Which of the following top-level domains is restricted to degree-granting institutions?

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (40)

Sets found in the same folder

Other sets by this creator

Verified questions

computer science

Verified answer

computer science

Verified answer

computer science

Verified answer

computer science

Create a dictionary object from two lists. The first list is the keys and the second list is the values of the created dictionary. Note that keys are unique. Only the first occurrence of a key and the corresponding value should be appended to the created dictionary. Example: A = [1, 2, 2, 5, 1, 20, 5, 1, 0, -10], B = ['A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J'], created dictionary: {1: 'A', 2: 'B', 5: 'D', 20: 'F', 0: 'I', -10: 'J'}

Verified answer

Recommended textbook solutions

Which of the following top-level domains is restricted to degree-granting institutions?

Which of the following top-level domains is restricted to degree-granting institutions?

Which of the following top-level domains is restricted to degree-granting institutions?

Which of the following top-level domains is restricted to degree-granting institutions?

Other Quizlet sets

Related questions

Recommended textbook solutions

Which of the following top-level domains is restricted to degree-granting institutions?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Which of the following top-level domains is restricted to degree-granting institutions?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Which of the following top-level domains is restricted to degree-granting institutions?

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Which of the following top-level domains is restricted to degree-granting institutions?

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

726 solutions

Answer-

Option C is the correct answer.

Option A - .gov is a domain in the system of the domain names. It is restricted to the use of government entities. Hene, this option is incorrect.

Option B - It is a top-level domain used for the word network. It is designed for networking and technology companies. It is used by companies to launch their business online. Because of this, this choice is wrong.

Option C - A top-level domain name used by research centers and educational institutions. Websites with the .edu top-level domain are considered to be credible websites. Therefore, this option is correct.

Option D - It indicates an informational website that is globally recognized. It is considered to be an alternative to .com and .org domains. It is an unrestricted domain and can be created by anyone for any purpose. Hence this is the wrong choice.

The concept of the Internet was developed by the U.S. Department of Defense as a network that ________ in event of an attack

a. provides point to point connections

b. would not be disrupted easily

c. allows commerce to continue

d. would not be easily hacked



ch3&5

In the URL https://www.microsoft.com/surface, the portion labeled ".com" is the ________.


host, top-level domain, protocol, domain name

a. host

b. top-level domain

c. protocol

d. domain name


ch3&5

The "s" in "https" stands for ________ socket layer.


social semantic secure server

social semantic secure server


ch3&5

Which of the following is a feature of Live bookmarks?

-Streams live television programs

- Broadcasts webinars

- Enables you to pin your favorite website images

- Adds RSS technology to bookmarks

-Streams live television programs

- Broadcasts webinars

- Enables you to pin your favorite website images

- Adds RSS technology to bookmarks


ch3&5

In the URL https://www.microsoft.com/surface, the portion labeled "surface" is the ________.

subdirectory

protocol

domain name

top-level domain

subdirectory

protocol

domain name

top-level domain

The unique identification number assigned to your computer when you connect to the Internet is known as all of the following EXCEPT ________.

IP address

dotted decimal

dotted quad

path

IP address

dotted decimal

dotted quad

path

AND, OR, and NOT are examples of ________ operators.

Jacobean relational Boolean keyword

Jacobean relational Boolean keyword

Which of the following top-level domains identifies a degree-granting institution?

.gov .net .info .edu

A subset of e-commerce that uses social networks to assist in marketing and purchasing products is known as ________ commerce.

social source crowd friend

social source crowd friend

All of the following are tips for professional e-mail etiquette EXCEPT ________.

- use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter

-include a meaningful subject line

- use spell-checker and proofread before sending

- be concise and to the point

- use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter

- include a meaningful subject line

-use spell-checker and proofread before sending

- be concise and to the point

The "fathers of the Internet" are Vinton Cerf and ________.

Robert Kahn, Robert Cailliau, Tim Berners-Lee, Bill Gates

Robert Kahn

Robert Cailliau

Tim Berners-Lee

Bill Gates

A(n) ________ is installed on your computer, and when the program is opened, your e-mail is downloaded to your computer.

e-mail client, web-based e-mail, e-mail server, e-mail host


e-mail client

web-based e-mail

e-mail server

e-mail host

A ________ is a personal journal posted on the web.

blog webcast wiki podcast

blog webcast wiki podcast

A ________ allows visitors to add, remove, or edit its content.

wiki blog chat podcast

The Internet is ________.

- the same as the web

-an internal communication system for businesses

-a large network of networks

-a communication system for the U.S. military

-the same as the web

-an internal communication system for businesses

-a large network of networks

-a communication system for the U.S. military

Match each of the following domains to the site that would use it:

Apple .edu

Harvard .ca

White House .org

Red Cross .com

Ontario Government .gov

Apple .com

Harvard .edu

White House .gov

Red Cross .org

Ontario Government .ca

protocol that allows files to be transferred from a web server

C2C - transactions between two individuals

transactions between two individuals

FTP - protocol that allows files to be transferred over the internet

protocol that allows files to be transferred over the internet

B2C - transactions between a company and its customers

transactions between a company and its customers

All of the following are examples of network operating systems EXCEPT ________.

- Linux - Windows 10 -OS X -MS-DOS

- Linux - Windows 10 -OS X -MS-DOS

When using Windows File Explorer, which view provides the most information at a glance?

List Details Tiles Content

List Details Tiles Content

The ________ of the operating system enables users to communicate with the computer system.

-network adapter card

-modem

-user interface

-window

- network adapter card

- modem

-user interface

-window

Which of the following operating systems are used on most tablets?

-BlackBerry and Windows

-Windows and iOS

-Windows and Android

-Android and iOS

-BlackBerry and Windows

-Windows and iOS

-Windows and Android

-Android and iOS

Each device attached to your computer has a special program called a(n) ________ that enables the device and operating system to communicate with each other.

interpreter, device driver, translator, device configurator

interpreter

device driver

translator

device configurator

Which of the following is the name of a Microsoft Excel file?

inventory.accdb

inventory.wpd

inventory.pdf

inventory.xlsx

inventory.accdb

inventory.wpd

inventory.pdf

inventory.xlsx

OS X is the operating system developed by ________.


Microsoft Linux Google Apple

Microsoft Linux Google Apple

Using hard disk space to temporarily store data or instructions from RAM is referred to as the ________.

virtual memory,

compressor,

interrupt sequencer,

spool

virtual memory

compressor

interrupt sequencer

spool

The two major types of system software programs are utility programs and the ________.

charms

operating system

application software

user interface

charms

operating system

application software

user interface

C: denotes a(n) ________ directory that is at the top of the filing structure of a computer.

cluster top-level upper-level root

cluster

top-level

upper-level

root

The location of a file is specified by its ________.


drive identifier

file type

file extension

file path

drive identifier

file type

file extension

file path

The Mac OS was the first commercially available OS to incorporate ________.

sound

point and click technology

networking

color graphics

sound

point and click technology

networking

color graphics

In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects.

spiders, worms, bugs

You can use the Windows ________ to check on a nonresponsive program.

System Restore, Backup utility, Error-checking, Task Manager

System Restore

Backup utility

Error-checking

Task Manager

Which utility temporarily removes redundancies in a file to reduce the file size?

Disk Cleanup

Error-checking

File Compression

Disk Defragmenter

Disk Cleanup

Error-checking

File Compression

Disk Defragmenter

Match each of the following terms to its meaning:

Kernel

Virtual Memory

Swap file

Spooler

Paging


kernel- operating system supervisor program

virtual memory- process of optimizing RAM storage by using hard drive space

swap file - temporary storage area on the hard drive

spooler- coordinates print jobs

paging - the process of swapping data between RAM and a swap file

- operating system supervisor program

- process of optimizing RAM storage by using hard drive space

-temporary storage area on the hard drive

-coordinates print jobs

-the process of swapping data between RAM and a swap file

(goes with previous card)

Match each of the following terms to its file type (category):


.pdf image

.jpg portable document format

.zip web page

.accdb compressed files

.html Microsoft Access

.pdf portable document format

.jpg image

.zip compressed files

.accdb Microsoft Access

.html web page

What domain is restricted to degree granting institutions?

edu domain is the top level domain (TLD) of the Internet domain name system (DNS) that was established for use by educational institutions. Currently, it is generally restricted to use by four-year degree granting higher education institutions.

Which of the following top level domain is generally used by Internet service providers?

As the internet continued to grow in use and popularity, dot-coms quickly became the most commonly used top-level domain. . net – Short for network, dot-nets were made for network technology companies like infrastructure companies or internet service providers (ISPs).

Which of the following is not considered a social networking?

Hotmail is not a social networking site; instead, it offers webmail services that allow users to access their Hotmail accounts through an internet connection. Only the Hotmail username and password are required to access the account.

Are e mails are completely private?

Emails are not completely private. Emails to individuals are prepared with the assumption that they would only be seen by that person, and internet providers' data rules should reflect this, but unlike a letter, an email may simply be forwarded elsewhere after it is sent.