network troubleshooter provides a set of utilities to identify and fix all of the following problems, EXCEPT _____.

A) Internet connections
B) Windows registry
C) shared folders
D) network circuitry
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
57
Mobile broadband service is offered by the following wireless cellular phone service providers, EXCEPT _____.

A) Comcast
B) Verizon
C) AT&T
D) Sprint
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
58
<strong>  The tool shown in the accompanying figure allows you _____.</strong> A) to check the speed of your computer B) to check the speed of your Internet connection C) both a and b D) neither a nor b The tool shown in the accompanying figure allows you _____.

A) to check the speed of your computer
B) to check the speed of your Internet connection
C) both a and b
D) neither a nor b
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
59
Which of the following types of communications tools is used for voice over IP (Skype)?

A) Public Asynchronous
B) Private Asynchronous
C) Public Synchronous
D) Private Synchronous
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
60
If your network fails and you cannot get an e-mail or browse the Internet, you should check that _____.

A) airplane mode is enabled
B) the router is functioning correctly
C) the wireless signal is strong enough
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
61
Each connection point on a network is referred to as a network ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
62
Network data is often stored on a network ____________________, such as one that handles e-mail or movie downloads.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
63
Case-Based Critical Thinking Questions Case 19-1 Leon made a presentation about netiquette. His presentation was followed by a very useful discussion. Answer the following questions that the audience asked him. Which of the following is among the most important rules of netiquette?

A) Distinguish between business and personal
B) Proofread messages before you send them
C) Respond promptly
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
64
____________________ is online jargon for "Internet etiquette."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
65
The ____________________ is maintained by network service providers (NSPs).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
66
A Wi-Fi ____________________ is basically a wireless local area network that provides access to guests using laptop computers or mobile devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
67
A(n) ____________________ name is a key component of e-mail addresses and Web site addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
68
Case-Based Critical Thinking Questions Case 19-1 Leon made a presentation about netiquette. His presentation was followed by a very useful discussion. Answer the following questions that the audience asked him. Which of the following is not appropriate etiquete for e-mail communications?

A) Promptly respond to messages
B) Type important messages in all uppercase
C) Be careful with wording
D) Do not spread false information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
69
Please briefly describe the following three ways of connecting to the Internet: Cable Internet service, digital subscriber line, and dial-up Internet service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
70
When a communications tool is ____________________, interchanges happen in real time and all parties must be online at the same time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
71
The capacity of an Internet connection is sometimes referred to as ____________________ and can be measured in bits per second.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
72
A(n) ____________________ area network is one that covers a large geographical area and typically consists of several smaller networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
73
The chapter listed nine of the most commonly used top-level domains. Please name five of the nine and include a description of who can use each domain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
74
When your computer is connected to a local area network, you have access to files designated as "____________________" on other network computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
75
Case-Based Critical Thinking Questions Case 19-1 Leon made a presentation about netiquette. His presentation was followed by a very useful discussion. Answer the following questions that the audience asked him. Which of the following should be avoided when communicating with businesses?

A) Use of smileys
B) Use of uppercase and lowercase letters
C) Use of more formal language
D) Tailoring your message
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.