Evaluating Websites
Managing and Securing your Wireless Network
Understanding IP Addresses, Domain Names and protocols
100

How do metasearch engines work?

A) They operate in a Boolean string.

B) They use wild cards, extensively.

C) They suggest alternative search terms.

D) They search other search engines' results.

D) They search other search engines' results.

100

Which of the following is LEAST LIKELY to be an obstacle for a wireless network?

A) Refrigerator

B) Window

C) Wall

D) Floor

B) Window

100

 ________ addressing means that your ISP assigns your computer a temporary IP address from an available pool of IP addresses each time you log on to the Internet.

A) Dynamic

B) Static

C) Automatic

D) Manual

A) Dynamic

200

What is a specialty search engine?

A) Searches only sites deemed appropriate to an interest or industry

B) Fee-based search engines with human assistants

C) A collection of bookmarks on a topic

D) A metasearch engine

A) Searches only sites deemed appropriate to an interest or industry

200

As your wirelessly connected device moves further away from the wireless router, what happens to the signal?

A) It stays the same.

B) It improves.

C) It decreases.

D) It is blocked by your device.

C) It decreases.

200

 How does the computer know the IP addresses of other computers?

A) Your computer uses a "spider" to access a file that contains all users' IP addresses at all times.

B) Your computer consults the IPv6 protocol to determine the IP address of another computer on the Internet.

C) Your computer uses a search engine like Google to access other IP addresses.

D) Your computer consults a database maintained on a domain name server (DNS) to determine other IP addresses.

D) Your computer consults a database maintained on a domain name server (DNS) to determine other IP addresses.

300

Which is NOT an example of a keyword search strategy to get more specific results?

A) Using quotation marks around key words or phrases

B) Using a metasearch engine

C) Using wild cards

D) Searching within a specific website

B) Using a metasearch engine

300

A(n) ________ is a wireless connectivity device that is connected with a wire to the router and extends a Wi-Fi signal in a designated area.

A) NIC

B) modem

C) access point

D) doubler

C) access point

300

________ is the main suite of protocols used on the Internet.

A) MIME

B) TCP/IP

C) DNS

D) POP

B) TCP/IP

400

Which of the following is NOT a good method to evaluate a website as appropriate for research?

A) Using an ecommerce website

B) Using specialized search tools such as Google Scholar

C) Paying attention to the URL to make sure it's from a respected source

D) Looking for clues of bias such as a specific agenda

A) Using an ecommerce website

400

Which device might you use to improve your Wi-Fi signal without using a cable to connect to the router?

A) access point

B) NIC

C) range extender

D) DSL

C) range extender

400

The communications methodology that computers use to transfer data is called ________.

A) static addressing

B) packet transfer protocol

C) packet switching

D) circuit switching

C) packet switching

500

A metasearch engine is different than a regular search engine because it ________.

A) is much faster than a regular search engine

B) searches for several keywords simultaneously

C) searches other search engines instead of individual websites

D) is a service that charges a fee for use, due to its superiority

C) searches other search engines instead of individual websites

500

Connecting to a wireless network without the owner's permission is known as ________.

A) slamming

B) scanning

C) backtracking

D) piggybacking

D) piggybacking

500

At a minimum, all data packets must contain the ________.

A) recipient's address, sender's address, reassembling instructions, and data

B) sender's address, packet size, reassembling instructions, and data

C) sender's address, packet type, packet size, and data

D) recipient's address, reassembling instructions, packet size, and data

A) recipient's address, sender's address, reassembling instructions, and data

M
e
n
u