TEST BANK for Straubhaar’s Media Now, 5th Edition 2008 Update CHAPTER 9 THE INTERNET True/False 1. T F Short-term memory stores data and programs after a computer is turned off. Answer: False Reference: p. 262 2. T F Long-term memory stores data and programs for immediate use. Answer: False Reference: p. 262 3. T F The first mechanical computer, called the difference engine, was invented in 1822. Answer: True Reference: pp. 255–257 4. T F There are more than 100 protocols associated with the Internet. Answer: True Reference: p. 264 Moore’s Law states that computers double in capacity and speed about every 6 months. Answer: False Reference: p. 261 5. T F 6. T F DHTML is a stripped-down version of hypertext markup language and is intended for wireless devices. Answer: False Reference: p. 269 7. T F Internet 2 is synonymous with the World Wide Web. Answer: False Reference: p. 272 8. T F Some websites associated with the television industry use the domain address for the country of Tuvalu. Answer: True Reference: p. 277 9. T F America Online is both an Internet service provider and a content provider. Answer: True Reference: p. 273 10. T F The Internet Corporation for Assigned Names and Numbers decides who gets the rights to use a particular web addresses. Answer: True Reference: p. 275 11. T F After the web was invented, videotex became popular. Answer: False Reference: p. 258 12. T F Video blogs emerged in the aftermath of the tsunami that devastated the Indian Ocean region. Answer: True Reference: p. 280 13. T F The United Nations will convene the first World Summit on the Information Society in 2008. Answer: False Reference: p. 287 14. T F Web pages are typically coded in hypertext markup language. Answer: True Reference: pp. 259, 265–267 15. T F Phishing is associated with identify theft schemes. Answer: True Reference: p. 288 16. T F Only forty percent of home computers utilize one or more of these common protections: virus scanners, spyware erasers, and spam filtering. Answer: False Reference: p. 289 17. T F 47 million people worldwide actively use the Internet. Answer: False Reference: p. 283 Multiple Choice 18. What was the first interactive multimedia device? a) CD-ROM b) The telegraph c) The Internet d) ENIAC Answer: A Reference: p. 259 19. What was the name of the network developed by the military that led to the Internet? a) USENET b) NSF c) ARPANET d) BITNET Answer: C Reference: p. 259 20. Which of the following is not a characteristic of the Internet? a) There is no single controlling authority. b) Content on the web is not protected by copyright. c) Internet content can be categorized according to domains. d) Access to the Internet is not restricted by geographical border. Answer: B Reference: pp. 275, 277, 285 21. _______________ became the “official” protocol of the Internet in 1983. a) ARPANET b) LAN c) WAN d) TCP/IP Answer: D Reference: p. 259 22. What is the most common activity on the Internet? a) Paying games b) Checking e-mail c) Financial transactions d) Job searches Answer: B Reference: p. 283 23. Households with incomes of $75,000 or more a year are _______________ as likely to use the Internet as those living in poverty a) three times b) five times c) seven times d) 10 times Answer: A Reference: p. 286 24. When was the U.S. Patriot Act passed? a) Right after Pearl Harbor b) In the early 1980s c) After the 9/11 terror attacks d) During the Vietnam War Answer: C Reference: p. 287 25. What is spam? a) Software that automatically blocks access to websites b) An Internet-based identity theft scheme c) Unsolicited commercial e-mail d) Delivery of textual information to consumers over telephone networks Answer: C Reference: p. 288 26. What does a DNS do? a) It translates web addresses that people use into addresses the Internet uses. b) It translates addresses the Internet uses into web addresses that people use. c) It produces a list of ways to search the Internet via Boolean logic. d) It lets users send instant messages back and forth. Answer: A Reference: p. 264 27. Which of the following is not software? a) Windows b) Your keyboard c) Microsoft Office d) Internet Explorer Answer: B Reference: p. 273 28. Tracking tools such as cookies and web bugs benefit the development of _______________ but pose threats to _______________. a) e-government … communications b) e-commerce … privacy c) communications … e-commerce d) privacy … e-government Answer: B Reference: p. 270 29. _______________ are a cross between a personal web page, personal diary, an online directory, and a newspaper editorial page. a) Blogs b) MUDs c) Portals d) Usenet groups Answer: A Reference: p. 280 30. Although the Internet is a decentralized system, the private sector exerts control over the network through _______________. a) competition with traditional media and telecommunication companies b) corporatization of the Net and use of copyrights and patents c) advertisement that influences the users of new technologies d) segmentation of audiences using the advertising Answer: B Reference: pp. 285–286 31. The first two generations of computers were limited by the complexity of their wiring. Third-generation computers solved this problem by using _______________. a) parallel processing b) mercury diodes c) transistors d) integrated circuits Answer: D Reference: p. 262 32. Which of the following companies has exhibited monopolistic practices in the personal computer industry? a) Microsoft b) Apple c) Both of the choices d) Neither of the choices Answer: C Reference: pp. 261, 285 33. Which of the following is not among the features usability experts consider to be most important to web page design? a) Consistent look and feel b) Flash animation c) Fast download time d) Site navigation aids Answer: B Reference: p. 284 34. MUDs and MOOs are ___________. a) Internet protocols for motion pictures on the Web b) Online games for multiple players c) Audio device connections that enable players such as the iPod d) None of the choices Answer: B Reference: p. 278 Short Answer 35. What is the danger that the Internet could become the exclusive province of a privileged, computer-savvy ruling class? Reference: pp. 286–287 36. How do U.S. laws governing Internet content differ from equivalent laws in France? Reference: p. 260 37. How have computer processors evolved through the generations of computers? Reference: p. 262 38. What is the difference between a content provider and an Internet service provider? Reference: pp. 273–274 39. What distinguishes freeware and shareware from other types of software? Reference: p. 273 40. What are examples of top-level Internet domains? Reference: pp. 259–260, 277 41. Name three of the top 10 web properties. Reference: p. 276 42. How do cookies work? Reference: p. 270 43. What was Alan Turing’s role in the development of computers? Reference: p. 256 44. What is the difference between a WAN and a LAN? Reference: p. 256 45. What is streaming? Reference: p. 268 46. What is the biggest category of e-commerce, and what key benefit does it provide? Reference: p. 283
© Copyright 2026 Paperzz