Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
28 Cards in this Set
- Front
- Back
Today’s data transmission speed’s are measured in _____, ______, ______, and ______ |
Bps Kbps Mbps Gbps |
|
A(n) __________ ,connects a personal computer to a cable-TV system that offers an internet connection. |
Cable modem |
|
A space station that transmits data as microwaves is a __________. |
Communications Satellite |
|
A company that connects you through your communications line to it’s server , which connects you to the internet, is a(n) ____. |
ISP |
|
A rectangular area on the computer screen that contains a document or displays an activity is called a(n) _________. |
Window |
|
________ is writing an online message that uses derogatory , obscene , or inappropriate language. |
Flaming |
|
A(n) _________ is a software that enables users to view web pages and to jump from one page to another. |
Web browser |
|
A computer with a domain name is called a |
Server |
|
_______ comprises the communications rules that allow browsers to connect with web servers. |
HTTP |
|
________ is a program that adds a specific feature to a browser, allowing it to play or view certain files. |
Plug in |
|
Unsolicited email in the form of advertising or chain letters known as _______ |
Spam |
|
The expression of how much data-text, voice,video,and so on – can be sent through communications channel in a given amount of time is known as _________ |
Bandwidth |
|
_________ is a string of characters that points to a specific piece of information somewhere in the web. |
URL |
|
Some websites may leave files on your hard disk that contain information such as your name, password, and preferences; they are called ______ |
Cookies |
|
Using trusted institutional names to elicit confidential information is called ________ |
Phising |
|
The kind of spyware that can record each characters you type and transmit that information to someone else on the internet , making it possible to strangers to learn your passwords and other information, is called |
Key logger |
|
Kbps means how many bits per second? |
1 thousand |
|
A location on the internet is called a |
Domain |
|
In the email address Kim_Lee@earthlink.net.us, Kim_Lee is the |
User ID |
|
Which of the following is not one of the four components of a URL? |
Name of the browser |
|
Which of the following is the fastest method of data transmission? |
Cable Modem |
|
Which of the following is not netiquette rule? |
Flame only when necessary |
|
Which protocol is used to retrieve email messages from the server to your computer? |
POP3 |
|
Who owns internet? |
No one owns the internet; the components that make up the internet are owned and shared by thousands of public and private entities. |
|
Each time you connect to your ISP, it will assign your computer a new address called a(n) |
IP Address |
|
ISPs that don’t run their own backbones connects to an internet backbones through a |
NAP |
|
Which of the following is not protocol? |
IE |
|
The sending of phony email that pretends to be from a credit cardcompany or bank, luring you to website that attempts to obtain confidential information from you is called |
Phishing |