ITGS Test: Chapter 9 Of Computer Confluence

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Hitechhall
H
Hitechhall
Community Contributor
Quizzes Created: 1 | Total Attempts: 184
Questions: 21 | Attempts: 184

SettingsSettingsSettings
ITGS Test: Chapter 9 Of Computer Confluence - Quiz

This is a test of mastery over the content in chapter 9 of Computer Confluence.


Questions and Answers
  • 1. 

    What are the separate, definable parts that are sent when a message is sent through the Internet?

    • A.

      Parcels

    • B.

      Plug-ins

    • C.

      Switches

    • D.

      Packets

    Correct Answer
    D. Packets
    Explanation
    When a message is sent through the Internet, it is divided into separate, definable parts called packets. These packets contain the data of the message along with the necessary information for routing and reassembling at the destination. Each packet is sent individually and can take different paths to reach its destination. This division into packets allows for efficient and reliable transmission of data over the network.

    Rate this question:

  • 2. 

    Which of the following is NOT a top-level domain?

    • A.

      .com

    • B.

      .us

    • C.

      .name

    • D.

      .comp

    Correct Answer
    D. .comp
    Explanation
    The given answer ".comp" is not a valid top-level domain. Top-level domains are the last part of a domain name, such as .com, .org, or .net. These domains are used to categorize websites based on their purpose or geographical location. While .com, .us, and .name are all valid top-level domains, .comp does not exist as a recognized domain extension.

    Rate this question:

  • 3. 

    What is the web address http://www.pod.edu/admissions/standards/entry.html also called?

    • A.

      Protocol

    • B.

      URL

    • C.

      Domain

    • D.

      Path

    Correct Answer
    B. URL
    Explanation
    The web address http://www.pod.edu/admissions/standards/entry.html is also called a URL (Uniform Resource Locator). A URL is a specific web address that is used to locate and access resources on the internet. It consists of different components such as the protocol (in this case, "http"), the domain name ("www.pod.edu"), and the path ("/admissions/standards/entry.html").

    Rate this question:

  • 4. 

    Which of the following is a narrowband connection?

    • A.

      Cable modems

    • B.

      Modem

    • C.

      DSL

    • D.

      T1

    Correct Answer
    B. Modem
    Explanation
    A modem is a narrowband connection because it is designed to transmit data over a limited frequency range, typically using a telephone line. Unlike broadband connections such as cable modems, DSL, and T1 lines, which can transmit data at high speeds over a wide frequency range, a modem has a lower data transmission rate and is limited to a narrowbandwidth.

    Rate this question:

  • 5. 

    Which type of software prevents unauthorized access to certain Web sites?

    • A.

      Scanning

    • B.

      Portal

    • C.

      Filtering

    • D.

      Antivirus

    Correct Answer
    C. Filtering
    Explanation
    Filtering software is designed to prevent unauthorized access to certain websites. It works by blocking or restricting access to specific websites or categories of websites based on predetermined criteria. This helps to ensure that users are only able to access approved websites and prevents them from accessing potentially harmful or inappropriate content. Filtering software is commonly used in schools, workplaces, and homes to enforce internet usage policies and protect users from malicious or inappropriate online content.

    Rate this question:

  • 6. 

    What is term used to describe the disparity between people that have computers and those that do not?

    • A.

      Ergonomics

    • B.

      Digital Divide

    • C.

      Censorship

    • D.

      Access control

    Correct Answer
    B. Digital Divide
    Explanation
    The term "Digital Divide" is used to describe the disparity between people who have access to computers and technology and those who do not. It refers to the gap in digital literacy, internet access, and technological resources between different socioeconomic groups or regions. This divide can have significant implications for education, employment opportunities, and overall access to information and communication in the modern digital age.

    Rate this question:

  • 7. 

    Which of the following is not an Internet language?

    • A.

      FTP

    • B.

      ActiveX

    • C.

      XML

    • D.

      Java

    Correct Answer
    A. FTP
    Explanation
    FTP stands for File Transfer Protocol, which is a standard network protocol used for transferring files between a client and a server on a computer network. It is not considered an Internet language because it is primarily used for file transfer rather than for programming or scripting purposes. On the other hand, ActiveX, XML, and Java are all programming languages or technologies commonly used in Internet development and communication.

    Rate this question:

  • 8. 

    Which TWO of the following are NOT examples of a portal?

    • A.

      MSN

    • B.

      HiTechHall

    • C.

      Google

    • D.

      Yahoo!

    Correct Answer(s)
    B. HiTechHall
    C. Google
    Explanation
    HiTechHall and Google are not examples of a portal because they are not websites that serve as a gateway or entry point to a variety of resources, services, and information. MSN and Yahoo! are examples of portals as they provide a range of services such as email, news, weather, and search engines.

    Rate this question:

  • 9. 

    Which protocol is used to upload and download files from web servers?

    • A.

      Telnet

    • B.

      HTTP

    • C.

      FTP

    • D.

      HTTPS

    Correct Answer
    C. FTP
    Explanation
    FTP (File Transfer Protocol) is the correct answer because it is specifically designed for uploading and downloading files from web servers. Telnet is a protocol used for remote login and control of devices, not for file transfer. HTTP (Hypertext Transfer Protocol) is used for transferring web pages and data, but not specifically for file transfer. HTTPS (HTTP Secure) is a secure version of HTTP, but it does not focus on file transfer. Therefore, FTP is the most appropriate protocol for uploading and downloading files from web servers.

    Rate this question:

  • 10. 

    What are the components of an email address?

    • A.

      Protocol, domain, and path

    • B.

      Username and host

    • C.

      Username, protocol, and host

    • D.

      Protocol and host

    Correct Answer
    B. Username and host
    Explanation
    An email address consists of a username and a host. The username is the unique identifier for the individual or organization, while the host refers to the server that handles the email communication. The username is typically followed by the "@" symbol, which separates it from the host. The host can be a domain name or an IP address. Together, the username and host form a complete email address, allowing messages to be sent and received.

    Rate this question:

  • 11. 

    What kind of server converts IP addresses to domain names?

    • A.

      P2P

    • B.

      File

    • C.

      DNS

    • D.

      Email

    Correct Answer
    C. DNS
    Explanation
    DNS (Domain Name System) servers are responsible for converting IP addresses to domain names. When a user enters a domain name in their web browser, the DNS server translates that domain name into the corresponding IP address, allowing the user to access the desired website. DNS servers play a crucial role in internet communication by providing a way to easily identify and access websites using domain names instead of complex IP addresses.

    Rate this question:

  • 12. 

    What type of portals serve employees within a corporation?

    • A.

      Consumer

    • B.

      Intranets

    • C.

      Extranets

    • D.

      Vortals

    Correct Answer
    B. Intranets
    Explanation
    Intranets serve employees within a corporation by providing them with a private network that allows them to access information, resources, and communication tools specific to their organization. It is a secure platform that enables employees to collaborate, share documents, access company policies, and stay updated on company news and announcements. Intranets are designed to enhance internal communication, streamline workflows, and improve productivity within the organization.

    Rate this question:

  • 13. 

    An IP address is the same as a URL.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    An IP address and a URL are not the same. An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It is used to identify and locate devices on a network. On the other hand, a URL (Uniform Resource Locator) is a specific web address that is used to locate and access a particular webpage or resource on the internet. While both are used in network communication, they serve different purposes and have different formats. Therefore, the statement that an IP address is the same as a URL is false.

    Rate this question:

  • 14. 

    Internet2 will replace the Internet.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement "Internet2 will replace the Internet" is false. Internet2 is a separate network that was developed to provide high-speed connectivity and advanced services for research and education institutions. It was not designed to replace the existing Internet infrastructure that is used by the general public. The Internet and Internet2 are two distinct networks that serve different purposes. Therefore, the correct answer is false.

    Rate this question:

  • 15. 

    Shockwave, RealOne, and Winamp are examples of plug-ins.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Shockwave, RealOne, and Winamp are all examples of plug-ins. A plug-in is a software component that adds specific features or functionality to a larger software application. In this case, Shockwave, RealOne, and Winamp are all plug-ins that can be added to web browsers or media players to enhance their capabilities. Therefore, the statement is true.

    Rate this question:

  • 16. 

    With push technology, the user must request the data.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Push technology is a method where data is delivered to the user without the user explicitly requesting it. In this case, the statement says that with push technology, the user must request the data, which is incorrect. Therefore, the correct answer is False.

    Rate this question:

  • 17. 

    Match this computer term with the correct definition: http://

    • A.

      Top level domain

    • B.

      Protocol

    • C.

      Document extension

    • D.

      Domain

    • E.

      URL

    Correct Answer
    B. Protocol
    Explanation
    A protocol is a set of rules that governs the communication between devices or systems. In the context of computer terms, a protocol refers to the specific set of rules and standards that determine how data is transmitted over a network. It defines the format, timing, sequencing, and error checking of data packets.

    Rate this question:

  • 18. 

    Match this computer term with the correct definition: .html

    • A.

      Top level domain

    • B.

      Protocol

    • C.

      Document extension

    • D.

      Domain

    • E.

      URL

    Correct Answer
    C. Document extension
    Explanation
    The term ".html" refers to a document extension. In computer terminology, a document extension is a suffix added to the end of a file name to indicate the type of file it is. In this case, ".html" is commonly used to denote a Hypertext Markup Language file, which is used to create web pages. Therefore, ".html" is the correct match for the given definition.

    Rate this question:

  • 19. 

    Match this computer term with the correct definition: .gov

    • A.

      Top level domain

    • B.

      Protocol

    • C.

      Document extension

    • D.

      Domain

    • E.

      URL

    Correct Answer
    A. Top level domain
    Explanation
    A top-level domain refers to the highest level in the hierarchical domain name system of the internet. It is the last part of a domain name, typically indicating the type of organization or the country associated with the website. ".gov" is a specific top-level domain used exclusively for government entities.

    Rate this question:

  • 20. 

    What country attempts to limit its resident's access to controversial Web content by routing all incoming Internet traffic through a single control center?

    • A.

      Germany

    • B.

      North Korea

    • C.

      People's Republic of China

    • D.

      Saudi Arabia

    • E.

      Myanmar

    Correct Answer
    D. Saudi Arabia
    Explanation
    Saudi Arabia attempts to limit its resident's access to controversial Web content by routing all incoming Internet traffic through a single control center. This is done through a system known as the "Great Firewall of Saudi Arabia," which allows the government to monitor and filter internet traffic, blocking access to certain websites and online content that it deems inappropriate or against its strict social and religious norms. This control over internet access is part of Saudi Arabia's broader efforts to maintain strict control over information and maintain social and political stability within the country.

    Rate this question:

  • 21. 

    An online shopping catalog for a large outdoor outfitter is almost certainly

    • A.

      A data-driven Web site that separates site content from design

    • B.

      Carefully hand-coded in pure HTML to minimize errors

    • C.

      Designed to work without cookies

    • D.

      Limited to work with a single type of Web browser for consistency

    • E.

      All of the above

    Correct Answer
    A. A data-driven Web site that separates site content from design
    Explanation
    The correct answer is "A data-driven Web site that separates site content from design". This means that the online shopping catalog is likely built using a database to store and retrieve product information, and the design of the website is separate from the content. This allows for easier updates and maintenance of the site, as changes to the design can be made without affecting the underlying content. It also suggests that the website is dynamic and can display different content based on user input or preferences.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.