Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser?
Intranet
Internet
World Wide Web
Wide Area Network
Clickable text or images that take you to different sites on the World Wide Web are called __________.
Attachments
Navigation buttons
Shortcuts
Hyperlinks
Web services that help people meet, interact, and share content with other people online are called ____________.
Social Media
Internetworks
Web Servers
Facebooks
Which digital communication medium consists of top-level posts with threads of response posts?
Discussion board
Email client
Chat room
Social network
Which digital assistant was named after an artificial intelligence in an Xbox video game?
Siri
Google Assistant
Cortana
Alexa
Which of the following terms describes an organization that connects users to the Internet?
Data Center
Network Server
Internet Service Provider
Web Server
A pop-up blocker is a web browser feature that _________________.
prevents color images from being displayed
keeps the window in a minimized state
censors Internet searches
prevents unwanted advertisements
Which of the following are common risks of using social media? (Select two.)
Online information that you post is difficult to remove.Personal information can be used without your permissionAnonymity can lead some people to post harmful comments.
Privacy settings are virtually non-existent.
You can be added to a group without your permission.
Which of the following are advantages of cloud computing? (Select two.)
Easier collaboration
Lower speeds
Greater costs
Local software
Data security
What is one of the things that has set Siri apart from other digital assistants?
Easter eggs
Voice command
Playing music
Reminders
Which of the following technologies can be used to make a phone call over an Internet connection?
VoIP
TCP
IoT
UDP
Small files that a website saves on your computer to remember your preferences are called ______________.
Reminders
Fingerprints
Cookies
Malware
Which of the following should be done to protect your identity when creating a social media profile?
Use the default privacy settings for the account.
Always review and set privacy settings.
Always include your physical address and set privacy to Friends of Friends.
Always use a fake name and fake personal information.
Which of the following is a category of SaaS applications?
Office tools
Virtual machines
Disaster recovery
Web hosting
Owners of internet-enabled cars can use their phones to do which of the following?
Adjust tire pressure
Monitor fuel usage
Change traffic lights
Control their speed
Which medium does Wi-Fi use to send data between networks and devices?
Bluetooth
Ultraviolet light
Cellular signals
Radio waves
Frank, a technician, has finished installing a wireless router. Jessica is connected to the WiFi. However, she can only see the company intranet pages. What should Frank do to troubleshoot the problem?
Disable the pop-up blocker.
Apply a firmware update.
Clear the browser cache.
Configure the browser proxy settings.
When protecting your online identity, which of the following is an internet security threat you need to be aware of?
USB keyloggers
Phishing attempts
Using a different password for each social media platform
Using personal information
Which of the following charges resources used, such as bandwidth and processing power, by the second?
Microsoft Azure
Amazon Web Services (AWS)
Google Cloud
OneDrive
Which of the following is used to change traffic lights for emergency vehicles?
IoT sensor
Smart car
ITCS
IoT car
Which of the following is used to identify specific hypertext resources on the World Wide Web?
Uniform Resource Locator
Internet Protocol
Transmission Control Protocol
Hyperlink
You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research.
Which of the following is the MOST likely cause of this problem?
A firewall is blocking ports 80 and 443.
The router has not been configured to perform port forwarding.
Port triggering is redirecting traffic to the wrong IP address.
A proxy server is filtering access to websites.
Which of the following describes the strategy that defines a businesses social media goals and objectives?
Social media marketing
Social Media Optimization (SMO)
Social channels
Search Engine Optimization (SEO)
Microsoft OneDrive is a cloud solution that is designed to provide which of the following?
Cloud computing
Cloud hosting
Resource pooling
Cloud storage
A major capability of Alexa is its ability to do what?
Speak a variety of languages
Set alarms
Control smart devices
Play audio books