STUDY GUIDE CHAPTER 7

Similar documents
Unit 4 The Web. Computer Concepts Unit Contents. 4 Web Overview. 4 Section A: Web Basics. 4 Evolution

CSC Introduction to Computers and Their Applications

11 Web Technology 12 Web Technology <A HREF> tag specifies the information necessary to display the links that allow you to jump to related Web pages

EEC-682/782 Computer Networks I

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 002 The Internet, the Web, and Electronic Commerce

Using the Internet and the World Wide Web

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.

Full file at

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Full file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy

Lesson 4: Web Browsing

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Discovering Computers Chapter 2 The Internet and World Wide Web

Discovering Computers Chapter 2 The Internet and World Wide Web

The process by which a user can associate specific permissions to each username.

CHAPTER2. 1. The Internet was launched in 1969 and was originally called

WEBppliance for Windows User Administrator's Help

= a hypertext system which is accessible via internet

Outline. Web browsers & Web servers

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES. Specimen Answers

An Overview of Webmail

Chapter 27 WWW and HTTP Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

CS WEB TECHNOLOGY

The Ultimate Digital Marketing Glossary (A-Z) what does it all mean? A-Z of Digital Marketing Translation

3. WWW and HTTP. Fig.3.1 Architecture of WWW

Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number:

Web Design and Development ACS-1809

Instructions for Configuring Your Browser Settings and Online Security FAQ s

WEB TECHNOLOGIES CHAPTER 1

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ

CMPE 151: Network Administration. Servers

Web Programming Paper Solution (Chapter wise)

Web Engineering (CC 552)

ACE Chapter 4 review. Name: Class: Date: True/False Indicate whether the statement is true or false.

8 9 Before: Computers are categorized into three main categories from least to most powerful: microcomputers minicomputers mainframe computers Today:

Chapter 1 Introduction to HTML, XHTML, and CSS

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

Introduction. Logging in. WebMail User Guide

Internet. Class-In charge: S.Sasirekha

Network Applications Principles of Network Applications

Impact. Course Content. Objectives of Lecture 2 Internet and WWW. CMPUT 499: Internet and WWW Dr. Osmar R. Zaïane. University of Alberta 4

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies

World Wide Web. Hypertext

Republicbank.com Supported Browsers and Settings (Updated 03/12/13)

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

Web Standards. Web Technologies. Web Standards. URI and URL

Web Hosting Control Panel

Chapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts

Information Retrieval Spring Web retrieval

Technology in Action Complete, 13e (Evans et al.) Chapter 3 Using the Internet: Making the Most of the Web's Resources

KENDRIYA VIDYALAYA MAHASAMUND

VISUAL SUMMARY ACCESS INTERNET AND WEB. The Internet, the Web, and Electronic Commerce

Instructions For Configuring Your Browser Settings and Online Banking FAQ's

Resource:

Chapter 2 The Internet and World Wide Web

Technology In Action, Complete, 14e (Evans et al.) Chapter 3 Using the Internet: Making the Most of the Web's Resources

Skill Area 209: Use Internet Technology. Software Application (SWA)

Global Servers. The new masters

This document is for informational purposes only. PowerMapper Software makes no warranties, express or implied in this document.

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

Pinnacle Cart User Manual v3.6.3

BrainCert Enterprise LMS. Learning Management System (LMS) documentation Administrator Guide Version 3.0

e-commerce Study Guide Test 2. Security Chapter 10

Chapter 2 The Internet and World Wide Web

GRANDSTREAM PRIVACY STATEMENT

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

Introduction to the Internet and World Wide Web p. 1 The Evolution of the Internet p. 2 The Internet, Intranets, and Extranets p. 3 The Evolution of

Policy Settings for Windows Server 2003 (including SP1) and Windows XP (including SP2)

[Frequently Asked Questions] Accommodation Booking Website

QuestionPoint chat The Guide to IE browser setup Last updated: 2013 Nov 12

Jeff Offutt SWE 642 Software Engineering for the World Wide Web

Hostopia WebMail Help

CUSTOMER CONTROL PANEL... 2 DASHBOARD... 3 HOSTING &

USING THE INTERNET AND THE WORLD WIDE WEB RAYMOND ROSE

ANAND COMMUNICATION CARE M 342, RAGHUBIR NAGAR, NEW DELHI

CS 120 Digital Literacy, Chapter 5: p

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery

CONTENTS. Internet Basics. Internet Explorer. Search Engines. . Advantages and Disadvantages of the Internet. Some good websites

INTERNET ENGINEERING. HTTP Protocol. Sadegh Aliakbary

Internet Client-Server Systems 4020 A

The internet and the web

IT1403: Internet and World Wide Web Multiple Choice Question Paper

Fundamentals of Information Systems, Seventh Edition

11_Mitchell_indexFinal.qxd 8/25/06 10:18 AM Page 195 Index

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

Principles of Information Systems textbook: Principles of Information Systems, Sixth Edition. Dr.Amer Alzaidi Department of Information Systems

World Wide Web. Before WWW

UNIVERSITY OF NORTH CAROLINA WILMINGTON

Secure Recipient Guide

Tennessee. Trade & Industrial Course Web Page Design II - Site Designer Standards. A Guide to Web Development Using Adobe Dreamweaver CS3 2009

1. Web Technology... 6

Tennessee. Business Technology Course Code Web Design Essentials. HTML Essentials, Second Edition 2010

Getting Started Guide. Prepared by-fatbit Technologies

Table of Contents... ii. Go Ahead Bring Your Own Device to Work... 1 Requirements... 1

Internet Crimes Against Children:

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

Review for Internet Introduction

Transcription:

STUDY GUIDE CHAPTER 7 True/False Indicate whether the statement is true or false. 1. Every Web page has a unique address called a(n) Uniform Resource Locator. 2. Web 3.0 refers to innovations like cloud computing and other new technologies likely to further change the way we use the Web. 3. The current version of HTML, HTML 4.01, was introduced in 2010. 4. The file name for a Web site s main page, like www.cnn.com, is usually short and to the point. 5. HTML documents use special instructions, called HTML logos, that specify how the document should appear when displayed on a computer screen or printed. 6. ActiveX controls use digital licenses to increase their security by including an electronic attachment to a file that verifies the identity of its source. 7. A Web indexer is a computer program that is automated to methodically visit Web sites. 8. Online auctions are examples of B2G e-commerce. 9. In a POP3 e-mail system, your messages remain on a Web server, rather than being downloaded to your computer. 10. A Flash cookie is typically a 1x1 pixel graphic embedded in a Web page or e-mail message designed to track who is reading the Web page or e-mail message. 11. A spam filter captures unsolicited e-mail messages before they reach your inbox. 12. An ActiveX control is a compiled computer program that can be referenced from within an HTML document, downloaded, installed on your computer, and executed within a browser window. 13. When typing a URL, the http:// usually can be omitted. 14. All modern browsers can handle the GIF, JPEG, PDF, and SWF file formats without additional software. 15. HTML is called a markup language because authors mark up their documents by inserting HTML tags, which represent special instructions that specify how the document should appear when displayed on a computer screen or printed. 16. HTTP is a markup language that works with TCP/IP to deliver Web resources to the desktop. 17. The term player is sometimes used to refer to plug-ins, but it also can refer to standalone software that does not require a host program. 18. Any server that creates a cookie on your hard drive can request that cookie the next time your browser is accessing a Web page from the Web site server. 19. The framework for an HTML document consists of two sections: a head and a body. 20. Scripts were designed to replace normal HTML. 21. An ActiveX control is a full-fledged program, which gives it the potential to include a routine that alters or deletes files from your computer s hard disk.

22. Researchers estimate that the most extensive search engines cover less than 20% of the Web. 23. Many search engines keep records of your queries. 24. A C2C e-commerce transaction occurs when individual consumers purchase goods and services from online merchants. 25. P2P provides a secure connection for Web-based transactions. 26. E-mail is based on store-and-forward technology. 27. When configuring local e-mail, the incoming and outgoing servers must have the same settings. 28. A conversion process called MIME provides a clever way of disguising digital photos, sounds, and other media as plain ASCII code that can travel over the Internet as e-mail attachments. 29. Netiquette is online jargon for Internet etiquette. 30. If you turn off cookies, you may not be able to make online purchases at some sites. 31. As users are frequently deleting or blocking conventional cookies, marketers are turning to Flash cookies to track and target customers. Multiple Choice Identify the choice that best completes the statement or answers the question. 32. Suppose you create an HTML document and post it at your Web site. Can you expect it to show up in a Google search? a. Yes, but it might take several days before c. No. Only commercial sites are indexed it is discovered by a Google crawler and and appear in Google searches. sent to the search engine indexer. b. Yes, but you would have to go to the Google site and fill out a notification form and agree to the online EULA. d. No. Google's Web crawler will never find your Web site; so many sites are being created everyday that Google can only keep up with modifications made to the sites it currently indexes. 33. Once your browser has received a "Set-cookie" message from a Web server. a. the cookie is stored on your computer's c. you can view the cookie file, though its hard disk contents are typically encrypted b. the server that created the cookie can d. all answers are correct request it the next time you connect to one of its Web pages 34. If you are curious about how a Web page is constructed, you can. a. use your browser to extract a list of HTML c. request the HTTP from the Web server tags from the document socket that houses the Web page b. use an HTML reverse compiler to load the d. use your browser to view the HTML source code into your word processor source document

35. A Web page you view about a newly released CD on Amazon.com is probably. a. assembled on the fly from a database c. written with a word processor and stored as a document on a Web server b. created by a series of hypertext links d. collecting the requested information and transmitting it back in a format that the browser can display 36. The Web is a collection of document, image, video, and sound files that can be linked and accessed over the Internet. Where did the concept of interlinking documents to access them originate? a. Tim Berners-Lee's Mosaic browser c. The Soviet Union's Sputnik program b. Vannevar Bush's Memex and Ted Nelson's d. Marc Andreessen's HTML mail hypertext 37. A HTTP connection reuses the same HTTP connection to send and receive multiple requests. a. recycled c. dual b. persistent d. socketless 38. When you're using a search engine, the words you enter for your search are referred to as. a. keywords c. search criteria b. search terms d. all answers are correct 39. Which of the following Web-based applications is NOT sometimes characterized as Web 2.0? a. wikis c. social networking b. blogs d. cloud computing 40. A(n) is a collection of related information organized and formatted so it can be accessed using software called a browser. a. Web site c. podcast b. Internet d. tag 41. Visitors to a Web site are sometimes called Web. a. browsers c. surfers b. servers d. users 42. Examples of Uniform Resource Identifiers include. a. URLs c. ISBNs b. Social Security numbers d. all answers are correct 43. A(n) is client software that displays Web page elements and handles links between pages. a. explorer c. navigator b. browser d. manager 44. Which of the following is a Web resource? a. an HTML document c. a graphic b. a sound file d. all answers are correct 45. For HTTP, usually are associated with port 80 on the client and server. a. exchanges c. sockets b. methods d. actions 46. is the most frequently used HTTP method. a. FTP c. POST b. THIS d. GET

47. is a protocol that works in conjunction with TCP/IP to get Web resources to your desktop. a. HTML c. HTTP b. URL d. FTP 48. An HTTP exchange takes place over a pair of. a. sockets c. switches b. packets d. networks 49. A HTTP connection reuses the same HTTP connection to send and receive multiple requests. a. status c. server b. port-based d. persistent 50. A Web server s response to a browser s request includes an HTTP that indicates whether the browser s request could be fulfilled. a. socket code c. status code b. protocol code d. completion code 51. When your browser fetches pages and graphics to form a Web page, it stores them in temporary files on your hard drive called a Web. a. cache c. converter b. plug-in d. source 52. All of the following are currently popular browsers EXCEPT. a. Firefox c. Safari b. Chrome d. Netscape Navigator 53. allow a Web site to store information on the client computer for later retrieval. a. Tags c. Biscuits b. Cookies d. Labels 54. A enables a Web server to keep track of your activity and compile a list of your purchases. a. cookie c. socket b. plug-in d. style sheet 55. A(n) adds HTML tags to a document, spreadsheet, or other text-based file to create an HTML document that can be displayed by a browser. a. online Web authoring tool c. HTML conversion utility b. Web authoring software program d. wiki 56. provides tools specifically designed to enter and format Web page text, graphics, and links. a. A text editor c. Web Creator b. Web authoring software d. W3C 57. A(n) is a series of instructions that is embedded directly into an HTML document that instruct the browser to carry out specific actions or to respond to specific user actions. a. HTML tag c. podcast b. HTML script d. cookie 58. HTML are typically used to collect shipping and payment information during checkout at an e-commerce Web site. a. bins c. gateways b. tables d. forms 59. Server-side scripts can be written using any of the following EXCEPT. a. Perl c. Java b. C# d. Ada

60. Applications written in the Java programming language are called Java. a. frames c. applets b. servlets d. fragments 61. A(n) is a compiled computer program that can be referenced from within an HTML document, downloaded, installed on your computer, and executed within the browser window. a. JAVA applet c. HTML tag b. ActiveX control d. HTML form 62. A(n) certificate is an electronic attachment to a file that verifies the identity of its source. a. authentication c. analog b. digital d. authority 63. A(n) helps people locate information on the Web by formulating simple keyword queries. a. navigator c. search engine b. browser d. HTML tag 64. A Web, automated to methodically visit Web sites, can be programmed to perform various activities as it visits those sites. a. converter c. archive b. crawler d. glossary 65. Search engine software is designed to pull keywords from a Web page and store them in a database. a. indexer c. archive b. crawler d. tracker 66. A search engine s looks for your search terms in the search engine s indexed database and returns a list of relevant Web sites. a. query processor c. Web crawler b. link d. indexer 67. A(n) keyword is entered into a header section of a Web page when it is created and is supposed to describe the page contents. a. query c. archive b. link d. meta 68. When a Web page author includes meta keywords, like sex, that have little to do with the information on the page, the author is engaging in. a. formulating searches c. keyword stuffing b. metasearching d. e-commerce 69. Keyword is an unethical practice in which meta keywords are manipulated to gain high relevancy rankings. a. packing c. archiving b. stuffing d. indexing 70. The wildcard character allows a search engine to find pages with any derivation of a basic word. a. + c. * b. & d. $ 71. In addition to using search engines, you can also find Web-based information using a(n) engine that searches a series of other search engines and compiles the search results. a. compiled c. metasearch b. stuffed d. secure

72. When you use a search engine, it stores all of the following information about your query EXCEPT. a. your name c. the date and time of the query b. your IP address d. the search terms you used 73. Many sites act as relay stations to forward your searches to search engines without leaving a trail back to a cookie or IP address. a. pharming c. annihilator b. anonymizer d. phishing 74. When you purchase a textbook online from a site like www.amazon.com, you are participating in e-commerce. a. C2C c. B2B b. B2C d. B2G 75. When you purchase a used digital camera directly from the owner on an online auction, you are participating in e-commerce. a. C2C c. B2B b. B2C d. B2G 76. e-commerce involves one enterprise buying goods or services from another enterprise. a. C2C c. B2B b. B2C d. B2G 77. e-commerce occurs when businesses sell to governments. a. G2B c. C2G b. B2G d. G2G 78. A ad overlays the content on a Web page, sometimes obscuring it until you click the ad or its timer expires and the ad disappears. a. banner c. pop-up b. hover d. click-through 79. Both SSL and its successor,, are protocols that encrypt data traveling between a client computer and an HTTP server. a. TLS c. P2P b. S-HTTP d. EDGE 80. Which of the following checks a Web server s security certificate to determine if the site is legitimate? a. XML c. HTTPS b. TLS d. P2P 81. Which of the following statements is NOT true? a. Secure connections differ from secure Web sites. b. A secure connection encrypts the data transmitted between your computer and a Web site. c. A secure Web site uses password security to prevent unauthorized access to pages on the site. d. Web pages that provide a secure connection start with httpx: instead of http:. 82. PayPal is a pioneering example of a(n) payment system. a. B2B (business-to-business) c. electronic wallet b. P2P (person-to-person) d. C2B (consumer-to-business) 83. Incoming mail can be stored on a(n) server until it is downloaded to the inbox on your hard disk. a. Webmail c. IMAP b. POP3 d. SMTP

84. is similar to POP3, but it leaves messages on the server until you specifically delete them. a. SMTP (Simple Mail Transfer Protocol) b. IMAP (Internet Messaging Access Protocol) c. PIN (Private Identification Number) d. URL (Uniform Resource Locator) 85. To use local e-mail you must install e-mail software on your computer. a. server c. resource b. database d. client 86. In a classic Webmail configuration, messages are sent immediately and thus a(n) is not needed. a. server c. inbox b. client d. outbox 87. Webmail allows you to use a(n) to access and view your e-mail messages. a. operating system c. browser b. server d. crawler 88. An e-mail message in format can include graphics in addition to a wide variety of fonts and font colors. a. HTML c. ASCII b. MIME d. RTF 89. When working with mail, make sure your antivirus software is checking incoming messages. a. MIME c. ASCII b. HTML d. RTF 90. Before sending a large attachment in an e-mail, you can use a(n) to shrink it. a. crawler program c. netiquette scanner b. compression program d. index utility 91. Which of the following may pose a threat to your computer s security and/or your privacy? a. Flash cookies c. ad-serving cookies b. Web bugs d. all answers are correct 92. software is a type of security software designed to identify and neutralize Web bugs, ad-serving cookies, and other types of malware. a. Antivirus c. Antispyware b. Crawler d. Indexer 93. Flash can collect and store personal data, such as a user s name or the user s progress in a game. a. cookies c. icons b. bugs d. indices 94. You can manually delete Flash cookies from your computer after locating the file in which they are stored. a. Flash cookies c. Global Storage Settings b. #Shared Objects d. anonymous proxy 95. When you view a page infested with a(n), an HTTP set-cookie request automatically goes to a third-party server, which may set a cookie on your computer for later retrieval or record your IP address. a. Flash cookie c. Web bug b. anonymous proxy server d. spam filter

96. A tradeoff to the anonymity offered by anonymous is that they tend not to operate at the same speed as your regular browser. a. FTP sites c. URLs b. proxies d. indices 97. A(n) is a type of utility software that captures unsolicited e-mails before they reach your inbox. a. quick check c. proxy b. spam filter d. anonymizer 98. An e-mail scam designed to persuade you into revealing confidential information by replying to an e-mail is called. a. phishing c. pharming b. spoofing d. anonymizing 99. To avoid becoming a spam victim, you should. a. reply to spam when you receive it b. always click on the links in e-mail messages c. provide your e-mail address to all sites that request it d. use a disposable e-mail address when you register for online sites 100. schemes redirect users to fake sites by poisoning a domain name server with a fake IP address. a. Filtering c. Proxy b. Hypertexting d. Pharming