• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/28

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

28 Cards in this Set

  • Front
  • Back

Today’s data transmission speed’s are measured in _____, ______, ______, and ______

Bps


Kbps


Mbps


Gbps

A(n) __________ ,connects a personal computer to a cable-TV system that offers an internet connection.

Cable modem

A space station that transmits data as microwaves is a __________.

Communications Satellite

A company that connects you through your communications line to it’s server , which connects you to the internet, is a(n) ____.

ISP

A rectangular area on the computer screen that contains a document or displays an activity is called a(n) _________.

Window

________ is writing an online message that uses derogatory , obscene , or inappropriate language.

Flaming

A(n) _________ is a software that enables users to view web pages and to jump from one page to another.

Web browser

A computer with a domain name is called a

Server

_______ comprises the communications rules that allow browsers to connect with web servers.

HTTP

________ is a program that adds a specific feature to a browser, allowing it to play or view certain files.

Plug in

Unsolicited email in the form of advertising or chain letters known as _______

Spam

The expression of how much data-text, voice,video,and so on – can be sent through communications channel in a given amount of time is known as _________

Bandwidth

_________ is a string of characters that points to a specific piece of information somewhere in the web.

URL

Some websites may leave files on your hard disk that contain information such as your name, password, and preferences; they are called ______

Cookies

Using trusted institutional names to elicit confidential information is called ________

Phising

The kind of spyware that can record each characters you type and transmit that information to someone else on the internet , making it possible to strangers to learn your passwords and other information, is called

Key logger

Kbps means how many bits per second?

1 thousand

A location on the internet is called a

Domain

In the email address Kim_Lee@earthlink.net.us, Kim_Lee is the

User ID

Which of the following is not one of the four components of a URL?

Name of the browser

Which of the following is the fastest method of data transmission?

Cable Modem

Which of the following is not netiquette rule?

Flame only when necessary

Which protocol is used to retrieve email messages from the server to your computer?

POP3

Who owns internet?

No one owns the internet; the components that make up the internet are owned and shared by thousands of public and private entities.

Each time you connect to your ISP, it will assign your computer a new address called a(n)

IP Address

ISPs that don’t run their own backbones connects to an internet backbones through a

NAP

Which of the following is not protocol?

IE

The sending of phony email that pretends to be from a credit cardcompany or bank, luring you to website that attempts to obtain confidential information from you is called

Phishing