TEST BANK FOR ELECTRONIC COMMERCE 11TH EDITION BY GARY SCHNEIDER

Similar documents
Chapter 02 Technology Infrastructure The Internet and the World Wide Web

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Full file at

Full file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Local area network (LAN) Wide area networks (WANs) Circuit. Circuit switching. Packets. Based on Chapter 2 of Gary Schneider.

E-Business Tenth Edition. Chapter 2 E-Business Technology Basics

The Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP)

Objectives. Connecting with Computer Science 2

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

The Internet and the World Wide Web

From administrivia to what really matters

E-Commerce. Infrastructure I: Computer Networks

Typical Network Uses

Special expressions, phrases, abbreviations and terms of Computer Networks

A network is a group of two or more computers that are connected to share resources and information.

ACE Chapter 4 review. Name: Class: Date: True/False Indicate whether the statement is true or false.

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

and the World Wide Web

HTML, XHTML, and CSS. Sixth Edition. Chapter 1. Introduction to HTML, XHTML, and

Chapter 7. Telecommunications, the Internet, and Wireless Technology

Web Engineering (CC 552)

Technology in Action. Chapter 13 Behind the Scenes: The Internet: How It Works Prentice-Hall, Inc.

Business Data Communications and Networking

The Basics of Networking

How the Web Works. Chapter 1. Modified by Marissa Schmidt Pearson

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.

Technology in Action. Chapter 13 Behind the Scenes: The Internet: How It Works. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

Business Data Communications and Networking

Chapter 11: Wide-Area Networks and the Internet

DOCUMENTS ON WEB. Learning Units. V. Rajaraman The internet and the world wide web Documents and the world wide web MODULE 11

The Internet and the Web. recall: the Internet is a vast, international network of computers

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

Outline. Internet and World Wide Web. History of the Internet. What is the Internet? How Does Data Travel Through the Internet?

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet

Introduction to TCP/IP

Web Information System Design. Tatsuya Hagino

INFS 321 Information Sources

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

A Balanced Introduction to Computer Science, 3/E David Reed, Creighton University 2011 Pearson Prentice Hall ISBN

CPET 499/ITC 250 Web Systems. Topics

Scale Yourself. Lesson 3: Introduction to Internet Technology. Computer Technology 3/13/2015

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

Overview of the Internet

The Internet and How It Works 12 11/21/2016. Define what a computer network is, and how networks are conceptually structured.

Chapter Ten. From Internet to Information Superhighway

Chapter 8. Network Troubleshooting. Part II

Fundamentals of Information Systems, Seventh Edition

M3-R3: INTERNET AND WEB DESIGN

CPS221 Lecture: Introduction to Net-Centric Computing

Internet: a network of network

THE UNIVERSITY OF AUCKLAND

Contents 1 INTRODUCTION TO COMPUTER NETWORKS...

8 9 Before: Computers are categorized into three main categories from least to most powerful: microcomputers minicomputers mainframe computers Today:

Chapter 2A. The Internet s History

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Connecting with Computer Science Chapter 5 Review: Chapter Summary:

INTRODUCTION TO ICT.

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Chapter 4: Networking and the Internet

CPEG514 Advanced Computer Networks. Atef Abu Salim University of Nizwa Spring 2013/2014

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Chapter 2 Communicating Over the Network

Network Devices,Frame Relay and X.25

Department of Engineering Science. EE442 Analog & Digital Communication Networks Lecture 14 Data Communication Networks

The Internet and the World Wide Web. CIT 230 Web Design

Using the Internet and the World Wide Web

2. A collection of interconnected networks is called an internetwork. 3. Each machine is connected to a central hub with a point-to-point connection.

Chapter Motivation For Internetworking

INFORMATION TECHNOLOGY CONCEPTS (391) OPEN EVENT

Local Area Networks; Ethernet

Communicating over the Network

Networking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1

"The Internet. All the piracy and none of the scurvy." -- Anonymous

Lecture-4. TCP/IP-Overview:

Introduction to the Internet and Web

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

CS WEB TECHNOLOGY

Chapter 7. Local Area Network Communications Protocols

Additional Material. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Information Network I/No.

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Lecture 2. Computer Networks Models. Network Models 1-1

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.

Network Fundamentals Chapter 2 Modified by Tony Chen 05/20/2008

VoIP / RoIP for Technicians

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

Module 9: TCP/IP Protocol Suite and IP Addressing

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

Transcription:

TEST BANK FOR ELECTRONIC COMMERCE 11TH EDITION BY GARY SCHNEIDER Link download full: https://testbankservice.com/download/test-bank-forelectronic-commerce-11th-edition-by-schneider/ Chapter 02: Technology Infrastructure: The Internet and the World Wide Web 1. Networks of computers and the Internet that connects them to each other form the basic technological structure that underlies virtually all electronic commerce. ANSWER: True LEARNING OBJECTIVES: 02.01 2. The USENET was the earliest of the networks that eventually combined to become what we now call the Internet. ANSWER: False LEARNING OBJECTIVES: 02.01 3. E-mail was born in 1972 when a researcher wrote a program that could send and receive messages over the Defense Department network. ANSWER: True LEARNING OBJECTIVES: 02.01

KEYWORDS: Bloom's: Comprehension 4. The first e-mail mailing lists appeared on military and education research networks. ANSWER: True LEARNING OBJECTIVES: 02.01 5. A network of computers that are located in the same building is called a wide area network. ANSWER: False 6. The Internet provides a high degree of security in its basic structure. ANSWER: False 7. Extranets were used to save money and increase efficiency by replacing traditional communication tools such as fax, telephone, and overnight express document carriers.

ANSWER: True KEYWORDS: Bloom's: Comprehension 8. An intranet extends beyond the organization that created it. ANSWER: False 9. The word "virtual," used as part of virtual private networks means that the network connection is permanent. ANSWER: False Chapter 02: Technology Infrastructure: The Internet and the World Wide Web 10. Virtual private network software must be installed on the computers at both ends of a transmission. ANSWER: True

11. Public networks, private networks, and VPNs are independent of organizational boundaries. ANSWER: True 12. IP addresses appear as five decimal numbers separated by periods. ANSWER: False LEARNING OBJECTIVES: 02.04 13. Simple Mail Transfer Protocol (SMTP) is a common protocol used for sending and retrieving e-mail. ANSWER: POINTS: DIFFICULTY: LEARNING OBJECTIVES: NATIONAL STANDARDS:

KEYWORDS: 14. Post Office Protocol (POP) allows the user to view only the header and the e- mail sender s name before deciding to Chapter 02: Technology Infrastructure: The Internet and the World Wide Web download the entire message. ANSWER: False 15. The Post Office Protocol (POP) provides support for Multipurpose Internet Mail Extensions (MIME). ANSWER: True

16. At a technological level, the Web is nothing more than software that runs on computers that are connected to the Internet. ANSWER: True 17. The Semantic Web project envisions words on Web pages being tagged with their meanings. ANSWER: True LEARNING OBJECTIVES: 02.08 18. An HTML document is similar to a word-processing document in that it specifies how a particular text element will appear. ANSWER: False KEYWORDS: Bloom's: Comprehension

19. The leftmost part of a domain name is called a top-level domain (TLD). ANSWER: False LEARNING OBJECTIVES: 02.04 20. The Internet Corporation for Assigned Names and Numbers (ICANN) has the responsibility of managing domain names and coordinating them with the IP address registrars. ANSWER: True LEARNING OBJECTIVES: 02.04 NATIONAL STANDARDS: United States - BUSPROG: Analytic 21. The most important parts of a Web page are the graphics, photographs, and small programs that run in the Web browser. ANSWER: False

22. SGML offers a system of marking up documents that is independent of any software application. ANSWER: True 23. The term "cascading" is used in cascading style sheets because designers can apply many style sheets to the same Web page, one on top of the other. ANSWER: True KEYWORDS: Bloom's: Comprehension 24. The higher the bandwidth, the faster the transmission of data through a communication medium. ANSWER: True LEARNING OBJECTIVES: 02.07 KEYWORDS: Bloom's: Comprehension

25. A hierarchical hyperlink structure resembles conventional paper documents in that the reader begins on the first page and clicks the Next button to move to the next page in a serial fashion. ANSWER: False LEARNING OBJECTIVES: 02.06 26. The combination of telephone lines and the closed switches that connect them to each other is called a. a. LAN b. WAN c. circuit d. pathway ANSWER: c LEARNING 02.02OBJECTIVES: NATIONALSTANDARDS: United States - BUSPROG: Technology 27. Files and e-mail messages sent over the Internet are broken down into small pieces called. a. messages b. switches c. circuits d. packets ANSWER: d DIFFICULTY: Moderate LEARNINGOBJECTIVES: 02.02 NATIONAL STANDARDS: United States -BUSPROG: Technology KEYWORDS: Bloom's: Comprehension

28. The computers that decide how best to forward each packet from one network to another are called. a.switches b. bridges c. routers d. repeaters ANSWER: c 29. The programs on gateway computers that determine the best path on which to send each packet contain rules called. a. program profilers b. empirical algorithms c. software profilers d. routing algorithms ANSWER: d 30. A is a permanent telephone connection between two points. a.dedicated line b. party line c. leased line d. local line ANSWER: c 31. creates a private passageway through the public Internet that provides secure transmission from one computer to another. a. IP tunneling b. Circuit switching c. Encapsulation d. Subnetting ANSWER: a

32. is a connection that uses public networks and their protocols to send data using a technology called IP tunneling. a. A personal area network b. The Internet c. A virtual private network d. The World Wide Web ANSWER: c 33. A is a collection of rules for formatting, ordering, and error checking data sent across a network. a. style sheet b. semantic c. protocol d. packet ANSWER: c 34. determine how a sending device indicates that it has finished sending a message and how the receiving device indicates that it has received the message. a. Routers b. Semantics c. Protocols d. Switches ANSWER: c KEYWORDS Bloom's: Knowledge:

35. The 32-bit number used to identify computers connected to the Internet is known as the. a. IP address b. NSAP address c. MAC address d. OUI address ANSWER: a LEARNING OBJECTIVES: 02.04 36. specifies the format of a mail message and describes how mail is to be administered on the e-mail server and transmitted on the Internet. a. Multipurpose Internet Mail Extensions (MIME) b. Simple Mail Transfer Protocol (SMTP) c. Interactive Mail Access Protocol (IMAP) d. Post Office Protocol (POP) ANSWER: b 37. In subnetting, a computer called a device converts private IP addresses into normal IP addresses when it forwards packets from those computers to the Internet. a. Network Address Translation (NAT) b. Network Interface Controller (NIC) c. Generic Routing Encapsulation (GRE) d. Data CircuitTerminating (DCE) ANSWER: a LEARNING OBJECTIVES: 02.04

38. The combination of a protocol name and a domain name is called a(n). a. Uniform Resource Locator (URL) b. Internationalized Resource Identifier (IRI) c. Extensible Resource Descriptor Sequence(XRDS) d. Extensible Resource Identifier (XRI) ANSWER: a LEARNINGOBJECTIVES: 02.04 NATIONALSTANDARDS: United States - BUSPROG: Technology 39. IPv6 uses a number for addresses. a.32-bit b.56-bit c.128-bit d.48-bit ANSWER: c LEARNINGOBJECTIVES: 02.04 40. The purpose of a(n) is to respond to requests for Web pages from Web clients. a. DNS server b. e-mail server c. Web server d. database server ANSWER: c 41. is a set of rules for handling binary files, such as word-processing

documents, spreadsheets, photos, or sound clips that are attached to e-mail messages. a. SMTP b. TCP/IP c. MIME d. POP ANSWER: c 42. A newer e-mail protocol that performs the same basic functions as POP, but includes additional features, is known as. a. IMAP b. SMTP c. POP3 d. TCP ANSWER: a 43. lets users create and manipulate e-mail folders and individual e-mail messages while the messages are still on the e-mail server. a.pop b.smtp c.imap d.mime ANSWER: c KEYW ORDS: Bloom's: Knowledge 44. A structure resembles an inverted tree in which the root is at the top and the branches are below it.

a. parabolic hyperlink b. hierarchical hyperlink c. rooted hyperlink d. linear hyperlink ANSWER: b LEARNING OBJECTIVES: 02.06 45. A(n) has a hypertext reference (HREF) property, which specifies the remote or local document s address. a.closing tag b. paragraph tag c.opening tag d. bold tag ANSWER: c LEARNING OBJECTIVES: 02.06 46. HTML was developed by. a. Robert Kahn b. Vinton Cerf c. Ted Nelson d. Tim Berners-Lee ANSWER: d

47. was the first Web browser that became widely available for personal computers. a.mosaic b. Netscape c. Internet Explorer d. CompuServe ANSWER: a NATIONALnSTANDARDS: United States - BUSPROG: Technology 48. are sets of words that are assigned to specific IP addresses. a.domain names b. URLs c. Octets d. Headers ANSWER: a LEARNING OBJECTIVES: 02.04 49. The early versions of let Web page designers create text-based electronic documents with headings, title bar titles, bullets, lines, and ordered lists. a.http b.html c.sgml d.xml ANSWER: b

50. In HTML, hyperlinks are created using the HTML tag. a. head b. anchor c. title d. opening ANSWER: b LEARNINGOBJECTIVES: 02.06 NATIONALSTANDARDS:United States -BUSPROG: Technology 51. A(n) is any technology that allows people to connect computers to each other. ANSWER: computer network LEARNING OBJECTIVES: 02.01 52. A computer network which uses a specific set of rules and connects networks all over the world to each other is called the. ANSWER:Internet POINTS:1 DIFFICULTY:Easy LEARNING OBJECTIVES: 02.01 53. is a subset of the computers on the Internet that are connected to one another in a specific way that makes them and their contents easily accessible to each other. ANSWER: World Wide Web (WWW)

LEARNING OBJECTIVES: 02.01 54. A(n) is an e-mail address that forwards any message it receives to any user who has subscribed to the list. ANSWER: mailing list LEARNING OBJECTIVES: 02.01 55. In 1979, a group of students and programmers at Duke University and the University of North Carolina started, which allows anyone who connects to the network to read and post articles on a variety of subjects. ANSWER: Usenet User's News Network User's News Network (Usenet) LEARNING OBJECTIVES: 02.01 56. Usenet survives on the Internet today, with more than 1000 different topic areas that are called. ANSWER:newsgroups POINTS:1 DIFFICULTY:Easy LEARNING OBJECTIVES: 02.01

57. Internet are computers that are directly connected to the Internet. ANSWER:hosts POINTS:1 DIFFICULTY:Easy LEARNING OBJECTIVES: 02.01 58. Companies known as sell Internet access rights directly to larger customers and indirectly to smaller firms and individuals through other companies, called ISPs. ANSWER: network access providers LEARNING OBJECTIVES: 02.01 NATIONAL STANDARDS: United States - BUSPROG: Analytic 59. The subset of the Internet that includes computers and sensors connected to each other for communication and automatic transaction processing is called the. ANSWER: Internet of Things LEARNING OBJECTIVES: 02.01 60. A(n) is a set of standards that defines, in detail, the relationships among resource description framework (RDF) standards and specific extensible markup language (XML) tags within a particular knowledge domain. ANSWER:ontology POINTS:1 DIFFICULTY:Easy LEARNING OBJECTIVES: 02.08

61. A group of network research scientists from nearly 200 universities and a number of major corporations joined together in 1996 to recapture the original enthusiasm of the ARPANET and created an advanced research network called. ANSWER:Internet2 POINTS:1 DIFFICULTY:Easy LEARNING OBJECTIVES: 02.08 62. A(n) is used when the Internet extends beyond the boundaries of an organization and includes networks of other organizations. ANSWER:extranetPOINTS:1 DIFFICULTY:Easy 63. The controls the disassembly of a message or a file into packets before it is transmitted over the Internet, and itchapter 02: Technology Infrastructure: The Internet and the World Wide Web controls the reassembly of those packets into their original formats when they reach their destinations. ANSWER: Transmission Control Protocol TCP Transmission Control Protocol (TCP) 64. The in TCP/IP specifies the addressing details for each packet, labeling each with the packet's origination and destination addresses. ANSWER: Internet Protocol IP Internet Protocol (IP)

65. The set of rules for delivering Web page files over the Internet is in a protocol called the. ANSWER: Hypertext Transfer Protocol (HTTP) 66. A(n) is a computer that stores files written in HTML. ANSWER: hypertext server 67. A(n) is a language that can be used to define other languages. ANSWER:metalanguagePOINTS:1 DIFFICULTY:Easy 68. HTML, XML, and XHTML have descended from the original specification ANSWER: Standard Generalized Markup Language (SGML) Standard Generalized Markup Language SGML

69. In HTML, the text elements that are related to each another are called elements. ANSWER:hypertext POINTS:1 DIFFICULTY:Easy 70. A(n) hyperlink structure resembles conventional paper documents in that the reader begins on the first page and clicks a Next button to move to the next page in a serial fashion. ANSWER:linear POINTS:1 DIFFICULTY:Easy LEARNING OBJECTIVES: 02.06 71. A(n) is a set of instructions that gives Web developers more control over the format of displayed pages. ANSWER: style sheet LEARNING OBJECTIVES: 02.06 NATIONAL STANDARDS: United States - BUSPROG: Technology 72. uses paired start and stop tags in much the same way as database software defines a record structure. ANSWER: XML

Extensible Markup Language (XML)Extensible Markup Language 73. tags convey the meaning (the semantics) of the information included within them. ANSWER: Extensible Markup Language (XML) Extensible Markup Language XML 74. is the amount of data that can travel through a communication medium per unit of time. ANSWER:Bandwidth POINTS:1 DIFFICULTY:Easy LEARNING OBJECTIVES: 02.07 75. is a measure of the amount of information that can travel from a user to the Internet in a given amount of time. ANSWER: Upstream bandwidth Upload bandwidth LEARNING OBJECTIVES: 02.07

76. Describe the process of routing packets in a network. ANSWER: As an individual packet travels from one network to another, the computers through which the packet travels determine the most efficient route for getting the packet to its destination. The most efficient route changes from second to second, depending on how much traffic each computer on the Internet is handling at each moment. The computers that decide how to best forward each packet are called routing computers, router computers, routers, gateway computers (because they act as the gateway from a LAN or WAN to the Internet), border routers, or edge routers (because they are located at the border between the organization and the Internet or at the edge of the organization.) The programs on the routers that determine the best path on which to send each packet contain rules called routing algorithms. The programs apply these algorithms to information they have stored in routing tables or configuration tables. This informationincludes lists of connections that lead to particular groups of other routers, rules that specify which connection to use first, and rules for handling instances of heavy packet traffic and network congestion. DIFFICULTY: Moderate KEYWORDS: Bloom's: Comprehension 77. What is the difference between a public network and a private network? ANSWER: A public network is any computer network or telecommunications network that is availablechapter 02: Technology Infrastructure: The Internet and the World Wide Web to the public. The Internet is one example of a public network. Public networks such as the Internet do not provide much security as part of their basic structures. A private network is a leased-line connection between two companies that physically connects their computers and/or networks to one another. A leased line is a permanent telephone connection between two points. Unlike the telephone circuit connection you create when you

dial a telephone number, a leased line is always active. The advantage of a leased line is security. Only the two parties that lease the line to create the private network have access to the connection. DIFFICULTY: Moderate KEYWORDS: Bloom's: Comprehension 78. Identify the four key rules for message handling. ANSWER: The open architecture philosophy developed for the evolving ARPANET, which later became the core of the Internet, included the use of a common protocol for all computers connected to the Internet and four key rules for message handling: 1) Independent networks should not require any internal changes to be connected to the network. 2) Packets that do not arrive at their destinations must be retransmitted from their source network. 3) Router computers act as receive-and-forward devices; they do not retain information about the packets that they handle. 4) No global control exists over the network. 79. Describe the two main protocols used by the Internet.ANSWER: The Internet uses two main protocols: the Transmission Control Protocol (TCP) and the Internet Protocol (IP). The TCP controls the disassembly of a message or a file into packets before it is transmitted over the Internet, and it controls the reassembly of those packets into their original formats when they reach their destinations. The IP specifies the addressing details for each packet, labeling each with the packet s origination and destination addresses.

80. What are the advantages of Bluetooth technology? ANSWER: One major advantage of Bluetooth technology is that it consumes very little power, which is an important consideration for many devices. Another advantage is that Bluetooth devices can discover each other and exchange information automatically. For example, a person using a laptop computer in a temporary office can print to a local Bluetoothenabled printer without logging in to the network or installing software on either device. The printer and laptop computer electronically recognize each other as Bluetooth devices and can immediately begin exchanging information. DIFFICULTY: Moderate LEARNING OBJECTIVES: 02.07 KEYWORDS: Bloom's: Comprehension