KUNCI JAWABAN USING INFORMATION TECHNOLOGY CHAPTER / BAB 2
Learning
1 MEMORIZATION
Self-Test
Questions
1. Today’s
data transmission speeds are measured in Bps, Kbps, Mbps, and Gbps.
2. A(n)
Cable Modem, connects a personal computer to a cable-TV system that
offers an internet connection.
3. A
space station that transmits data as micro waves is a Communications
Satellite.
4. A
company that connects you through your communications line to it’s server,
which connects you to the internet, is a(n) ISP.
5. A
rectangular area on the computer screen that contains a document or displays an
activity is called a(n) Window.
6. Flaming
is writing an online massage that uses derogatory, obscene, or inappropriate
language.
7. A(n)
Web Browser is a software that enables users t view web pages and to
jump from one page to another.
8. A
computer with a domain name is called a(n) Server.
9. HTTP
comprises the communications rules that allow browsers to connect with web
servers.
10. A(n)
Plug IN is aprogram that adds a specific feature to a browser, allowing
it to play or view certain files.
11. Unsolicited
email in the form of advertising or chain letters known as Spam.
12. The
expression of hoe much data-text, voice, video, and so on – can be sent through
communications channel in a given amount of time is known as Bandwidth.
13. A(n)
URL is string of characters that points to a specific piece of
information somewhere in the web.
14. Some
websites may leave files on your hard disk that contain information such as
your name, password, and preferences; they are calles Cookies.
15. Using
trusted institutional names to elicit confidential information is called Phising.
16. The
kind of spyware that can record each characters you type and transmit that
information to someone else on the internet, making it possible to strangers to
learn your passwords and other information, is called Key Logger.
Multiple-Choice Questions
1. B.
1 thousand
2. C.
Domain
3. D.
User ID
4. C.
Name of the browser
5. D.
TI line
6. B.
Flame only when necessary
7. C.
POP3
8. E.
No one owns the internet; the components that make up the internet are owned
and shared by thousands of public and private entities.
9. B.
IP address
10. A.
NAP
11. B.
IE
12. B.
Phising
True / False Questions
1. False
2. False
3. False
4. True
5. False
6. False
7. True
8. True
9. True
10. False
Learning
2 COMPREHENSION
Short-Answer Questions
1. Name
three metods of data transmission that are faster than a regular modem
connection.
T1 line, cable modem, satellite
wireless connection.
2. What
does log on mean?
Log on is mean to make a connection
to a remote computer.
3. What
is netiquette, and whay is it important?
“Network etiquette” or apppropriate
online behavior. Because internet is used world wide, you will need a good
behavior to use internet.
4. Briefly
define bandwidht.
An expression of how much data-text,
voice, video, or so on-can be sent through a communications channel in a given
amount of time.
5. Many
web document are “linked”. What does that mean?
Connected to the other documents or
webages that contain related information.
6. Compare
and contrast a cable modem service to DSL service.
o
DSL receive data at the rate 1.5-10
Mbps and can send data at only 128 Kbps-1.5 Mbps, you can download 6 minute
music video in only 11 minutes. The advantage of DSL is that it is always on
and its transmission rate is relatively con sistent.
o
Cable modem send data at rate 1.4
Mbps- 30 Mbps, you can download 6 minute music video in only 2 minutes. The
disadvantage of cable modem is that you and your cable TV viewing neighbours
are sharing the system and consequently, during the peek load times, your
service may be slowed to the speed of a regular dial-up modem. Also using an
internet connection that is always on- and that, in the case of cable, you
share with other people invites outside interference with your computer.
7. Explain
the basics of how the internet works.
Dial up with your client computer’s
modem connecting via a local phone call to your ISP.
8. What
expanded functions does IMAP have?
If your acces provider and email
software support IMAP, you can search through your email massages while they
are still on the access provider’s server before you download them.
9. Briefly
explain what TCP/IP does.
IP is used to send the packets
across the internet to their final destination, and TCP is used to reassemble
the packets in the correct order.
10. Why
was ICANN established?
To regulate human friendly internet
domain names-those address ending with .com, .org, .net and so on, that
overline IP addresses and identify the website type.
11. What’s
the difference between a dynamic IP address and a static IP address?
Dynamic ip address is an IP address
will change everytime you connect to internet, Static IP address is an IP
address that will remain the same everytime you connect to internet.
12. Explain
what a blog is.
Short for web blog, an internet
journal. Blogs are usually updated daily; they relect the personality and views
of the blogger.
13. State
your answer to a person who ask you the quesion “Who owns the internet?”
Nobody owns internet, we the user
of internet owns it ourself.
14. What
is B2B commerce?
Electronic sale or exchange of goos
and services directly between, cutting out traditional intermediaries.
15. List
and briefly describe three kind of spyware.
o
Adware
Is kind of spyware that
tracks web surfing or online buying so that marketers can send you targeted and
unsolicited pop-up or other ads.
o
Browser hijackers
Change setting in your
browser without your knowledge, often changing your broswer’s home page and replacing
it with another web page.
o
Search hijackers
Intercept your legimate search
requests made to real search engines and return results from phony search
services designed to send you to sites they run.
Comments
Post a Comment