Хелпикс

Главная

Контакты

Случайная статья





Tests on ICT subject 2 страница



e) (commonlyreferred to simply as a search engine) is a program designed to help peoplelocate information on the Web by formulating simple queries consistingof one or more words called keywords or search terms.

 

109. Web page

a) is the product or output of oneor more Web-based files displayed in a format similar to a page in a book.

b) (commonlyreferred to simply as a search engine) is a program designed to help peoplelocate information on the Web by formulating simple queries consistingof one or more words called keywords or search terms.

c) is an Internet-based computer that accepts requests from browsers.

d) typically contains a collection of related information organized and formatted so it can be accessed using software called a browser.

e) is a markup language very similar to HTML, but it can becustomized with tags that describe the data in databases.

 

110. Web search engine

a) (commonlyreferred to simply as a search engine) is a program designed to help peoplelocate information on the Web by formulating simple queries consistingof one or more words called keywords or search terms.

b) is the product or output of oneor more Web-based files displayed in a format similar to a page in a book.

c) is an Internet-based computer that accepts requests from browsers.

d) typically contains a collection of related information organized and formatted so it can be accessed using software called a browser.

e) is a markup language very similar to HTML, but it can becustomized with tags that describe the data in databases.

 

111. Web server

a) is an Internet-based computer that accepts requests from browsers.

b) is the product or output of oneor more Web-based files displayed in a format similar to a page in a book.

c) (commonlyreferred to simply as a search engine) is a program designed to help peoplelocate information on the Web by formulating simple queries consistingof one or more words called keywords or search terms.

d) typically contains a collection of related information organized and formatted so it can be accessed using software called a browser.

e) is a markup language very similar to HTML, but it can becustomized with tags that describe the data in databases.

 

112. Web site

a) is the product or output of oneor more Web-based files displayed in a format similar to a page in a book.

b) (commonlyreferred to simply as a search engine) is a program designed to help peoplelocate information on the Web by formulating simple queries consistingof one or more words called keywords or search terms.

c) is an Internet-based computer that accepts requests from browsers.

d) typically contains a collection of related information organized and formatted so it can be accessed using software called a browser.

e) is a markup language very similar to HTML, but it can becustomized with tags that describe the data in databases.

 

113. XHTML

a) is a markup language very similar to HTML, but it can becustomized with tags that describe the data in databases.

b) is the product or output of oneor more Web-based files displayed in a format similar to a page in a book.

c) (commonlyreferred to simply as a search engine) is a program designed to help peoplelocate information on the Web by formulating simple queries consistingof one or more words called keywords or search terms.

d) is an Internet-based computer that accepts requests from browsers.

e) typically contains a collection of related information organized and formatted so it can be accessed using software called a browser.  

 

114. Always on connection,

a) is linked to your ISP and is online whenever your computer and modem are on, even if you are not actively accessing the Internet.

b) can be accessed by logging in without a password by using the user ID “anonymous. ” Some anonymous sites request users to enter their e‑ mail addresses as a pass‑ word, but rarely is that piece of information used for verification or tracking.

c) that one person posts a message using the Internet.

d) a file sharing protocol that distrib‑ utes the role of a file server across a collection of dispersed computers

e) is similar to an online diary; it is maintained by a person, a company, or an organization, and contains a series of entries on one or more topics.

 

115. Anonymous FTP

a) can be accessed by logging in without a password by using the user ID “anonymous. ” Some anonymous sites request users to enter their e‑ mail addresses as a pass word, but rarely is that piece of information used for verification or tracking.

b) is linked to your ISP and is online whenever your computer and modem are on, even if you are not actively accessing the Internet.

c) that one person posts a message using the Internet.

d) a file sharing protocol that distrib‑ utes the role of a file server across a collection of dispersed computers

e) is similar to an online diary; it is maintained by a person, a company, or an organization, and contains a series of entries on one or more topics.

 

 

116. Asynchronous communicationsis

a) that one person posts a message using the Internet.

b) is linked to your ISP and is online whenever your computer and modem are on, even if you are not actively accessing the Internet.

c) can be accessed by logging in without a password by using the user ID “anonymous. ” Some anonymous sites request users to enter their e‑ mail addresses as a pass‑ word, but rarely is that piece of information used for verification or tracking.

d) a file sharing protocol that distrib‑ utes the role of a file server across a collection of dispersed computers

e) is similar to an online diary; it is maintained by a person, a company, or an organization, and contains a series of entries on one or more topics.

 

117. BitTorrent

a) is a file sharing protocol that distrib‑ utes the role of a file server across a collection of dispersed computers.

b) is linked to your ISP and is online whenever your computer and modem are on, even if you are not actively accessing the Internet.

c) can be accessed by logging in without a password by using the user ID “anonymous. ” Some anonymous sites request users to enter their e‑ mail addresses as a pass‑ word, but rarely is that piece of information used for verification or tracking.

d) that one person posts a message using the Internet.

e) is similar to an online diary; it is maintained by a person, a company, or an organization, and contains a series of entries on one or more topics.

 

118. Blog

a) is similar to an online diary; it is maintained by a person, a company, or an organization, and contains a series of entries on one or more topics.

b) is linked to your ISP and is online whenever your computer and modem are on, even if you are not actively accessing the Internet.

c) can be accessed by logging in without a password by using the user ID “anonymous. ” Some anonymous sites request users to enter their e‑ mail addresses as a pass‑ word, but rarely is that piece of information used for verification or tracking.

d) that one person posts a message using the Internet.

e) is a file sharing protocol that distrib‑ utes the role of a file server across a collection of dispersed computers

 

119. Cable Internet service

a) is a means of distributing always‑ on broadband Internet access over the same infrastructure that offers cable television service.

b) which converts your computer’s signal into one that can travel over the CATV network.

c) the doorway that allows a computer to exchange data with other devices

d) a fixed Internet connection that uses a voiceband modem and telephone lines to transport data between your computer and your ISP.

e) has been used by governments to keeps citizens away from Web sites that supply politically or culturally inflammatory information.

 

120. Cable modem

a) which converts your computer’s signal into one that can travel over the CATV network.

b) is a means of distributing always‑ on broadband Internet access over the same infrastructure that offers cable television service

c) the doorway that allows a computer to exchange data with other devices

d) a fixed Internet connection that uses a voiceband modem and telephone lines to transport data between your computer and your ISP.

e) has been used by governments to keeps citizens away from Web sites that supply politically or culturally inflammatory information.

 

121. Communications portis

a) the doorway that allows a computer to exchange data with other devices.

b) is a means of distributing always‑ on broadband Internet access over the same infrastructure that offers cable television service.

c) which converts your computer’s signal into one that can travel over the CATV network.

d) a fixed Internet connection that uses a voiceband modem and telephone lines to transport data between your computer and your ISP.

e) has been used by governments to keeps citizens away from Web sites that supply politically or culturally inflammatory information.

 

122. Dial up connection

a) is a fixed Internet connection that uses a voiceband modem and telephone lines to transport data between your computer and your ISP.

b) is a means of distributing always‑ on broadband Internet access over the same infrastructure that offers cable television service.

c) which converts your computer’s signal into one that can travel over the CATV network.

d) the doorway that allows a computer to exchange data with other devices

e) has been used by governments to keeps citizens away from Web sites that supply politically or culturally inflammatory information.

 

123. DNS cache poisoning

a) has been used by governments to keeps citizens away from Web sites that supply politically or culturally inflammatory information

b) is a means of distributing always‑ on broadband Internet access over the same infrastructure that offers cable television service.

c) which converts your computer’s signal into one that can travel over the CATV network.

d) the doorway that allows a computer to exchange data with other devices

e) a fixed Internet connection that uses a voiceband modem and telephone lines to transport data between your computer and your ISP.

124. DOCSIS

a) (Data Over Cable Service Interface Specification) is a data transport technology that includes security filters.

b) is a key component of Web page addresses and e‑ mail addresses

c) computer that hosts this database is referred to

d) Every domain name corresponds to a unique IP address that has been entered into a huge database

e) s the rate of data downloaded to your computer. Many ISPs limit these speeds to make sure everyone gets an equal share of the bandwidth.

 

125. Domain name

a) is a key component of Web page addresses and e mail addresses

b) (Data Over Cable Service Interface Specification) is a data transport technology that includes security filters.

c) computer that hosts this database is referred to

d) Every domain name corresponds to a unique IP address that has been entered into a huge database

e) s the rate of data downloaded to your computer. Many ISPs limit these speeds to make sure everyone gets an equal share of the bandwidth.

 

126. Domain Name System

a) Every domain name corresponds to a unique IP address that has been entered into a huge database

b) (Data Over Cable Service Interface Specification) is a data transport technology that includes security filters.

c) is a key component of Web page addresses and e‑ mail addresses

d) computer that hosts this database is referred to

e) s the rate of data downloaded to your computer. Many ISPs limit these speeds to make sure everyone gets an equal share of the bandwidth.

 

 

127. DSL

a) (digital subscriber line) is a high speed, digital, always on, Internet access technology that runs over standard phone lines. It is one of the fastest Internet connections that’s affordable to individual consumers.

b) prevents voiceband signals from interfering with DSL signals.

c) is a device that connects a computer to a telephone line and converts computer data signals into signals compatible with DSL.

d) is software or hardware designed to filter out suspicious packets attempting to enter or leave a computer

e) links your computer to an ISP from a stationary point, such as a wall socket or roof‑ mounted antenna.

 

 

128. Firewall

a) is software or hardware designed to filter out suspicious packets attempting to enter or leave a computer.

b) (digital subscriber line) is a high speed, digital, always on, Internet access technology that runs over standard phone lines. It is one of the fastest Internet connections that’s affordable to individual consumers.

c) prevents voiceband signals from interfering with DSL signals.

d) is a device that connects a computer to a telephone line and converts computer data signals into signals compatible with DSL.

e) links your computer to an ISP from a stationary point, such as a wall socket or roof‑ mounted antenna.

 

 

 

129. FTP

a) (File Transfer Protocol) provides a way to transfer files from one computer to another over any TCP/IP network, such as a LAN or the Internet.

b) (also called wireless broadband service) is designed to offer Internet access to homes and businesses by broadcasting data signals over areas large enough to cover most cities and outlying areas.

c) such as WS_FTP, CuteFTP, or open‑ source FileZilla, offers an easy‑ to‑ use interface for accessing FTP servers.

d) resides on a computer contain‑ ing files that remote users might want to access.

e) is a network of computers harnessed together to perform processing tasks. Grid computing systems can be public or private.

 

130. Grid computing system

a) is a network of computers harnessed together to perform processing tasks

b) (also called wireless broadband service) is designed to offer Internet access to homes and businesses by broadcasting data signals over areas large enough to cover most cities and outlying areas.

c) (File Transfer Protocol) provides a way to transfer files from one computer to another over any TCP/IP network, such as a LAN or the Internet

d) such as WS_FTP, CuteFTP, or open‑ source FileZilla, offers an easy‑ to‑ use interface for accessing FTP servers.

e) resides on a computer contain‑ ing files that remote users might want to access.

 

131. ICANN

a) (Internet Corporation for Assigned Names and Numbers) is recognized by the United States and other governments as the global organization that coordinates technical management of the Internet’s Domain Name System.

b) One one messaging is referred to as instant messaging(IM) and group communications are referred to as chat.

c) is a network of high‑ capacity routers and fiber‑ optic communications links that provides the main routes for data traffic across the Internet.

d) is a Web‑ based online discussion site where participants post comments to discussion threads.

e) (ISP) is a company that offers Internet access to individuals, businesses, and smaller ISPs. Figure 6‑ 2 shows a simplified conceptual diagram of the Internet backbone and its components.

 

132. Instant messaging

a) One one messaging is referred to as instant messaging(IM) and group communications are referred to as chat.

b) (Internet Corporation for Assigned Names and Numbers) is recognized by the United States and other governments as the global organization that coordinates technical management of the Internet’s Domain Name System.

c) is a network of high‑ capacity routers and fiber‑ optic communications links that provides the main routes for data traffic across the Internet.

d) is a Web‑ based online discussion site where participants post comments to discussion threads.

e) (ISP) is a company that offers Internet access to individuals, businesses, and smaller ISPs. Figure 6‑ 2 shows a simplified conceptual diagram of the Internet backbone and its components.

 

133. Internet backbone

a) is a network of high capacity routers and fiberoptic communications links that provides the main routes for data traffic across the Internet.

b) (Internet Corporation for Assigned Names and Numbers) is recognized by the United States and other governments as the global organization that coordinates technical management of the Internet’s Domain Name System.

c) One one messaging is referred to as instant messaging(IM) and group communications are referred to as chat.

d) is a Web‑ based online discussion site where participants post comments to discussion threads.

e) (ISP) is a company that offers Internet access to individuals, businesses, and smaller ISPs. Figure 6‑ 2 shows a simplified conceptual diagram of the Internet backbone and its components.

 

134. Internet forum

a) is a Web based online discussion site where participants post comments to discussion threads.

b) (Internet Corporation for Assigned Names and Numbers) is recognized by the United States and other governments as the global organization that coordinates technical management of the Internet’s Domain Name System.

c) One one messaging is referred to as instant messaging(IM) and group communications are referred to as chat.

d) is a network of high‑ capacity routers and fiber‑ optic communications links that provides the main routes for data traffic across the Internet.

e) (ISP) is a company that offers Internet access to individuals, businesses, and smaller ISPs. Figure 6‑ 2 shows a simplified conceptual diagram of the Internet backbone and its components.

 

135. Internet service provider

a) (ISP) is a company that offers Internet access to individuals, businesses, and smaller ISPs. Figure 62 shows a simplified conceptual diagram of the Internet backbone and its components.

b) (Internet Corporation for Assigned Names and Numbers) is recognized by the United States and other governments as the global organization that coordinates technical management of the Internet’s Domain Name System.

c) One one messaging is referred to as instant messaging(IM) and group communications are referred to as chat.

d) is a network of high‑ capacity routers and fiber‑ optic communications links that provides the main routes for data traffic across the Internet.

e) is a Web based online discussion site where participants post comments to discussion threads.

 

 

136. Intrusion

a) is any access to data or programs by hackers, criminals, or other unauthorized persons.

b) Internet Protocol) is responsible for addressing packets so that they can be routed to their des‑ tination.

c) measures the variability of packet latency.

d) is a brand name for a compact, mobile, wireless router offered by Novatel Wireless.

e) For the real Internet, cellular service providers offer data services, sometimes referred to as mobile broadband.

137. Jitter

a) measures the variability of packet latency.

b) is any access to data or programs by hackers, criminals, or other unauthorized persons.

c) Internet Protocol) is responsible for addressing packets so that they can be routed to their des‑ tination.

d) is a brand name for a compact, mobile, wireless router offered by Novatel Wireless.

e) For the real Internet, cellular service providers offer data services, sometimes referred to as mobile broadband.

138. MiFi

a) is a brand name for a compact, mobile, wireless router offered by Novatel Wireless.

b) is any access to data or programs by hackers, criminals, or other unauthorized persons.

c) Internet Protocol) is responsible for addressing packets so that they can be routed to their des‑ tination.

d) measures the variability of packet latency.

e) For the real Internet, cellular service providers offer data services, sometimes referred to as mobile broadband.

139. Mobile broadband

a) For the real Internet, cellular service providers offer data services, sometimes referred to as mobile broadband.

b) is any access to data or programs by hackers, criminals, or other unauthorized persons.

c) Internet Protocol) is responsible for addressing packets so that they can be routed to their des‑ tination.

d) measures the variability of packet latency.

e) is a brand name for a compact, mobile, wireless router offered by Novatel Wireless.

 

140. Mobile Internet access

a) allows you to use the Internet as you are on the go, such as using a cell phone to collect your email while you are traveling by train.

b) contains circuitry that converts the data‑ carrying signals from your computer to signals that can travel over various communications channels.

c) equipment and links are tied together by network access points(NAPs), so that, for example, data can begin its journey on a Verizon link and then cross over to a Sprint link, if necessary, to reach its destination.

d) (NAT) is the process your router usesto keep track of packets and their corresponding private or public IP addresses.

e) Backbone links and routers are maintained by network service providers(NSPs), such as AT& T, Cogent Communications, Hurricane Electric, Sprint, and Verizon

 

141. Modem

a) contains circuitry that converts the data carrying signals from your computer to signals that can travel over various communications channels.

b) allows you to use the Internet as you are on the go, such as using a cell phone to collect your email while you are traveling by train..

c) equipment and links are tied together by network access points(NAPs), so that, for example, data can begin its journey on a Verizon link and then cross over to a Sprint link, if necessary, to reach its destination.

d) (NAT) is the process your router usesto keep track of packets and their corresponding private or public IP addresses.

e) Backbone links and routers are maintained by network service providers(NSPs), such as AT& T, Cogent Communications, Hurricane Electric, Sprint, and Verizon

 

142. Network access points NSP

a) equipment and links are tied together by network access points(NAPs), so that, for example, data can begin its journey on a Verizon link and then cross over to a Sprint link, if necessary, to reach its destination.

b) allows you to use the Internet as you are on the go, such as using a cell phone to collect your email while you are traveling by train.

c) contains circuitry that converts the data‑ carrying signals from your computer to signals that can travel over various communications channels.

d) (NAT) is the process your router usesto keep track of packets and their corresponding private or public IP addresses.

e) Backbone links and routers are maintained by network service providers(NSPs), such as AT& T, Cogent Communications, Hurricane Electric, Sprint, and Verizon

 

143. Network address translation

a) (NAT) is the process your router usesto keep track of packets and their corresponding private or public IP addresses.

b) allows you to use the Internet as you are on the go, such as using a cell phone to collect your email while you are traveling by train.

c) contains circuitry that converts the data‑ carrying signals from your computer to signals that can travel over various communications channels.

d) equipment and links are tied together by network access points(NAPs), so that, for example, data can begin its journey on a Verizon link and then cross over to a Sprint link, if necessary, to reach its destination.

e) Backbone links and routers are maintained by network service providers(NSPs), such as AT& T, Cogent Communications, Hurricane Electric, Sprint, and Verizon

 

144. Network service providers

a) Backbone links and routers are maintained by network service providers(NSPs), such as AT& T, Cogent Communications, Hurricane Electric, Sprint, and Verizon.

b) allows you to use the Internet as you are on the go, such as using a cell phone to collect your email while you are traveling by train.

c) contains circuitry that converts the data‑ carrying signals from your computer to signals that can travel over various communications channels.

d) equipment and links are tied together by network access points(NAPs), so that, for example, data can begin its journey on a Verizon link and then cross over to a Sprint link, if necessary, to reach its destination.

e) (NAT) is the process your router usesto keep track of packets and their corresponding private or public IP addresses.

 

145. Port probe

a) (or port scan) is the use of automated software to locate com‑ puters that have open ports and are vulnerable to unauthorized access.

b) refers to data that never reaches its destination or gets discarded because it arrives too late to be of any use. Packet loss of less than 2% is required for acceptable VoIP

c) (Packet Internet Groper), which sends a signal to a specific Internet address and waits for a reply.

d) allows you to easily move your access device, as in the case of vehicle‑ mounted satellite dishes that can be deployed when the vehicle is parked.

e) is a non‑ routable IP address that can be used within a LAN, but not for internet data transport.

 

146. Portable Internet access

a) allows you to easily move your access device, as in the case of vehicle‑ mounted satellite dishes that can be deployed when the vehicle is parked.

b) refers to data that never reaches its destination or gets discarded because it arrives too late to be of any use. Packet loss of less than 2% is required for acceptable VoIP

c) (Packet Internet Groper), which sends a signal to a specific Internet address and waits for a reply.

d) (or port scan) is the use of automated software to locate com‑ puters that have open ports and are vulnerable to unauthorized access.

e) is a non‑ routable IP address that can be used within a LAN, but not for internet data transport.

 

 

147. Private IP address

a) is a non routable IP address that can be used within a LAN, but not for internet data transport.

b) refers to data that never reaches its destination or gets discarded because it arrives too late to be of any use. Packet loss of less than 2% is required for acceptable VoIP

c) (Packet Internet Groper), which sends a signal to a specific Internet address and waits for a reply.

d) (or port scan) is the use of automated software to locate com‑ puters that have open ports and are vulnerable to unauthorized access.

e) allows you to easily move your access device, as in the case of vehicle‑ mounted satellite dishes that can be deployed when the vehicle is parked.

 

148. Protocol suite

a) is a combination of protocols that work together. TCP(Transmission Control Protocol) breaks a message or file into packets

b) allows people to exchange short messages while they are online.

c) is one that can be accessed by packets on the Internet

d) device that modulates the data signals from a computer into a frequency band that can be carried to the satellite dish, where it is converted to another frequency,

e) is a means of distributing always on, high speed asymmetric Internet access by broadcasting signals to and from a personal satellite dish.

 

149. Routable IP address

a) is one that can be accessed by packets on the Internet

b) is a combination of protocols that work together. TCP(Transmission Control Protocol) breaks a message or file into packets

c) allows people to exchange short messages while they are online.

d) device that modulates the data signals from a computer into a frequency band that can be carried to the satellite dish, where it is converted to another frequency,



  

© helpiks.su При использовании или копировании материалов прямая ссылка на сайт обязательна.