TB_chapter9

TEST BANK for
Straubhaar’s Media Now, 5th Edition 2008 Update
CHAPTER 9
THE INTERNET
True/False
1. T F
Short-term memory stores data and programs after a computer is turned off.
Answer: False
Reference: p. 262
2. T F
Long-term memory stores data and programs for immediate use.
Answer: False
Reference: p. 262
3. T F
The first mechanical computer, called the difference engine, was invented in
1822.
Answer: True
Reference: pp. 255–257
4. T F
There are more than 100 protocols associated with the Internet.
Answer: True
Reference: p. 264
Moore’s Law states that computers double in capacity and speed about every
6 months.
Answer: False
Reference: p. 261
5. T F
6. T F
DHTML is a stripped-down version of hypertext markup language and is
intended for wireless devices.
Answer: False
Reference: p. 269
7. T F
Internet 2 is synonymous with the World Wide Web.
Answer: False
Reference: p. 272
8. T F
Some websites associated with the television industry use the domain address
for the country of Tuvalu.
Answer: True
Reference: p. 277
9. T F
America Online is both an Internet service provider and a content provider.
Answer: True
Reference: p. 273
10. T F
The Internet Corporation for Assigned Names and Numbers decides who gets
the rights to use a particular web addresses.
Answer: True
Reference: p. 275
11. T F After the web was invented, videotex became popular.
Answer: False
Reference: p. 258
12. T F
Video blogs emerged in the aftermath of the tsunami that devastated the
Indian Ocean region.
Answer: True
Reference: p. 280
13. T F
The United Nations will convene the first World Summit on the Information
Society in 2008.
Answer: False
Reference: p. 287
14. T F Web pages are typically coded in hypertext markup language.
Answer: True
Reference: pp. 259, 265–267
15. T F Phishing is associated with identify theft schemes.
Answer: True
Reference: p. 288
16. T F
Only forty percent of home computers utilize one or more of these common
protections: virus scanners, spyware erasers, and spam filtering.
Answer: False
Reference: p. 289
17. T F 47 million people worldwide actively use the Internet.
Answer: False
Reference: p. 283
Multiple Choice
18. What was the first interactive multimedia device?
a) CD-ROM
b) The telegraph
c) The Internet
d) ENIAC
Answer: A
Reference: p. 259
19. What was the name of the network developed by the military that led to the Internet?
a) USENET
b) NSF
c) ARPANET
d) BITNET
Answer: C
Reference: p. 259
20. Which of the following is not a characteristic of the Internet?
a) There is no single controlling authority.
b) Content on the web is not protected by copyright.
c) Internet content can be categorized according to domains.
d) Access to the Internet is not restricted by geographical border.
Answer: B
Reference: pp. 275, 277, 285
21. _______________ became the “official” protocol of the Internet in 1983.
a) ARPANET
b) LAN
c) WAN
d) TCP/IP
Answer: D
Reference: p. 259
22. What is the most common activity on the Internet?
a) Paying games
b) Checking e-mail
c) Financial transactions
d) Job searches
Answer: B
Reference: p. 283
23. Households with incomes of $75,000 or more a year are _______________ as likely
to use the Internet as those living in poverty
a) three times
b) five times
c) seven times
d) 10 times
Answer: A
Reference: p. 286
24. When was the U.S. Patriot Act passed?
a) Right after Pearl Harbor
b) In the early 1980s
c) After the 9/11 terror attacks
d) During the Vietnam War
Answer: C
Reference: p. 287
25. What is spam?
a) Software that automatically blocks access to websites
b) An Internet-based identity theft scheme
c) Unsolicited commercial e-mail
d) Delivery of textual information to consumers over telephone networks
Answer: C
Reference: p. 288
26. What does a DNS do?
a) It translates web addresses that people use into addresses the Internet uses.
b) It translates addresses the Internet uses into web addresses that people use.
c) It produces a list of ways to search the Internet via Boolean logic.
d) It lets users send instant messages back and forth.
Answer: A
Reference: p. 264
27. Which of the following is not software?
a) Windows
b) Your keyboard
c) Microsoft Office
d) Internet Explorer
Answer: B
Reference: p. 273
28. Tracking tools such as cookies and web bugs benefit the development of
_______________ but pose threats to _______________.
a) e-government … communications
b) e-commerce … privacy
c) communications … e-commerce
d) privacy … e-government
Answer: B
Reference: p. 270
29. _______________ are a cross between a personal web page, personal diary, an online
directory, and a newspaper editorial page.
a) Blogs
b) MUDs
c) Portals
d) Usenet groups
Answer: A
Reference: p. 280
30. Although the Internet is a decentralized system, the private sector exerts control over
the network through _______________.
a) competition with traditional media and telecommunication companies
b) corporatization of the Net and use of copyrights and patents
c) advertisement that influences the users of new technologies
d) segmentation of audiences using the advertising
Answer: B
Reference: pp. 285–286
31. The first two generations of computers were limited by the complexity of their
wiring. Third-generation computers solved this problem by using _______________.
a) parallel processing
b) mercury diodes
c) transistors
d) integrated circuits
Answer: D
Reference: p. 262
32. Which of the following companies has exhibited monopolistic practices in the
personal computer industry?
a) Microsoft
b) Apple
c) Both of the choices
d) Neither of the choices
Answer: C
Reference: pp. 261, 285
33. Which of the following is not among the features usability experts consider to be
most important to web page design?
a) Consistent look and feel
b) Flash animation
c) Fast download time
d) Site navigation aids
Answer: B
Reference: p. 284
34. MUDs and MOOs are ___________.
a) Internet protocols for motion pictures on the Web
b) Online games for multiple players
c) Audio device connections that enable players such as the iPod
d) None of the choices
Answer: B
Reference: p. 278
Short Answer
35. What is the danger that the Internet could become the exclusive province of a
privileged, computer-savvy ruling class?
Reference: pp. 286–287
36. How do U.S. laws governing Internet content differ from equivalent laws in France?
Reference: p. 260
37. How have computer processors evolved through the generations of computers?
Reference: p. 262
38. What is the difference between a content provider and an Internet service provider?
Reference: pp. 273–274
39. What distinguishes freeware and shareware from other types of software?
Reference: p. 273
40. What are examples of top-level Internet domains?
Reference: pp. 259–260, 277
41. Name three of the top 10 web properties.
Reference: p. 276
42. How do cookies work?
Reference: p. 270
43. What was Alan Turing’s role in the development of computers?
Reference: p. 256
44. What is the difference between a WAN and a LAN?
Reference: p. 256
45. What is streaming?
Reference: p. 268
46. What is the biggest category of e-commerce, and what key benefit does it provide?
Reference: p. 283