Name: 
 
Technology Applications

End of Course Exam Review

---Part2- Chapters 14-17



Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

To use e-mail, you need _____.
a.
a computer
c.
an e-mail account
b.
an Internet connection
d.
all of the above
 

 2. 

In an e-mail address, this separates the mailbox name from the server address.
a.
the user’s name
c.
the ISP’s name
b.
the “at” symbol
d.
the attachment
 

 3. 

What does an e-mail server do?
a.
accepts incoming messages
c.
delivers incoming messages
b.
sends outgoing messages
d.
all of the above
 

 4. 

This is a program you can use to send and receive e-mail messages.
a.
e-mail client
c.
e-mail account
b.
e-mail server
d.
e-mail address
 

 5. 

This is a nickname you can assign to the recipient of an e-mail message.
a.
client
c.
CC
b.
alias
d.
none of the above
 

 6. 

If you want to send a copy of a message to someone other than the main recipient, you can list that person in this line of your message.
a.
To
c.
Subject
b.
Cc
d.
From
 

 7. 

When you receive a message, you can _____ it to someone else.
a.
carbon copy
c.
forward
b.
reply
d.
compose
 

 8. 

One of the most common e-mail mistakes is _____.
a.
using the wrong e-mail program
c.
bouncing a message
b.
entering the wrong e-mail address
d.
leaving the To: field blank
 

 9. 

This is a notice from an e-mail server telling you that a message you sent could not be delivered.
a.
e-mail message
c.
bounce message
b.
reply message
d.
forwarded message
 

 10. 

How are the recipients of spam forced to waste their time?
a.
They must correct the errors it contains.
b.
They must review and delete it.
c.
They must forward it to their friends.
d.
They must sign up for e-mail newsletters.
 

 11. 

This term is used to describe unwanted e-mail messages.
a.
filters
c.
newsletters
b.
spam
d.
mailing lists
 

 12. 

Many e-mail programs offer this tool to let users block unwanted e-mail messages.
a.
filters
c.
spammers
b.
bounce messages
d.
aliases
 

 13. 

Most e-mail viruses are sent as _____.
a.
forwarded messages
c.
attachments to messages
b.
bounce messages
d.
spam messages
 

 14. 

A virus programmer can insert virus code directly into this.
a.
an address book
c.
a bounce message
b.
an e-mail program
d.
an HTML-format message
 

 15. 

If you receive an e-mail message with an attached file but are unsure about the file’s origin, what should you do?
a.
Open it immediately.
c.
Ignore it.
b.
E-mail it to someone else.
d.
Delete it.
 

 16. 

This technology lets people communicate via their computers, by either typing real-time messages or by talking.
a.
e-mail
c.
presentation
b.
teleconferencing
d.
telephone
 

 17. 

This teleconferencing feature lets participants share documents on-screen.
a.
whiteboard
c.
markerboard
b.
chalkboard
d.
blackboard
 

 18. 

This technology allows participants to see and hear one another, even though they are in different places.
a.
teleconferencing
c.
videoconferencing
b.
e-mail
d.
telephone
 

 19. 

In this type of videoconference, people in many different locations can all see and hear each other.
a.
one-to-one
c.
many-to-many
b.
one-to-many
d.
all-to-all
 

 20. 

This type of technology can help people get a college degree from their home.
a.
e-mail
c.
videoconferencing
b.
distance learning
d.
teleconferencing
 

 21. 

How many computers are linked by the Internet?
a.
dozens
c.
thousands
b.
hundreds
d.
millions
 

 22. 

The Internet is a global _____.
a.
LAN
c.
P2PN
b.
WAN
d.
telephone network
 

 23. 

Which of the following is not an important part of the Internet?
a.
workstations
c.
servers
b.
clients
d.
protocols
 

 24. 

When you connect to the Internet, your computer is considered one of these.
a.
server
c.
protocol
b.
client
d.
network
 

 25. 

The Internet protocols went online for the first time in which year?
a.
1960
c.
1973
b.
1969
d.
1983
 

 26. 

The Internet began with a network named _____.
a.
ARPANET
c.
DARPA
b.
DARPANET
d.
none of the above
 

 27. 

Who owns the Internet?
a.
the U.S. government
c.
universities
b.
the U.S military
d.
no one
 

 28. 

What is the least expensive way to connect to the Internet?
a.
a dialup connection
c.
a DSL connection
b.
an ISDN connection
d.
a cable modem connection
 

 29. 

This type of Internet connection may require a special telephone line.
a.
dialup
c.
DSL
b.
ISDN
d.
cable modem
 

 30. 

If you access the Internet this way, you also need a telephone line and modem for sending files to other users.
a.
cable modem
c.
DSL
b.
satellite
d.
none of the above
 

 31. 

What does the term ISP stand for?
a.
Internet service provider
c.
Internet systems provider
b.
Internet software provider
d.
Internet site provider
 

 32. 

Which of the following is not an example of an online service?
a.
America Online®
c.
the Internet
b.
Microsoft Network
d.
CompuServe®
 

 33. 

These determine how networked computers communicate, format data, and transmit data.
a.
protocols
c.
servers
b.
clients
d.
ISPs
 

 34. 

The IP protocol defines these.
a.
other protocols
c.
ISP connections
b.
Internet addresses
d.
domain names
 

 35. 

This can identify one or more IP addresses.
a.
suffix
c.
domain name
b.
protocol
d.
TCP/IP
 

 36. 

E-mail and the World Wide Web are examples of Internet _____.
a.
services
c.
systems
b.
servers
d.
protocols
 

 37. 

These usually include organized subject guides to the Internet’s content.
a.
portals
c.
search engines
b.
browsers
d.
intranets
 

 38. 

This is a link from one document to another on the World Wide Web.
a.
hypertext
c.
e-mail
b.
hyperlink
d.
protocol
 

 39. 

What does the term URL stand for?
a.
unified resource locator
c.
uniform resource locator
b.
universal resource locator
d.
unidentified resource locator
 

 40. 

If you transfer a file from your computer to a server, the process is called _____.
a.
uploading
c.
inloading
b.
downloading
d.
outloading
 

 41. 

The creation of the World Wide Web began as a desire to create connections between these.
a.
documents
c.
protocols
b.
networks
d.
browsers
 

 42. 

This program can display Web documents that contain images and text.
a.
browser
c.
graphical browser
b.
Web browser
d.
graphics-and-text browser
 

 43. 

Like e-mail, newsgroups, and file transfer, the Web is an Internet _____.
a.
program
c.
server
b.
client
d.
service
 

 44. 

Web documents are linked to one another by this.
a.
hypertext
c.
hypertree
b.
hypertalk
d.
hypertags
 

 45. 

What does the term HTML stand for?
a.
hypertag markup language
c.
hypertext markup language
b.
hyperlink markup language
d.
hypertext makeup language
 

 46. 

This is a document on the World Wide Web.
a.
Web site
c.
Web server
b.
Web page
d.
Web browser
 

 47. 

Which protocol is used on the World Wide Web?
a.
HTTP
c.
HTML
b.
URL
d.
WWW
 

 48. 

In a Web browser, the Back and Forward buttons are each an example of this.
a.
address button
c.
navigation button
b.
favorites button
d.
Web button
 

 49. 

In a browser, you can type a URL here and press Enter to visit a specific Web page.
a.
Address box
c.
Navigation box
b.
Web box
d.
Bookmark box
 

 50. 

A subject guide groups Web pages together under these.
a.
sites
c.
search engines
b.
headings
d.
operators
 

 51. 

Google™ is an example of this.
a.
subject guide
c.
keyword search
b.
portal
d.
search engine
 

 52. 

Which of the following is not a Boolean operator that you would use in a Web search?
a.
IF
c.
AND
b.
OR
d.
NOT
 

 53. 

You should always _____ information you find on the Web.
a.
trust
c.
verify
b.
copy
d.
delete
 

 54. 

The freedom of the Web leads to greater potential for these.
a.
errors
c.
arguments
b.
corrections
d.
sales
 

 55. 

Which of the following is not an example of e-commerce?
a.
shopping
c.
trading stocks
b.
opening a bank account
d.
Web browsing
 

 56. 

In Web-based online banking, your financial data is stored here.
a.
your computer
c.
a personal finance program
b.
the bank’s computer
d.
an account
 

 57. 

Online shopping has grown in popularity because popular Web browsers are _____.
a.
free
c.
secure
b.
fast
d.
accurate
 

 58. 

For a seller, a key advantage to starting an online business is its low _____.
a.
traffic
c.
security
b.
cost
d.
employment
 

 59. 

What does the term SET stand for?
a.
secure electronic transactions
c.
simple electronic transactions
b.
safe electronic transactions
d.
single electronic transaction
 

 60. 

If you see this in your browser’s Address box, then you know the Web page you are using is secure.
a.
http
c.
https
b.
shttp
d.
htsp
 

 61. 

Which of the following is not a way of volunteering information about yourself?
a.
Web site registration
c.
warranty registration
b.
Web browsing
d.
sweepstakes entries
 

 62. 

Some companies may do this with personal information they collect about you.
a.
sell it
c.
delete it
b.
copy it
d.
none of the above
 

 63. 

Many Americans would like their _____ to be guaranteed by law.
a.
copyright
c.
fair use
b.
privacy
d.
warranty
 

 64. 

This type of law protects people and companies from the theft or misuse of their creative, literary, or artistic work.
a.
privacy
c.
fair use
b.
copyright
d.
none of the above
 

 65. 

In some cases, you can use a portion of a copyrighted work without permission. These cases are referred to as _____.
a.
plagiarism
c.
passing off
b.
copyright
d.
fair use
 

 66. 

What does the term AUP stand for?
a.
appropriate use policy
c.
approved use policy
b.
acceptable use policy
d.
alternative use policy
 

 67. 

Which of these guidelines might be included in a school’s acceptable use policy?
a.
Avoid objectionable Web sites.
c.
Respect the privacy of others.
b.
Use only appropriate language online.
d.
all of the above
 

 68. 

This is a type of crime that is carried out over the Internet.
a.
computer crime
c.
plagiarism
b.
cybercrime
d.
theft
 

 69. 

This is a program that performs one or more tasks that the user does not expect.
a.
virus
c.
antivirus
b.
macro
d.
e-mail
 

 70. 

This type of virus can be hidden inside ordinary document files, such as files created in a word processor or spreadsheet program.
a.
Trojan horse
c.
macro virus
b.
scam
d.
none of the above
 

 71. 

This is a destructive program that is disguised as a friendly or useful program such as a game.
a.
worm
c.
scam
b.
macro virus
d.
Trojan horse
 

 72. 

The illegal copying of computer programs is called _____.
a.
software programming
c.
software piracy
b.
software plagiarism
d.
software documentation
 

 73. 

Which of the following, if used as a computer password, would be easy for someone to guess?
a.
birthdate
c.
sister’s name
b.
pet’s name
d.
any of the above
 

 74. 

With this kind of access, an intruder can do anything he or she wants on a network.
a.
password
c.
anonymous
b.
superuser
d.
personal
 

 75. 

What does the term UPS stand for?
a.
uninterruptible power supply
c.
uninterruptible power surge
b.
uninterruptible power suppressor
d.
uninterruptible power system
 



 
Check Your Work     Start Over