Deck 10: Technology in the Law Office

Full screen (f)
exit full mode
Question
A domain name

A)is used to locate a missing person
B)is used to prepare a client's invoice
C)is used in a specific area of law
D)is used in an Internet address
E)none of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
The Department of Defense owns the Internet.
Question
In the 1960s,the Internet was designed

A)to manage the government's military establishments
B)as a means of communication that would withstand nuclear war
C)for e-mail purposes for employees of the National Science Foundation
D)to sell supplies to the Pentagon
E)none of the above
Question
Bundled software applications are

A)called office suites
B)easy to use because the commands are uniform
C)generally less powerful than individual applications
D)all of the above
E)none of the above
Question
ICANN is an international group of Internet users.
Question
An Internet Service Provider is

A)a software that allows files to be transferred between computers
B)a protocol that allows a computer to connect with a remote computer
C)a large community of network designers
D)a virus that will damage your computer
E)none of the above
Question
The World Wide Web is

A)a protocol that operates on the Internet
B)found in the United States only
C)also known as the Internet
D)funded by the government
E)none of the above
Question
Domain names

A)identify an organization
B)are used on the Internet only
C)were created by the InterNIC project
D)have caused conflicts between trademark owners and domain name registrants
E)all of the above
Question
A top-level domain

A)identifies the type of organization
B)is attached to a domain name
C)is a software that identifies operating systems
D)is a software that determines an application's purpose
E)a and b only
Question
America Online is an example of an ISP.
Question
The name of the first Internet was

A)MILNET
B)NSFNET
C)ICANN
D)ARPANET
E)NREN
Question
Add-on software

A)adds additional features to a software application
B)attaches to a firm's printer
C)is used for multimedia presentations only
D)is for use with the Internet only
E)none of the above
216
Question
Substantive software applications are used in court trials only.
Question
The Web delivers information via

A)hyperlinks
B)video clips
C)home pages
D)levels
E)plug-in software
Question
File Transfer Protocol organizes Internet information for search and retrieval.
Question
A database application is used for

A)managing information
B)a firm's client list
C)managing a firm's marketing efforts
D)all of the above
E)none of the above
Question
Protocols are used

A)as a set of rules that ensure that different software products can work together
B)to provide audio to websites
C)to provide video to websites
D)to connect a computer to a printer
E)a and b only
Question
Practice management software applications are

A)easy to program
B)very few and hard to find
C)developed specifically for a certain area of law
D)used for the Internet only
E)none of the above
Question
The differences)between custom software applications and off-the-shelf applications is/are

A)custom software is created only for the user
B)off-the-shelf is created for anyone who purchases it
C)no other firm has custom software
D)all of the above
E)none of the above
Question
The Internet

A)is used for legal research
B)is a worldwide cooperative network of networks
C)was designed by the Rand Corporation
D)all of the above
E)none of the above
Question
A search engine is an independent company.
Question
What are the four ways to locate specific information on the Web? ,
,,and .
Question
Software that is distributed without cost is called .
Question
Top level domains and type identifiers are used throughout the world.
Question
The collection of documents that are used as a template to prepare new documents is called an) .
Question
A pathname is the method of locating the government on the Internet.
Question
The protocol used by the Web is .
Question
Software created for use by groups is called .
Question
Law firms have websites ending in .com.
Question
A cybersquatter is .
Question
An intranet is based on Web technology.
Question
The Internet is also called the World Wide Web.
Question
Most law firm intranets consist of what five levels? ,
,,,and
.
Question
Plug-in software is used to allow a person to hear sound on the Web.
Question
Microsoft owns the Web.
Question
Information on the World Wide Web is always reliable.
Question
Protocol standards are set by .
Question
A URL is used to locate information in the Internet.
Question
A ccTLD is .
Question
Name three of the four main elements of a URL: ,
,and .
Question
What type of firm is most likely to have an extranet? .
Question
Phishing is .
Question
What is the difference between an intranet and an extranet?
Question
What are the three types of extranets? ,,and .
Question
A method that is used to secure access to an extranet is called an) .
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Technology in the Law Office
1
A domain name

A)is used to locate a missing person
B)is used to prepare a client's invoice
C)is used in a specific area of law
D)is used in an Internet address
E)none of the above
D
2
The Department of Defense owns the Internet.
False
3
In the 1960s,the Internet was designed

A)to manage the government's military establishments
B)as a means of communication that would withstand nuclear war
C)for e-mail purposes for employees of the National Science Foundation
D)to sell supplies to the Pentagon
E)none of the above
B
4
Bundled software applications are

A)called office suites
B)easy to use because the commands are uniform
C)generally less powerful than individual applications
D)all of the above
E)none of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
ICANN is an international group of Internet users.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
An Internet Service Provider is

A)a software that allows files to be transferred between computers
B)a protocol that allows a computer to connect with a remote computer
C)a large community of network designers
D)a virus that will damage your computer
E)none of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
The World Wide Web is

A)a protocol that operates on the Internet
B)found in the United States only
C)also known as the Internet
D)funded by the government
E)none of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Domain names

A)identify an organization
B)are used on the Internet only
C)were created by the InterNIC project
D)have caused conflicts between trademark owners and domain name registrants
E)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
A top-level domain

A)identifies the type of organization
B)is attached to a domain name
C)is a software that identifies operating systems
D)is a software that determines an application's purpose
E)a and b only
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
America Online is an example of an ISP.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
The name of the first Internet was

A)MILNET
B)NSFNET
C)ICANN
D)ARPANET
E)NREN
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Add-on software

A)adds additional features to a software application
B)attaches to a firm's printer
C)is used for multimedia presentations only
D)is for use with the Internet only
E)none of the above
216
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
Substantive software applications are used in court trials only.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
The Web delivers information via

A)hyperlinks
B)video clips
C)home pages
D)levels
E)plug-in software
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
File Transfer Protocol organizes Internet information for search and retrieval.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
A database application is used for

A)managing information
B)a firm's client list
C)managing a firm's marketing efforts
D)all of the above
E)none of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
Protocols are used

A)as a set of rules that ensure that different software products can work together
B)to provide audio to websites
C)to provide video to websites
D)to connect a computer to a printer
E)a and b only
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Practice management software applications are

A)easy to program
B)very few and hard to find
C)developed specifically for a certain area of law
D)used for the Internet only
E)none of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
The differences)between custom software applications and off-the-shelf applications is/are

A)custom software is created only for the user
B)off-the-shelf is created for anyone who purchases it
C)no other firm has custom software
D)all of the above
E)none of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
The Internet

A)is used for legal research
B)is a worldwide cooperative network of networks
C)was designed by the Rand Corporation
D)all of the above
E)none of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
A search engine is an independent company.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
What are the four ways to locate specific information on the Web? ,
,,and .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
Software that is distributed without cost is called .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
Top level domains and type identifiers are used throughout the world.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
The collection of documents that are used as a template to prepare new documents is called an) .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
A pathname is the method of locating the government on the Internet.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
The protocol used by the Web is .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
Software created for use by groups is called .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
Law firms have websites ending in .com.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
A cybersquatter is .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
An intranet is based on Web technology.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The Internet is also called the World Wide Web.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
Most law firm intranets consist of what five levels? ,
,,,and
.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
Plug-in software is used to allow a person to hear sound on the Web.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
Microsoft owns the Web.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
Information on the World Wide Web is always reliable.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
Protocol standards are set by .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
A URL is used to locate information in the Internet.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
A ccTLD is .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
Name three of the four main elements of a URL: ,
,and .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
What type of firm is most likely to have an extranet? .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
Phishing is .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
What is the difference between an intranet and an extranet?
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
What are the three types of extranets? ,,and .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
A method that is used to secure access to an extranet is called an) .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.