Appendix A
Answers to Review Questions

Chapter 1: Using the Internet

  1. B, D. The Internet is the global network of interconnected networks that use standardized communication protocols to exchange data and information between them. In a simpler manner, it is also considered the physical network of computers and devices (smartphones, tablets, and so on) all over the world.
  2. C. WWW stands for World Wide Web.
  3. A, D. The World Wide Web is a system of websites connected by links. It is a part of the Internet but not the entire Internet.
  4. A, B. URL stands for Uniform Resource Locator, and it is the address of a website or a web page on the WWW.
  5. B, D. A web browser is an application that displays a web page on a computer or mobile device. The first web browser was called WorldWideWeb, to suggest that it is software that is used to navigate websites and web pages that are found on the World Wide Web.
  6. C. A hyperlink is a reference to data that can be accessed by clicking it.
  7. A, B. Posting your pictures on Facebook or a video on YouTube are the only examples listed here of performing an upload of data.
  8. D. The homepage is the web page that is loaded each time you open a web browser.
  9. B. The browsing history is a complete log of the websites and web pages that you have visited in a web browser.
  10. C. A plug-in or an add-on is a software component that adds a specific feature to a web browser and enables it to do more.

Chapter 2: Understanding Networking and Its Most Important Concepts

  1. C. In a Windows network environment, the ipconfig command with the /all switch is used to view all IP configuration information of a system.
  2. D. A VPN uses tunneling protocols to create a secure point-to-point connection over a public network such as the Internet.
  3. D. Each protocol within the protocol suite is associated with a specific port. If that port is blocked, then the associated service will be unavailable. The HTTP service uses port 80, and if this port is blocked on a firewall, HTTP and web services will not be available.
  4. B. A DHCP server is used to automatically assign TCP/IP information to a client system. This includes the IP address, the subnet mask, and the default gateway.
  5. A. DNS is responsible for translating hostnames to IP addresses. Pinging the hostname returns the IP address associated with Sybex.com.
  6. D. Securely setting up a wireless router or access point involves configuring the security protocols used. WEP was the original wireless security protocol but proved ineffective as tools were created that could easily get around WEP security. WPA followed WEP and increased security using TKIP. Today, WPA2 is commonly used for security, and it increases the security over WPA.
  7. A, D. The IEEE specifies the 802.11 wireless standards. Under this designation there are a number of specifications that you may see on an AP, including 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac.
  8. A, C. LANs are the computer network from the floor of an office building and the computer network in your house.
  9. C. Windows offers several troubleshooting wizards for solving network and Internet-related problems. The one that helps you solve Internet connection problems is named Internet Connections.
  10. A, C, D. Broadband is a form of high-speed Internet access, with maximum speeds that go beyond the 128 Kbps provided by dial-up connections. Broadband is largely an always-on Internet service that allows for bandwidth-intensive applications.

Chapter 3: Communicating Online with Others

  1. B, C, D. Email is a method of exchanging digital messages with others. In order to use email you must have a registered username and password, and you need to provide the email address of the people whom you want to communicate with through this medium.
  2. C, D. C and D are strong passwords because they contain at least eight characters and mix letters with numbers and special characters.
  3. A, C. BCC means blind carbon copy. This field is available for hidden notification, and recipients listed in the BCC field receive a copy of the message but are not shown on any other recipient’s copy, including other BCC recipients.
  4. B, D. To and Subject are fields that you have to fill in yourself. Date and From are automatically populated by the email client or the email service that you are using.
  5. B. When using Reply All, you reply to all the people who were included in the email distribution list, in the To and CC fields, including the sender of the message that you received. This option is useful when you need to reply to a conversation and include a whole group of people in that conversation.
  6. B, D. When using Forward, a copy of the initial email message is created automatically with the same subject as the one used by the sender but prefixed by the term FW:. Also, the body of the email includes the original message that was received from the sender as well as any other messages that were sent earlier in the same conversation.
  7. A, B, D. In order for the reply to be effective, you should specify when you will be out of office, when you will be able to reply, how people can contact you in case of emergencies, and, if applicable, who your stand-in is for the period when you are away and how the recipient can contact them.
  8. A, B. SMS means Short Message Service, and one message can include up to 160 characters.
  9. B, D. Facebook Messenger and Skype are examples of very popular chat clients.
  10. A, B, D. Social media tools can take many forms, including blogs, social networks like Facebook, or Internet forums. OneDrive is a cloud storage solution provided by Microsoft.

Chapter 4: Being a Responsible Digital Citizen

  1. B. Using all capital letters is interpreted by readers as excitement or yelling, depending on the context, so it is best to avoid such stylistic decisions in professional communications.
  2. A, B. Spamming is the act of sending unsolicited messages to others, especially advertising and self-promotion. It applies to all kinds of media, including email and SMS.
  3. A. Professional audiences expect courtesy and cultural sensitivity, and this is achieved through the tone the writer sets by the words they choose.
  4. C. Emoticons help to share the emotion that accompanies a statement.
  5. C. Emoticons help readers process the emotion that goes along with the sentence but are typically used in only personal communications, such as texting, social media postings, and email. Professional communications achieve tone through accurate and emotionally appropriate diction.
  6. B, D. Censorship can take the form of blocked access, filtering of certain types of sites, and filtering with a firewall against any site that uses certain key words. Parental controls are solutions that censor access to content based on rules set by the parents.
  7. A, C. DRM technologies can be used to control many things, including the copying of a work or its altering.
  8. B. Intellectual property refers to knowledge and creative ideas or expressions that have commercial value and are protected either by copyright, patent, trademark, industrial design rights, or trade secret laws.
  9. A, D. Creative Commons is used when the creator wants to give people the right to share, use, and build upon their work. Creative Commons provides the creator flexibility and protects the people who use or redistribute the work from concerns of copyright infringement as long as they abide by the conditions that are specified in the license by which the creator distributes the work.
  10. A. Piracy is also known as copyright infringement, and it is a criminal offense in most countries.

Chapter 5: Maintaining Your Health and Safety While Using Computers

  1. A, B, D. When online, you should not use the same password on all your email accounts, share your home address publicly on the Internet, or reply to people you don’t know, who promise you incredible deals.
  2. A, D. When making purchases online, you should avoid websites that do not use HTTPS, which encrypts the data that is sent between you and the website where you make the purchase. Also, you should not share your credit card details with others online.
  3. B, C. You can protect your data by encrypting it with solutions like BitLocker, which makes it hard for others to access it and use it, and by setting up your own backup system with tools like Backup and Restore.
  4. C, D. When you delete a file using this method, the file remains on your computer, and it continues to take up disk space. Its reference is moved to the Recycle Bin, where it can be recovered later on and you can resume using it.
  5. B, C. Recycle Bin is a folder where the references to your deleted files and folders are kept. You can use the Recycle Bin to view a list of your deleted items and recover any of them.
  6. C. You delete a file without moving it to the Recycle Bin by selecting it and then pressing Shift+Delete on your keyboard.
  7. B, C. You completely wipe a file so that it is no longer recoverable by deleting it with Shift+Delete and rewriting the space it took on the disk several times with data from other files. Also, you can use specialized applications like CCleaner or File Shredder, which help you remove a file forever.
  8. B, C, D. An ergonomic chair should have many characteristics, including but not limited to a comfortable cushion, lumbar support, adjustable height, and adjustable back rest height.
  9. A, C, D. The best practices for positioning the computer monitor on a desk are the following: position it at eye level unless it measures 20 inches or more, in which case you should position the top of it 3 inches above eye level. Also, you should place it on the desk at least 20 inches from your eyes.
  10. D. The rule says that for every 20 minutes you spend staring at the computer, you should spend 20 seconds looking at objects 20 feet away—or at least far enough away that your eyes aren’t working to focus.

Chapter 6: Searching the World Wide Web

  1. A. A search engine is a software system that is designed to search for information on the Web.
  2. B, C, D. Google, Bing, and Yahoo! are search engines. Facebook is a social network.
  3. A, C, D. For each search result, a search engine like Google and Bing will display the title, the URL of the page, and a small description.
  4. A, D. $ can be used to find prices, and “ ” (quotes) are used to put a word or phrase in quotes. The results of using quotes will include only pages with the same words in the same order as what’s inside the quotes.
  5. C. The asterisk acts as a placeholder for any unknown or wildcard terms.
  6. D. Search operators are words that can be added to searches to help narrow down your results.
  7. B. The search operator site: gets results from certain sites or domains.
  8. A, C. The banner ad or web banner is an advertisement that is embedded into a web page. Web banners are used to attract traffic to the website of the advertiser.
  9. B, C, D. An Internet forum or message board is a discussion site where people can hold conversations in the form of posted messages. These messages are automatically stored and displayed by the site in a conversation-like format. Within a forum’s topic, each new discussion started is called a thread and can be replied to by any number of people.
  10. A, D. A knowledge base is a way of storing complex data about a computer system or product in a structured format that’s easily accessible to a computer user.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.15.222.195