IT1404 Internet and World Wide Web Multiple Choice Question Paper
|
|
- Osborn Hunter
- 6 years ago
- Views:
Transcription
1 UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2009/ st Year Examination Semester 1 IT1404 Internet and World Wide Web Multiple Choice Question Paper 07 th March, 2010 (TWO HOURS) Important Instructions : The duration of the paper is 2 (two) hours. The medium of instruction and questions is English. The paper has 50 questions and 13 pages. All questions are of the MCQ (Multiple Choice Questions) type. All questions should be answered. Each question will have 5 (five) choices with one or more correct answers. All questions will carry equal marks. There will be a penalty for incorrect responses to discourage guessing. The mark given for a question will vary from 0 to +1 (All the correct choices are marked & no incorrect choices are marked). Answers should be marked on the special answer sheet provided. Note that questions appear on both sides of the paper. If a page is not printed, please inform the supervisor immediately. Mark the correct choices on the question paper first and then transfer them to the given answer sheet which will be machine marked. Please completely read and follow the instructions given on the other side of the answer sheet before you shade your correct choices. 1
2 1. Internet (a) is an open global network of interconnected computer networks which use a common communication protocol, TCP/IP. (b) is becoming more and more safe and important for children. (c) always provides a secure and reliable way of transaction. (d) has become an important tool that enables communication among members of society. (e) always contains precise, reliable information. 2. Which of the following is(are) not broadband internet connections? 3. Fill in the blank. (a) DSL (b) IPTV (c) Leased lines (d) Cable Internet (e) Dial-Up... is a high speed Internet connection that uses the normal phone wires with special modems at either end. With this connection one can connect his computer to the Internet and talk on the phone at the same time on the same phone line. (a) WiMAX (b) Dial-Up (c) Leased line (d) DSL (e) Cable Internet 4. A Uniform Resource Locator (URL) tells the browser the (a) transfer protocol to use when transporting a resource. (b) domain name of the computer on which the resource resides. (c) path name of the folder/directory on the computer on which the resource resides. (d) name of the resource to be retrieved. (e) IP address of the computer on which the resource resides. 5. Which of the following methods will work in getting the IP address of a computer connected to the Internet running on a Windows operating system? (a) Typing the Ipconfig at command prompt (b) Typing the ping command at command prompt (c) Properties of Internet protocol, lists the IP address (d) Getting the IP address of any other computer connected to the same network (e) Referring to the IP address found last time as it is always the same 6. Web 2.0 is commonly associated with web applications which facilitate interactive information sharing, interoperability, user-centered design and collaboration on the World Wide Web. Which of the following is (are) included in Web 2.0? (a) Social networking sites (b) Wikis (c) Blogs (d) Mashups (e) Video sharing sites 7. Identify mailing list servers from among the following. (a) Listserv (b) Listproc (c) ebay (d) Addressbook (e) Google groups 2
3 8. Consider the following scenario. A uses Thunderbird as the client and B uses Eudora as the client. Which of the following statements is(are) correct in relation to the above scenario? 9. Match column X with Y. (a) messages sent by A can be received by B. (b) messages sent by B can be received by A. (c) A or B cannot receive messages sent by other clients. (d) A can never receive messages sent by B but B can receive messages sent by A. (e) B can never receive messages sent by A, but A can receive messages sent by B. Column X Column Y i IMAP Protocol A used by the Mail Transfer Agent (MTA) to deliver to the recipient's mail server ii POP3 Protocol B is not a protocol dedicated for communications, but it can be used for accessing your mailbox iii SMTP Protocol C is a client/server protocol in which is received and held for you by your Internet server iv HTTP Protocol D used to download messages from the mail server to a local computer (a) i -A, ii -B, iii -C, iv-d (c) i- B, ii -C, iii -D, iv-a (e) i -C, ii -B, iii -A, iv-d (b) (i) -D, ii -C, iii -B, iv-a (d) (i) -C, ii -D, iii -A, iv-b 10. Consider the following statements with regard to Multipurpose Internet Mail Extensions (MIME). i MIME adds multi-media extensions to the existing system by changing the SMTP protocol. ii MIME is also used for information exchange between web browsers and web servers. iii MMIME redefines the format of messages to allow for multi-part message bodies. Which of the above Statements is /are correct? (a) i only. (b) ii only. (c) i and ii only. (d) ii and iii only. (e) All. 11. Consider the following statements related to Blind Carbon Copy (BCC) feature available in an client. i An address in the BCC field is visible to recipients in CC field. ii Addresses in the BCC field are not displayed on incoming messages. iii If there are no valid address in the To or CC field, then some programs will indicate a notation like "Recipient list suppressed" in the To field, which tells the recipient that there is at least one BCC address. Which of the above statements is (are) correct? (a) i only. (c) i and iii only. (e) All (b) ii only. (d) ii, and iii only. 3
4 12. Consider the following scenario and the statements. Scenario: An user observed that the time in his computer is correct, but when he sends , the timestamp in his is an hour ahead. Statements: i. The "one hour off" is actually a clue that his time zone is set incorrectly. ii. The change of time stamp depends on what program or service is being used. iii. The Selection of the correct "time zone" is not one of the reasons for this situation experienced by the user. Identify the correct statements from above with regard to the above scenario. (a) i only. (b) ii and iii only. (c) i and iii only. (d) i and ii only. (e) All. 13. Identify the correct statement(s) related to Pull and Push technologies in . (a) Pull technology requires the user to actively go and retrieve the information. (b) Push technology delivers information to the user and hence user has only to receive it. (c) One of the reasons has been a success is because it is a Pull technology. (d) An advantage of Push technologies is the ease of use, they require a minimum of effort on the part of the recipient. (e) Push technology is used when surfing the World Wide Web to seek out and download information. 14. Select correct statement(s) related to . (a) Any file type can be sent as an attachment. (b) The recipient should have an MS Excel program to receive an MS Excel file as an attachment. (c) To send and receive attachments, both the sender and the receiver must use the same operating system. (d) Uuencode can be used to encode attachments. (e) Only the encoding programs which are known to the mail servers can be used to encode attachments. 15. Consider the following statements given below with regard to filtering of . i One of the most common uses of filters is automatic transfer of incoming into different mailboxes. ii Messages from individuals/groups can be directed into a special folder using e- mail filters. iii One can set up his own set of rules to create an application level spam blocker. Which of the above statements is (are) correct? (a) i only. (b) i and ii only. (c) i and iii only (d) ii and iii only (e) All 4
5 16. Hyperlink is 17. HTML documents (a) an image which connects to another web page. (b) a piece of text that connects to another part of the same document. (c) used in defining the internet. (d) used to format text. (e) a tag used to play background sound. (a) describe web pages. (b) contain HTML tags and plain text. (c) are called web pages (d) contain 3D definitions. (e) are used for server side scripting. 18 Which of the following statements is/are correct in relation to <pre> tag used in HTML? (a) Text inside this tag is displayed in a fixed-width font and preserves both spaces and line breaks. (b) It displays the text in size 12 font. (c) It displays the text in size 24 font. (d) Default font for this tag is Courier. (e) Default font for this tag is Arial. 19. Identify the correct statement(s) about URI s and URL s. (a) URL is a deprecated element as per the w3c definition. (b) URI means Universal Resource Identifier. (c) URL is a subset of URI. (d) URI is a subset of URL. (e) URI specifies the server name or IP address. 20. Select the set(s) of tags which contains invalid core attributes of HTML. (a) meta, param, pre, bold (c) style, title, meta, param (e) subscript, font, img, head (b) head, base, html, script (d) pre, form, bold, superscript 21. Which of the following can be used to edit HTML? (a) gedit (b) Emacs (c) Ogre (d) Unreal Engine (e) Vi 22. Find the correct set(s) of words which contain(s) only search engines? (a) Ask, Google, Yahoo, Hotmail (c) Ask, Yahoo, Google, Cricinfo (e) Java Search, Google, Hotmail, Yahoo (b) Hotmail, Yahoo, Gmail, Ogre (d) MSN, Google, Ask, Yahoo 5
6 23. Identify the search engine techniques from among the following. (a) Crawler based systems (c) Ray tracing based techniques (e) Acyclic searching techniques (b) Human powered directories (d) Collision based techniques 24. Which of the following is(are) true about spider based searching? (a) Spiders initially read the content after visiting a site. (b) After reading the content, spiders move through the site by using the links. (c) Spidered sites are often revisited after an elapse of a specified time period. (d) This is not a web search technique. (e) Spiders are mechanical devices which crawl servers physically. 25. Select the correct statement(s) related to web directories and search engines. (a) Web directories use a different approach from search engines to build useful indexes of information on the web. (b) One of the oldest directories on the web is Yahoo!. (c) A search engine differs form a web directory as it is already selected and organized into categories. (d) Web directory is a listing of hyperlinks to web pages which is organized into hierarchical categories. (e) In a web directory, the database is searched in response to a visitors query. 26. Consider the part of the web page given below. Which of the following is(are) indicated by the small padlock that appears at the right edge of the status bar in above? (a) Web page is blocked by the network administrator (b) Not authorized to access the information on the web site (c) Web site is authenticated properly and the communication is secure (d) Cannot upload to the web site (e) Cannot download from the web site 6
7 27. Consider the following HTML page. Select the most compact HTML code snippet from among the following to depict the above output. (a) <html> <h1> Hello World!<h1> / </html> (c) <html> <title> Internet and WWW </title> <h1> Hello World!</h1> </html> (b) <html> <head> Internet and WWW </head> </html> (d) <html> <head> <title> Internet and WWW </title> </head> <h1> Hello World!</h1> </html> (e) There is no HTML code that is capable of deriving the above output. 28. Consider the following output. Which of the following HTML code snippets would give the output shown above? (a) < html > Can you do this? < /html > (c) < html < Can you do this? < /html < (e) < html > < body> Can you do this? < /html > (b) > html > Can you do this? > /html > (d) > html < Can you do this? > /html < 7
8 29. Consider the following HTML code. <dl> <dt>coffee</dt> <dd>black hot drink</dd> <dt>milk</dt> <dd>white cold drink</dd> </dl> What is the correct output of the above HTML code snippet when run on a browser? (a) Coffee Black hot drink Milk White cold drink (c) Coffee Black hot drink Milk White cold drink (b) Coffee Black hot drink Milk White cold drink (d) Coffee Black hot drink Milk White cold drink (e) Coffee Black hot drink Milk White cold drink 30. Consider the HTML code given below. <head> </head> <style type="text/css"> body {background-color: red} p {margin-left: 20px} </style> The Cascading Style Sheet defined in the above code snippet is defined as (a) external to the document. (c) an inline style. (e) a graphical style. (b) internal to the document. (d) an abstract linear style. 31. How can an HTML developer create a link such that it opens in a new browser window? (a) <a href="url" target="_blank"> (c) <a href="url" target="_new"> (e) <a href="url" target="_parent"> (b) <a href="url" new> (d) <a href="url" target="_self"> 32. Consider the following statement. Input fields are predominantly used in web forms. Select the set(s) which contain(s) valid names for the type of the input field. (a) text, submit, radio, dropdown (c) text, radio, textbox, reset (e) radiobutton, textarea, dropdown, combo (b) checkbox, reset, submit, text (d) combo, reset, submit, text 8
9 33. Match column X with Y. Column X Column Y A IPTV i Wireless transmission of data using a variety of transmission modes B WiMAX ii Software system that allows one to control a remote computer C ipod iii A family of popular digital music players from Apple D VNC iv Digital television service delivered using Internet Protocol (a) A- i, B- iv, C- iii, D- ii (c) A- i, B- iii, C- ii-, D- iv (e) A- iv, B- i, C- iii, D- ii (b) A- iv, B- ii, C- iii, D- i (d) A- i, B- ii, C- iii, D- iv 34. Consider the following questions asked by a novice FTP user and the answers he got. (i) Ques: Is FTP independent of the operating system? Ans: Yes (ii) Ques: Is it important to scan the files downloaded from the FTP sites? Ans: No (iii) Ques: Can one use a web browser to upload and download files from FTP sites? Ans: Yes (iv) Ques: Is there a customary password to log on to a publicly accessible FTP site? Ans: Yes Identify Question numbers for which he has got correct answers (a) (i) and (ii) only (b) (i) and (iii) only (c) (ii) and (iii) only (d) (i), (iii) and (iv) only. (e) (ii), (iii) and (iv) only. 35. Consider the following scenario. An ecommerce web sites use the SSL protocol in handling sensitive information as it travels over the Internet. Also, they store their customer information so that customers do not have to type the card numbers every time they buy something from the web site. Which of the following statements is(are) correct in relation to the above scenario? (a) Using SSL protocol protects sensitive information. (b) Instead of SSL protocol, HTTP protocol should have been used. (c) Buyers privacy will not be violated. (d) Storing customer information is always beneficial. (e) This web site can always be trusted as it uses the SSL protocol. 9
10 36. Consider the following statements. (i) (ii) (iii) RSS is a file containing summaries of stories and news from the web. RSS differs from newsgroups in the way the content is delivered to the subscriber. Newsgroups are technically distinct from, but functionally similar to, discussion forums on the World Wide Web. Which of the above statements is (are) correct? (a) (ii) only. (b) (i) and (ii) only (c) (ii) and (iii) only (d) (i) and (iii) only. (e) ALL. 37. In using passwords on the Internet, (a) common words spelt backwards are good passwords. (b) gluing few words together makes good passwords. (c) write down the passwords to avoid difficulties. (d) better to have different passwords for each kind of account. (e) avoid using English words or common names. 38. Identify the correct statements related to sound and music on the web. 39. Match column x with y. (a) Music stored in WAV file format would be in lower quality than in MP3 file format. (b) MIDI files are smaller in size than WAV files. (c) MIDI files are often used in the web. (d) A CD that might hold 15 songs in WAV format could instead hold 150 songs in MP3 format. (e) MP3 file sharing activity is unethical because it deprives the creators of the audio works. Column X Column Y A PBWorks i Location to download and develop free open source software B SourceForge ii Shared workspaces for working with colleges, clients and partners C Drupal iii Open source content management platform D Blogger iv Share your thoughts, photos and more with your friends and the world (a) A- i, B- iv, C- iii, D- ii (c) A- ii, B- iii, C- i-, D- iv (e) A- iv, B- i, C- iii, D- ii (b) A- ii, B- i, C- iii, D- iv (d) A- i, B- ii, C- iii, D- iv 40. Select the correct statements related to online social networks. (a) Social networks rely on advertising to generate the revenue they need to operate the site. (b) Social networks allow creating blogs and posting pictures.. (c) One can post and download digital music files from social networks. (d) Flickr is an online photo management and sharing application in the world. (e) LinkedIn is an online social network. 10
11 41. elearning is moving towards (a) richer content able to provide more authentic learning environments. (b) SCORM to standardize the effort. (c) formalizing the process of content creation and maintenance. (d) minimizing simulation in the content. (e) sufficiently sophisticated feedback mechanisms. 42. Identify the free online library resources among the following. (a) The WWW virtual library (c) Public Library Of Science (e) Encyclopaedia Britannica (b) Wikipedia (d) Internet Public Library 43. Consider the following diagram. X In the above diagram, X is used for filter the information. What can X be? (a) Modem (b) Firewall (c) Router (d) Repeater (e) Gateway 44. Consider the following incomplete paragraph. In the (A). the same key is used to encrypt and decrypt the data. This is similar to using the same key to lock and unlock a door lock. In contrast,..(b).. uses two keys, one key as the..(c).. or the public key and the other key as the..(d) or the private key. This method is more practical compared to the first method. Fill in the blanks from (A) to (D). (a) (A) public key cryptography, (B) secret key cryptography, (C) decryption key, (D) encryption key (b) (A) secret key cryptography, (B) public key cryptography, (C) decryption key, (D) encryption key (c) (A) secret key cryptography, (B) encryption key (C) public key cryptography (D) decryption key (d) (A) public key cryptography, (B) secret key cryptography, (C) encryption key (D) decryption key (e) (A) public key cryptography, (B) encryption key, (C) secret key cryptography (D) decryption key 11
12 45. Identify the secure protocols from among the following. (a) HTTP (b) SSL (c) SET (d) FTP (e) S-HTTP 46. Read the following descriptions about X, Y and Z. X: It does something harmful to the computer system, but is disguised as something useful. Usually does not make copies of themselves Y: It is a computer program that propagates itself across computers, creating copies of itself in each computer and infecting the entire network. Z : It is a computer program designed to replicate itself by infecting other files or system areas which need a host program to spread to another computer. X, Y Z can be respectively, 47. Consider the following. (a) X: Virus, Y: Worm, Z: Trojan horse. (b) X: Trojan horse, Y : Virus, Z: Worm. (c) X: Worm, Y: Virus, Z: Trojan horse. (d) X: Trojan horse, Y: Worm, Z: Virus. (e) X: Worm, Y: Trojan horse, Z: Virus. i ii iii iv Messages on Social Networking websites Messages posted on message boards addresses in address books Images stored in a computer memory Which of the above can be considered as electronic evidence in a court of law? (a) i, ii, and iii only. (c) ii, iii and iv only. (e) All. (b) i and iv only. (d) i, iii and iv only. 48. Consider the following scenario. In the year 2003, a user of e-bay (an internet auction website) received s supposedly from ebay claiming that the user s account was about to be suspended unless he/she clicked on the provided link and updates/verifies his credit card information that the ebay already had. This led to some people being tricked into thinking they were actually being contacted by ebay and were subsequently going to ebay s site to update their account information. This type of internet scam is known as (a) Money Laundering. (b) Flaming. (c) Spam. (d) Phishing. (e) Stealing. 49. Consider the following statements on the use of web based services. i User leaves an electronic trail from which his/her behaviour could be analysed. ii User leaves no trail or clue since the browser is closed after his web sessions. iii By clearing private data, user can erase his trail completely. Which of the above statements is(are) true? (a) i only. (b) i and ii only. (c) iii only. (d) ii and iii only. (e) None. 12
13 50. Consider the following statements. i ii iii iv Internet Communication is completely secure and any information that is transmitted over the internet is also secure. messages composed in upper case will not be interpreted as shouting if the volume function is muted. Forwarding chain messages is allowed, as is meant for communication and has insignificant cost. Providing addresses of friends, relatives and colleagues to advertise firms is ethical since it will give them an opportunity to know about new products and services. Which of the above statements is/are correct with regard to the ethical and legal behaviour on the Internet? (a) i,ii and iv only (b) i and iv only (c) ii and iv only (d) i and iii only (e) None. ************ 13
IT1403: Internet and World Wide Web Multiple Choice Question Paper
UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2007/2008 1 st Year Examination Semester 1 IT1403: Internet
More informationIT1404: Internet and World Wide Web Multiple Choice Question Paper
UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2011/2012 1 st Year Examination Semester 1 IT1404: Internet
More informationIT1403 Internet and World Wide Web Multiple Choice Question Paper
UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2008/2009 1 st Year Examination Semester 1 IT1403 Internet
More informationIT1404: Internet and World Wide Web Multiple Choice Question Paper
UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2010/2011 1 st Year Examination Semester 1 IT1404: Internet
More informationCCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means
More informationInternet Architecture
Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use
More information(electronic mail) is the exchange of computer-stored messages by telecommunication.
What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)
More informationCCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols
CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services
More informationInternet. Class-In charge: S.Sasirekha
Internet Class-In charge: S.Sasirekha COMPUTER NETWORK A computer network is a collection of two or more computers, which are connected together to share information and resources. Network Operating Systems
More informationNetwork Applications and Protocols
Network Applications and Protocols VoIP (Voice over Internet Protocol) Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over
More informationThe Internet The Internet
The Internet The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number
More informationThe Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP)
The Internet, Intranets, and Extranets 1 The Internet The Internet is a collection of interconnected network of computers, all freely exchanging information. These computers use specialized software to
More informationis still the most used Internet app. According to some studies around 85% of Internet users still use for communication.
1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a
More informationM2-R4: INTERNET TECHNOLOGY AND WEB DESIGN
M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the
More informationComputer networks 2013
Chapter 4 EXERCISE 1 1 Describe what is meant by each of the following: a Router b Bridge c Proxy server Answers: see the Glossary. 2 Many small businesses have computer networks. a List three advantages
More informationElectronic Mail Paradigm
Electronic Mail Paradigm E-mail uses the client-server model. E-mail was designed as an electronic extension of the old paper office memo. - A quick and easy means of low-overhead written communication.
More informationNetworking and Health Information Exchange: ISO Open System Interconnection (OSI)
Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection
More informationHeader- A Forensic Key to Examine an
E-Mail Header- A Forensic Key to Examine an E-Mail Swapnil Gupta 1, Kopal Gupta 2, Dr. Anu Singla 3 1,2,3 Institute of Forensic Science & Criminology, Bundelkhand University, Jhansi (U.P.), India ---------------------------------------------------------------------***---------------------------------------------------------------------
More informationThe Internet and World Wide Web. Chapter4
The Internet and World Wide Web Chapter4 ITBIS105 IS-IT-UOB 2016 The Internet What is the Internet? Worldwide collection of millions of computers networks that connects ITBIS105 IS-IT-UOB 2016 2 History
More informationChapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0
Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 10 Chapter 10 - Sections & Objectives 10.1 Application Layer Protocols Explain the operation of the application
More informationUnit 4 The Web. Computer Concepts Unit Contents. 4 Web Overview. 4 Section A: Web Basics. 4 Evolution
Unit 4 The Web Computer Concepts 2016 ENHANCED EDITION 4 Unit Contents Section A: Web Basics Section B: Browsers Section C: HTML Section D: HTTP Section E: Search Engines 2 4 Section A: Web Basics 4 Web
More informationUsing the Internet and the World Wide Web
Using the Internet and the World Wide Web Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Understand the difference between the Internet and the World Wide Web. Identify
More informationEmerging Technology in Business (CIW) Course Review (1 semester class) Course Number:
Unit 1: Your School Standards: 01.04, 02.01, 02.06 (School Website, Yearbook, Newspaper, Personnel Interviews) 1. List major clubs at your school: 2. What is the purpose of FBLA? 3. What services are available
More informationNetworking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3
Slide 1 Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 2 Unit
More informationUSING THE INTERNET AND THE WORLD WIDE WEB RAYMOND ROSE
USING THE INTERNET AND THE WORLD WIDE WEB RAYMOND ROSE LEARNING OUTCOMES the World Recognize the key elements of Web sites Surf the Internet Use search engines 2 IDENTIFYING THE INTERNET the World Understand
More informationDiscovering Computers Chapter 2 The Internet and World Wide Web
Discovering Computers 2009 Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Discuss the history of the Internet Describe the types of Web sites Explain how to access and connect to the Internet
More informationELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12
ELECTRONIC MAIL RAYMOND ROSE Computer Technology Department 2011/12 ELECTRONIC COMMUNICATION Systems for exchanging information and news were the first applications developed for network communication.
More informationSECURING INFORMATION SYSTEMS
SECURING INFORMATION SYSTEMS (November 7, 2016) BUS3500 - Abdou Illia - Fall 2016 1 LEARNING GOALS Understand security attacks preps Discuss the major threats to information systems. Discuss protection
More informationThe internet and the web
1 The internet and the web Internet lunched in 1969 National computer network called: Advanced Research Project Agency Network (ARPANET). The internet is : -Large network that connects together smaller
More informationName: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.
Name: Class: Date: The Internet and WWW True/False Indicate whether the sentence or statement is true or false. 1. A search engine is a program that performs keyword searches for information on the Internet.
More informationChapter 4 The Internet
Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3
More informationChapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.
Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area
More information1. Web Technology... 6
TABLE OF CONTENTS 1. Web Technology... 6 1.1. Introduction (Hypertext, URL, Domain Name)...6 1.2. Web Browser and ISP...8 1.3. Upload and download files...10 1.4. Control of Internet...10 2. E-mail components
More informationOutside the Box: Networks and The Internet
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationThe process by which a user can associate specific permissions to each username.
Jargon Buster A Antispyware A program that detects and removes malicious programs on your computer called spyware. Once it is installed can collect information without the users consent, that can be almost
More informationATTACHMENTS, INSERTS, AND LINKS...
Conventions used in this document: Keyboard keys that must be pressed will be shown as Enter or Ctrl. Objects to be clicked on with the mouse will be shown as Icon or. Cross Reference Links will be shown
More informatione-commerce Study Guide Test 2. Security Chapter 10
e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the
More informationModule 1: Internet Basics for Web Development (II)
INTERNET & WEB APPLICATION DEVELOPMENT SWE 444 Fall Semester 2008-2009 (081) Module 1: Internet Basics for Web Development (II) Dr. El-Sayed El-Alfy Computer Science Department King Fahd University of
More informationInside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationIntroduction to the Internet. Part 1. What is the Internet?
Introduction to the Internet Part 1 What is the Internet? A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected
More informationAn Overview of Webmail
An Overview of Webmail Table of Contents What browsers can I use to view my mail? ------------------------------------------------------- 3 Email size and storage limits -----------------------------------------------------------------------
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationVISUAL SUMMARY ACCESS INTERNET AND WEB. The Internet, the Web, and Electronic Commerce
VISUAL SUMMARY The Internet, the Web, and Electronic Commerce INTERNET AND WEB Internet Launched in 1969 with ARPANET, the Internet consists of the actual physical network. Web Introduced in 1991 at CERN,
More informationThe Ultimate Digital Marketing Glossary (A-Z) what does it all mean? A-Z of Digital Marketing Translation
The Ultimate Digital Marketing Glossary (A-Z) what does it all mean? In our experience, we find we can get over-excited when talking to clients or family or friends and sometimes we forget that not everyone
More informationAPPENDIX A. Answer: D Reference: Hardware Basics Difficulty: Easy. Answer: A Reference: Hardware Basics Difficulty: Easy
APPENDIX A Multiple Choice: 1. A desktop computer is also known as a: A. Palm Pilot. B. laptop. C. mainframe. D. PC. Answer: D Reference: Hardware Basics Difficulty: Easy 2. The physical parts of a computer
More informationing With PHP History of Applications or Use
Emailing With PHP What is Email? E mail, short for electronic mail and often abbreviated to e mail, email or simply mail, is a store and forward method of composing, sending, receiving and storing messages
More informationChapter 5: Networking and the Internet
Chapter 5: Networking and the Internet (Completion Time: 3 weeks) Topics: Internet Basics An overview of how the internet works and how we as users interact with it. This topic can also be used as sort
More informationIntroduction. Logging in. WebQuarantine User Guide
Introduction modusgate s WebQuarantine is a web application that allows you to access and manage your email quarantine. This user guide walks you through the tasks of managing your emails using the WebQuarantine
More informationElectronic Mail (SMTP)
Electronic Mail (SMTP) Nowadays email is more popular than the paper letters called snail-mails. It is a form of network communication. Some of the other forms of network communication being voice-over-internet,
More information(5) Affiliation (10) XML (15) Web Augmentation (20) Gateways. (4) Kernel (9) ES test (14) SSL. (1) Portal (6) EDI (11) Web Directories (16) W3C
PART 1: MULTIPLE CHOICE QUESTIONS (15 MARKS) This part consists of 15 multiple choice questions. On the answer sheet, fill you answer for each question. 1. At its early days was called Gateway, nowadays
More informationElementary Computing CSC 100. M. Cheng, Computer Science
Elementary Computing CSC 100 1 Internet (2) TCP/IP and IP Addresses Hostnames and Domain Name System Internet Services Client/Server and Peer- 2- Peer Applications SPAMs & Phishing, Worms, Viruses & Trojans
More informationINTERNET SAFETY IS IMPORTANT
INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being
More informationGoogle Apps. What are Google Apps?
What are Google Apps? Google Apps Google provides free, online (i.e. Cloud computing) programs called Apps for creating various kinds of documents, as well as providing a way to share these documents with
More informationUsing Your New Webmail
Using Your New Webmail Table of Contents Composing a New Message... 2 Adding Attachments to a Message... 4 Inserting a Hyperlink... 6 Searching For Messages... 8 Downloading Email from a POP3 Account...
More informationBusiness Data Communications and Networking
Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Dwayne Whitten, D.B.A Mays Business School Texas A&M University http://alainmaterials.webs.com/
More informationContents. Management. Client. Choosing One 1/20/17
Contents Email Management CSCU9B2 Email clients choosing and using Email message header and content Emailing to lists of people In and out message management Mime attachments and HTML email SMTP, HTTP,
More informationCOMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ
COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Web Access: HTTP 16501018 Mehmet KORKMAZ World Wide Web What is WWW? WWW = World Wide Web = Web!= Internet Internet is a global system of interconnected computer
More informationDiscovering Computers Chapter 2 The Internet and World Wide Web
Discovering Computers 2008 Chapter 2 The Internet and World Wide Web Just remember It took 38 years for radio to reach 50 million users 13 years for television to reach 50 million users Less than 4 years
More informationMU2a Authentication, Authorization & Accounting Questions and Answers with Explainations
98-367 MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations Which are common symptoms of a virus infection? (Lesson 5 p 135-136) Poor system performance. Unusually low
More informationPractice Examination 3
Name Date Click here to enter text. Click here to enter text. Pearson BTEC Level 1 / Level 2 First Information and Creative Technology Unit 1: The Online World Practice Examination 3 This practice examination
More informationManagement Information Systems
Telecommunications, the Internet, and Wireless Technology Lecturer: Richard Boateng, PhD. Lecturer in Information Systems, University of Ghana Business School Executive Director, PearlRichards Foundation,
More informationAdministrative Training Mura CMS Version 5.6
Administrative Training Mura CMS Version 5.6 Published: March 9, 2012 Table of Contents Mura CMS Overview! 6 Dashboard!... 6 Site Manager!... 6 Drafts!... 6 Components!... 6 Categories!... 6 Content Collections:
More informationPrinciples of Information Systems textbook: Principles of Information Systems, Sixth Edition. Dr.Amer Alzaidi Department of Information Systems
+ Principles of Information Systems textbook: Principles of Information Systems, Sixth Edition Dr.Amer Alzaidi Department of Information Systems Chapter 4 Telecommunications, the Internet, Intranets, and
More informationUsing the Control Panel
Using the Control Panel Technical Manual: User Guide Creating a New Email Account 3. If prompted, select a domain from the list. Or, to change domains, click the change domain link. 4. Click the Add Mailbox
More informationIT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad
IT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad OCT 21,2016 BS110401050 BS110401050@vu.edu.pk Arslan.arshad01@gmail.com AKMP01 IT430 - E-COMMERCE Midterm Papers
More informationChapter 10: Security and Ethical Challenges of E-Business
Chapter 10: Security and Ethical Challenges of E-Business Learning Objectives Identify several ethical issues in IT that affect employment, individuality, working condition, privacy, crime health etc.
More informationM3-R3: INTERNET AND WEB DESIGN
M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER
More informationNational Training and Education Resource. Authoring Course. Participant Guide
National Training and Education Resource Authoring Course Participant Guide Table of Contents: OBJECTIVES... 4 OVERVIEW OF NTER... 5 System Requirements... 5 NTER Capabilities... 6 What is the SCORM PlayerWhat
More informationChapter 2 The Internet and World Wide Web
Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Discuss the history of the Internet Describe the types of Web sites Explain how to access and connect to the Internet Recognize how Web pages
More informationChapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
More informationWebmail 7.0 is an online client which runs in your web browser. Webmail 7.0 allows you to access your , contact list, and calendar from
Webmail 7.0 is an online email client which runs in your web browser. Webmail 7.0 allows you to access your email, contact list, and calendar from any computer with an internet connection and a web browser.
More informationUsing web-based
Using web-based Email 1. When you want to send a letter to a friend you write it, put it in an envelope, stamp it and put it in the post box. From there the postman picks it up, takes it to a sorting office
More informationBinarytech Digital Education Karta Allahabad ( Notes)
Email Email is a service which allows us to send the message in electronic mode over the internet. It offers an efficient, inexpensive and real time mean of distributing information among people. E-Mail
More informationExtending the Domino System. Powered by Notes. The First Groupware and Server for the Net R E L E A S E
Extending the Domino System Powered by Notes The First Groupware and E-mail Server for the Net R E L E A S E COPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied,
More informationThe Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.
Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,
More informationEthical Hacking and. Version 6. Spamming
Ethical Hacking and Countermeasures Version 6 Module XL Spamming News Source: http://www.nzherald.co.nz/ Module Objective This module will familiarize you with: Spamming Techniques used by Spammers How
More informationRPS Technology Standards Grades 9 through 12 Technology Standards and Expectations
RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations Throughout high school, as students take courses to prepare themselves for college and the working world, they should
More informationGlossary
Glossary www.cybersmart.gov.au/cyberquoll CyberQuoll Internet Safety Education for Primary School Students, Parents Guide Website: www.cybersmart.gov.au/cyberquoll Source: Commonwealth of Australia 2009
More informationIntroduction to TCP/IP
Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP
More informationSEVENTH-DAY ADVENTIST HIGHER SECONDARY SCHOOL 132FT. RING ROAD, HARIPURA, MANINAGAR 08
Class: VII SEVENTH-DAY ADVENTIST HIGHER SECONDARY SCHOOL 132FT. RING ROAD, HARIPURA, MANINAGAR 08 Subject: Computer Science Lessons Annual portion for 2018-19 4. Ethics and Safety Measures in a Computing
More informationSTUDIO 7.0 USER MANUAL
STUDIO 7.0 USER MANUAL 1 Table of Contents Safety Information... 3 Appearance and Key Functions... 4 Introduction... 5 Call Functions... 6 Notifications Bar... 7 Contacts... 8 Messaging... 9 Internet Browser...
More informationLocal area network (LAN) Wide area networks (WANs) Circuit. Circuit switching. Packets. Based on Chapter 2 of Gary Schneider.
Local area network (LAN) Network of computers located close together Wide area networks (WANs) Networks of computers connected over greater distances Based on Chapter 2 of Gary Schneider. (2009). E-Business.
More informationElectronic Communication. Telecommunications 1. Not So Obvious. Examples. Chances Are You Used. What does that tell...
Electronic Communication Telecommunications 1 Introduction to ECEN 1200 Peter Mathys Which examples of electronic communication systems come to your mind? From the time you got up this morning, how many
More informationAPPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.
APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.
More informationChapter 002 The Internet, the Web, and Electronic Commerce
Chapter 002 The Internet, the Web, and Electronic Commerce Multiple Choice Questions 1. Launched in 1969 as a U.S. funded project that developed a national computer network, the Internet was initially
More informationKENDRIYA VIDYALAYA MAHASAMUND
क न द र य व द य लय मह सम द KENDRIYA VIDYALAYA MAHASAMUND MAHASAMUND (C.G.)493445 Session-2017. Unit-I Basic Of Information Technology What is Basic of IT- Information technology (IT) is the application
More informationINFORMATION TECHNOLOGY 402
NAME : CLASS/ SEC : ROLL: SESSION : QUOTE : PART 1: Working With Accessibility Options 1. Accessibility options: These are the options in Windows Operating System which makes handling of computer easy
More informationBEST PRACTICES FOR PERSONAL Security
BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple
More informationTelecommunications 1
Telecommunications 1 Introduction to ECEN 1200 Peter Mathys Electronic Communication Which examples of electronic communication systems come to your mind? From the time you got up this morning, how many
More informationChapter Topics. The History of the Internet. Chapter 7: Computer Networks, the Internet, and the World Wide Web
Chapter Topics Chapter 7: Computer Networks, the Internet, and the World Wide Web CS10051: Intro. to Computer Science Kent State University History of the Internet History of the World Wide Web Internet
More informationComputers: Information Technology in Perspective, 11e
Computers: Information Technology in Perspective, 11e Larry Long and Nancy Long Chapter 3 Going Online Copyright Prentice Hall, Inc. 1 Objectives Once you have read and studied this chapter, you will have
More information6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning
6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories
More informationThe Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.
Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,
More informationIntroduction. Logging in. WebMail User Guide
Introduction modusmail s WebMail allows you to access and manage your email, quarantine contents and your mailbox settings through the Internet. This user guide will walk you through each of the tasks
More informationIntroduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University
Introduction to Computer Science William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Chapter 4: Networking and the Internet No one owns the Internet, and only one
More informationNetworks and Communications MS216 - Course Outline -
Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the
More informationNational Unit Specification: general information. The Internet (Higher) NUMBER DM4F 12. Information Systems (Higher)
National Unit Specification: general information NUMBER DM4F 12 COURSE Information Systems (Higher) SUMMARY This Unit is designed to develop knowledge and understanding of the operating principles of the
More informationFundamentals of Information Systems, Seventh Edition
Fundamentals of Information Systems, Seventh Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets Fundamentals of Information Systems, Seventh Edition 1 An Overview of Telecommunications
More informationJoomla User Guide Ver 3
LiveHelp Server Joomla User Guide Ver 3 Introduction The process of configuration and implementation of the LiveHelp server is divided into four stages, which are detailed below. The approximate time of
More information