CNIT 131: Computer Networks Flashcards

Unlock all answers in this set

Unlock answers
question
Opera is an example of a:
answer
Browser
question
City College's Insight is a course management system based on:
answer
Moodle
question
How many colors are supported by .gif files?
answer
256
question
How many bits are there in a byte?
answer
8
question
The ARPANET, the first packet-switching network, connected UCLA, UCSB, SRI International, and the University of Utah in the year 19__?
answer
69
question
An acronym for an Internet connection speed of a million bits per second:
answer
Mbps
question
A measurement of Internet connection bandwidth:
answer
Bits per second
question
A low-cost method of connecting to the Internet using a regular telephone line:
answer
Dial-up access
question
Connection that uses radio frequency to transmit data between two electronic devices:
answer
Bluetooth
question
A technology that uses radio waves to communicate:
answer
WiFi
question
Type of dedicated line that supports faster transmissions when receiving data than when sending data:
answer
ADSL
question
Any of several types of digital lines that carry multiple signals over a single communications line:
answer
T-carrier line
question
An acronym for an Internet connection speed of a thousand bits per second:
answer
Kbps
question
Another term for the capacity of a communications channel:
answer
Bandwith
question
An acronym for an Internet connection speed of a billion bits per second:
answer
Gbps
question
____, the first commercial browser, was created during the summer of 1994:
answer
Netscape Navigator
question
A ____ is a software program used to view webpages:
answer
Browser
question
A subset of the Internet that supports documents that combine pictures, sound, and animation with text is:
answer
The Web
question
3G is a third generation standard for _____ communications:
answer
Mobile
question
One of the scientists whose research led to the development of packet switching technologies was Leonard Kleinrock:
answer
True
question
Every computer connected to the Internet uses the ____ suite to communicate between networks:
answer
TCP/IP
question
Businesses that sell their products and services online directly to consumers are following the e-business model:
answer
business-to-consumer
question
IM is the standard or set of protocols that allows files to be uploaded and downloaded over the Internet:
answer
False
question
A browser shortcut to a frequently viewed webpage is referred to as a favorite or:
answer
Bookmark
question
Text links generally appear underlined in the same color as the other text on the webpage:
answer
False
question
The top-level domain abbreviation for the aviation industry:
answer
.aero
question
The top-level domain abbreviation for individuals:
answer
.name
question
The top-level domain abbreviation for U.S. military:
answer
.mil
question
The top-level domain abbreviation for businesses:
answer
.biz
question
The top-level domain abbreviation for mobile products and services:
answer
.mobi
question
The top-level domain abbreviation for credentialed professionals:
answer
.pro
question
The top-level domain abbreviation for major networking centers:
answer
.net
question
The top-level domain abbreviation for all uses:
answer
.info
question
The top-level domain abbreviation for human resources professionals:
answer
.jobs
question
The top-level domain abbreviation for government entities:
answer
.gov
question
The ____ in the Internet Explorer 11 browser contains the webpage a web server request:
answer
Display area
question
A _ is an individual who uses technology skills to access a network and the computers on that network without authorization:
answer
Hacker
question
As most browsers do not have a built-in feed reader, it is necessary to download stand-alone feed readers or subscribe to online feed services :
answer
False
question
The first part of a URL is http://, which is the ____ used to transmit a webpage from a web server to a browser:
answer
Protocol
question
Some webpage images, such as many images found at U.S. government websites, are in the ____ and can be used freely:
answer
Public Domain
question
The process of enlarging or reducing the view of the entire current webpage is called:
answer
Zooming
question
A____ seldom changes:
answer
Static IP address
question
Most commercial webpages include a ____ that allows visitors to locate specific information at the website:
answer
Search tool
question
U.S. copyright laws do not protect content owners from unauthorized copying and sharing of text, images, and other media:
answer
False
question
A ___, which can be an email client or browser add-on, is software or an app that collects a user's web feed content and provides it in a readable format for the user:
answer
Aggregator
question
Most browsers provide a list of suggested websites when you start typing in the Address bar:
answer
True
question
A URL can be copied and pasted directly into a Facebook post or ____ tweet:
answer
Twitter
question
U.S. ____ laws protect content owners from unauthorized copying and sharing of text, images, and other media:
answer
Copyright
question
A ____ is typically an application that runs on a computer or device, which requests resources or services from another computer or device:
answer
Client
question
A _ is a webpage item listed in a search results list:
answer
Hit
question
It is important to review the source of each hit returned by a metasearch engine to eliminate _ sponsored Correct listings that might not be the most relevant to your search query:
answer
Sponsored
question
A hashtag is a word or phrase (with spaces removed), preceded by the @ sign:
answer
False
question
A _ is a human-compiled, hierarchical list of webpages organized by category:
answer
Directory
question
What is a special type of search tool that compiles the search results from multiple search engines into a single search results list?:
answer
Metasearch Engine
question
Specialized search engines, such as Technorati, Digg, and Newsvine, are sometimes called:
answer
Social media aggregator
question
A web crawler:
answer
Yahoo! Slurp
question
"What is the capital of Finland?" is an example of this:
answer
Natural language search query
question
A research alternative offering access to specialized information collections:
answer
Dun & Bradstreet
question
A search directory:
answer
DMOZ
question
Another name for the Invisible Web:
answer
Deep Web
question
A metasearch engine:
answer
Mamma.com
question
Seeks specific information using keyword combinations:
answer
Targeted search
question
AND
answer
Boolean operator
question
Form of metadata used in social media platforms
answer
Hashtag
question
Listed in a search results list
answer
Hit
question
Keywords are entered in a ____ text box or in the Address box:
answer
Search
question
White pages and yellow pages directories include resources, such as Pipl and Wink, for a fee:
answer
False
question
A search that puts the query in the form of a statement or question is a ____, like that shown in the accompanying figure:
answer
Natural Language
question
Webpages with grammar or spelling errors, poor organization, missing images, or ____ at best indicate poor attention to detail, and at worst might indicate the page is a poor-quality source:
answer
Broken Links
question
Provides information services to the business, scientific, engineering, financial, and legal communities over the Internet or an internal intranet:
answer
Proquest
question
Which of the following are general-purpose search engines?:
answer
Ask.com and Bing.com
question
Which specialized collection of electronic resources provides access to U.S. congressional and state government documents, statistics produced by governmental agencies and organizations, and primary and secondary sources of historical documents?:
answer
Lexis Nexis
question
Search keywords should be chosen carefully to produce the best search results:
answer
True
question
By not disclosing search engine algorithms, the search engines are attempting to prevent ____ marketers from manipulating web content to improve search ranking:
answer
Seo
question
Another term for junk mail is:
answer
Spam
question
The process of saving an email attachment:
answer
Detaching
question
Contains the actual message content:
answer
Message Body
question
Used to route an email message to an individual:
answer
Username
question
Hardware and software that determines route to send an email message:
answer
Mail server
question
Contains information about the message:
answer
Message header
question
May appear at the bottom of an email message; contains standard information about the sender:
answer
Signature
question
Used to send mail to people who should be aware of the email but are not the main recipients:
answer
Cc
question
Icon signifying that you have new, unopened messages:
answer
Closed envelope
question
Hardware and software system that determines from one of several electronic routes on which to send an email message:
answer
Mail server
question
Text in a subject line indicating a message is forwarded:
answer
Fw:
question
A group of keyboard characters that represent a human expression:
answer
Emoticon
question
A malicious program that can harm your computer:
answer
Virus
question
To download an attached file while using Gmail, you can first open the file for viewing, then:
answer
Click the Download link in the viewer window
question
In Gmail, messages sent back and forth between you and your original correspondent are organzied together in a "thread.":
answer
True
question
To open an attachment in Gmail, first click the ____ link in the message window:
answer
View
question
To reply to a message in Hotmail, open the message you want to reply to. Then click the ____ link on the Hotmail menu bar to reply to the sender and other To and Cc recipients of the original message:
answer
Reply All
question
A signature is not optional when sending an email:
answer
Fase
question
You use a ___ to save email addresses and other optional contact information about the people and organizations with which you correspond:
answer
Contact List
question
When you send along a complex document or graphic as part of your email, you send it along as an:
answer
Attachment
question
Thunderbird is the companion email program for Mozilla Firefox:
answer
True
question
A virus ____ is a sequence of characters that is always present in a particular virus:
answer
All of the above
question
Windows Live Hotmail won't let you delete the default ___ folders, but you can delete folders that you created:
answer
System
question
After you create a folder, you can transfer messages to it:
answer
Either a. or b. (from the Inbox/from folders you created)
question
To delete items permanently, click the Deleted link in the Folders list on the left side of the page, click the ____ link on the Hotmail menu bar, and then, if necessary, click the OK button:
answer
Either a. or b. (Delete/Empty)
question
Most email programs offer you two options for replying to a message that you have received: Reply or Reply All:
answer
True
question
____ handles outgoing email messages, determining the paths an email message takes on the Internet:
answer
SMTP
question
The email address [email protected] is the same as the email address:
question
When you create a Google account, the default settings sign you out when your session is over:
answer
False
question
When you receive an email with an attachment or attachments, you can either open the attachment or ___ it:
answer
Save
question
Use a ____ to join independent, closely related thoughts:
answer
Semicolon
question
When forwarding a message in Gmail, numerous earlier messages that are part of the same conversation are shown in the header. This is referred to in the text as a____ conversation:
answer
Stacked
question
Some mail servers will reject messages with too many recipients (usually ____ or more):
answer
50
question
To delete a label in Gmail, click the ____ link to find the Labels link:
answer
Settings
question
The full email address of the main recipient should be entered into the Cc line of a message header:
answer
False
question
The following are generally accepted rules for email messages EXCEPT:
answer
Always forward new information about viruses and hoaxes
question
The term Bcc is short for:
answer
Blind courtesy copy
question
The top-level domain abbreviation for credentialed professionals:
answer
.pro
question
If you are using email for a business communication, your ___ usually contains your name, title, and your company's name.
answer
Signature file
question
Examples of ____ include what, where, is, the, of, in, and how:
answer
Stop words
question
The Internet is a subset of the World Wide Web:
answer
False
question
In Internet Explorer, you can erase your browser history from within the Internet Options dialog box:
answer
True
question
In Firefox, you can create descriptive labels, called ____, and assign them to your bookmarks to help organize your bookmarks into categories.
answer
Tags
question
Which of the following cable types does not use an electrical signal at all?
answer
Fiber-optic
question
When using the "Reply All" option, your message will automatically be sent to ____ recipients of the original message.
answer
To and Cc only
question
____ requires a broadband connection, a microphone, a speaker, and software or an app, to make phone calls over the Internet.
answer
VoIP
question
The ____ protocol specifies how to encode nontext data, such as graphics or sound, so it can travel over the Internet.
answer
MIME
question
In Gmail, messages sent back and forth between you and your original correspondent are organzied together in a "thread."
answer
True
question
Using one browser window for all open pages is called ____.
answer
Tabbed Browsing
question
Web crawlers continually browse the web to update their ____ with modified webpage content or new, previously unknown webpages.
answer
Indexes
question
The private browsing mode in Firefox is called ____.
answer
Private Browsing
question
____ cable is the type of cable used for most cable television connections.
answer
Coaxial
question
The following are generally accepted rules for email messages EXCEPT ____.
answer
Always forward new information about viruses and hoaxes
question
Bookmarks are saved in Firefox in the ____.
answer
Library
question
If you want to force your browser to load the most current version of a page from a Web server, hold down ____ as you click Refresh or Reload.
answer
Ctrl
question
Many LANs today can run ____, which operates at 1000 Mbps.
answer
Gigabit Ethernet
question
The last part of a domain name is known as a TLD:
answer
True
question
Bcc email recipients are unaware of other Bcc recipients:
answer
True
question
Circuit-switched networks are inherently more reliable than packet-switched networks.
answer
False
question
When you ____ a message, a copy of the original message is sent to the new recipient(s) without the original sender's knowledge.
answer
Forward
question
____ is the amount of data that can travel through a communications circuit in one second.
answer
Bandwidth
question
A/An ____ is a small file that a Web server writes to the disk drive of the client computer, containing information about the user.
answer
Cookie
question
DARPA researchers worked to devise ways to make network communications rely on a central control function.
answer
False
question
Two widely used resources for finding information on small and large businesses are Hoover's and Dun & Bradstreet:
answer
True
question
____ is an example of a social networking site focused on career networking:
answer
LinkedIn
question
A ____ shows the hierarchical arrangement of categories and subcategories through which a user has clicked.
answer
Breadcrumb trail
question
Google's browser is called ____.
answer
Chrome
question
What was the first GUI program that could read HTML and use HTML documents' hyperlinks to navigate from page to page on computers anywhere on the Internet?:
answer
Mosaic
question
The term ____ equals 1,024 bps.
answer
Kbps
question
The most common transfer protocol used on the Internet is the Telnet protocol.
answer
False
question
The term ____ refers to a set of commonly accepted rules for proper behavior on a network.
answer
Netiquette
question
Realizing that the Internet was no longer a scientific research project, the DOD finally closed the research portion of its network, the ____, in 1995.
answer
ARPANET
question
An emoticon is a group of keyboard characters that when viewed together represent a human expression.
answer
True
question
Filing messages in Gmail is different from other Webmail. Instead of moving a message to a folder, you ____.
answer
Apply a label to a message
question
Very few U.S. and international newspapers publish online editions.
answer
False
question
A ____ personal portal Correct is a consumer portal whose content you customize to meet your specific needs.
answer
horizontal portal / personal portal
question
Online reference desk:
answer
Internet Public Library
question
FTP client:
answer
FileZilla
question
Specialized information collection:
answer
FindLaw
question
Third-party payment service:
answer
PayPal
question
Personal portal:
answer
My MSN
question
Online route planner:
answer
FreeTrip
question
Browser shortcut:
answer
define:
question
Online encyclopedia:
answer
Bartleby.com
question
Online Broker:
answer
Charles Schwab
question
A ____ file-sharing network allows files to be transferred between individual personal computers located on the same local area network (LAN) or between individual personal computers connected to the Internet.
answer
peer-to-peer
question
Software that you can download and try out, but are expected to pay for if you decide to use it on a permanent basis is called ____.
answer
shareware
question
A bank that offers online banking in addition to services offered at physical banks is called a ____.
answer
brick-and-click bank
question
To access streaming media, your computer or device must have a sound card, speakers, and a:
answer
media player
question
Rotten Tomatoes is a special-interest website where users can learn to make gazpacho.
answer
False
question
An agency that offers accreditation for health-oriented websites is ____.
answer
URAC
question
What is UNIX?
answer
A command line operating system/A server operating system. A server operating system manages the resources on the server, much like Windows or Mac OS X manages the resources on your client computer.
question
List 3 differences between UNIX and Windows:
answer
1)No GUI 2)Use of command line In UNIX/LINUX the forward slash / is used instead of the backward slash 3)No device letters like C: or A: are used in UNIX/LINUX. The UNIX/LINUX user typically does not know or care what device is being used to store files. 4)The UNIX/LINUX user does not store files on floppy disks or print them out on a local printer. Files are stored on the server's hard disk and printed out on the server's shared printer 5)RedHat LINUX can be used from any computer with an Internet connection using Telnet. You do not need to be on campus. 6)UNIX/LINUX is case-sensitive , so a file named Notes is different from a file named notes 7)To access RedHat LINUX, each user must have a User ID and password. There is no general use of the RedHat LINUX machines—only staff and students enrolled in CS and CNIT courses can use it. 8)UNIX/LINUX files do not have filename extensions like WINDOWS files do. The period is just another character and can be used in a filename, but it does not have any special significance to UNIX/LINUX. However, filenames that start with a period are hidden files UNIX/LINUX uses when you log in, and they are not normally modified by users. 9)UNIX/LINUX files are placed in directories. WINDOWS files are placed in folders . The two terms have the same meaning.
question
Which command will show the current date and time?
answer
date
question
Which command will show a calendar of the current month?
answer
cal
question
Which command will show a calendar of 2006?
answer
cal 2006
question
Which command will show a calendar of July 2007?
answer
cal 7 2007
question
Which command will list out all the current users on the UNIX system?
answer
who
question
How many users are currently using the UNIX system?
answer
who | more
question
NOTE: If you can not see all the names on one screen, what command should you use to see one screen of information at a time?
answer
who | more
question
The mancommand allows you to get help on a particular command. For example, if you did not know the finger command or the options that can be used with that command, then you would type man finger.
answer
man command (displays help from the manual about the command 'command')
question
If you want to see one screen worth of names at a time, what command should you use?
answer
ls hw?? or who | more
question
You would like to log out of UNIX. What command should you use?
answer
exit
question
cd
answer
Change directory to home directory
question
cd ..
answer
Change directory to next higher level
question
cd directoryname
answer
Change directory to the directory named directoryname
question
chgrp
answer
Command to change the group that is associated with a file or directory.
question
chmod
answer
Change the access mode of a file; use this command to control who can read and/or write to files.
question
cp
answer
Copy; similar to move (mv) but the original file or directory remains intact; to copy a directory, use cp -r olddir newdir.
question
exit (or CTRL-D)
answer
Exit from newgrp command; also exit the command prompt, log off.
question
-s filename index.html
answer
Make index.html an alias for filename; you should have a file named index.html in every Web directory.
question
logout
answer
Quit UNIX
question
(lower case L) --> ls -al
answer
List all fires in the current directory with lots of information, including date last updated (omit l for a simple list).
question
mkdir directoryname
answer
Make (create) a directory named directoryname.
question
mv oldpath/oldname newpath/newname
answer
Rename (move) the file oldpath/oldname to newpath/newname. Either oldpath or newpath may be omitted, in which case the current directory is used. If oldname is a directory, the directory and all the files within it are moved to the new location. If newname is a directory, then oldname is moved inside of newname. To move a file or directory in another directory to the current directory, replace newpath/newname with a dot (.).
question
newgrpgroupid
answer
Change to work with files and directories owned by the specified groupid.
question
pico filename
answer
Edit the file named filename; use - x to quit;
question
pine
answer
Enter your electronic mailbox; type q to quit; for more information on pine,
question
pwd
answer
Display present working directory.
question
passwd
answer
Change password
question
rename
answer
There isn't a rename command; you move (mv) the file to its new name.
question
rm filestem*
answer
Remove (delete) all files beginning with filestem; if you omit the asterisk (*), you must specify the complete file name; if you omit filestem (specifying only the asterisk), you'll delete all the files in the current directory.
question
rm -r directoryname
answer
Remove (delete) the directory named directoryname and all the files in it.
question
homepage
answer
The command you issue on fog when you log onto your userid for the first time; homepage creates your public_html directory and makes it known on the fog.ccsf.cc.ca.us machine as http://fog.ccsf.cc.ca.us/~userid/. The command also creates a skeleton index.html file with the correct permissions; you will need to edit the file.
question
- c
answer
Abort a command or program execution
question
Most Web browsers not only support FTP, they have superior functionality when compared to FTP client programs.
answer
False
question
To _____ collaborate Correct means for multiple developers or authors work on the same file without having to download it, edit it, and republish or repost it to an Internet server.
answer
collaborate
question
____ software omits one or more useful features of the full version.
answer
Limited edition
question
When you use your computer to connect to an FTP site, it is called the
answer
Local
question
After creating a network place, you can download, upload, and share files at the network location you defined.
answer
True
question
People using FTP sites with anonymous logins usually can open and view all the directories and files on the site.
answer
False
question
Freeware users are expected to stop using it after the specified initial trial period and uninstall it from their computers.
answer
False
question
____ text contains symbols typed from the keyboard but does not include any nonprintable, binary codes.
answer
ASCII
question
____ files use less space when stored and take less time to be transferred from one computer to another.
answer
cOMPRESSED
question
Which of the following is a program that tests a computer to determine if it is connected to the Internet?
answer
ping
question
Logging on to a publicly accessible, remote computer connected to the Internet is known as a ____ login.
answer
anonymous
question
Briefcase is an online storage service offered by ____.
answer
Yahoo!
question
To use a remote computer, you must identify yourself, or ______by supplying your user name and a password.
answer
log on
question
The distance between your PC and a remote computer on the Internet is measured in ____.
answer
hops
question
It is unusual for FTP sites to place time limits on how long anonymous users can store files in the public directory.
answer
false
question
When you connect to a public FTP site using a Web browser, the browser might automatically supply the user name anonymous and an appropriate password to access the site.
answer
True
question
If a file travels through 15 computers before arriving at your PC, then the file has made ____ hops.
answer
14
question
Compressed files require more space on a hard drive than uncompressed files.
answer
False
question
____ is the Internet protocol that transfers files between computers that are connected to the Internet.
answer
FTP
question
Which of the following is a method for multiple developers or authors to work on the same file without having to download it, edit it, and transfer it back to the original author(s)?
answer
Collaboration
question
File decompression is sometimes called file ____.
answer
expansion
question
To download a file using Windows XP and the HTTP protocol with WebDAV, you can create _______which is a shortcut to a Web site, FTP site, network location, etc.
answer
network place
question
An FTP server is sometimes called a ____ computer.
answer
remote
question
Zip files are sometimes called a zip ____.
answer
archive
question
FTP is operating system specific.
answer
false
question
Virus detection programs only protect your computer when they ____.
answer
a. are turned on b. are properly configured c. include current virus patterns d.all of the above*
question
Besides permitting download access by anonymous users, the site's manager, also called the, might allow users to upload files, making them available to anyone who can connect to the site.
answer
webmaster
question
Compressed files require more space on a hard drive than uncompressed files.
answer
False
question
The term ping is an acronym for:
answer
Packet Internet Groper
question
If a file travels through 15 computers before arriving at your PC, then the file has made ____ hops.
answer
14
question
You can download files with a file extension of ____ in ASCII mode.
answer
.txt
question
Provides most but not all the functionality of the full version of a program :
answer
limited edition
question
New Internet protocol with collaborative authoring features
answer
WebDAV
question
A sequence (string) of characters that is always present in a particular virus
answer
Virus pattern
question
A connection between two computers
answer
hop
question
Site's directory at which you usually enter
answer
root
question
Programs that are available to users at no cost and without any restrictions
answer
freeware
question
Name for a compressed file
answer
zip archive
question
A sequence of characters that is always present in a virus
answer
signature
question
Program used to make an informed choice when selecting a download site
answer
tracert
question
Site that serves as a replica of an existing server
answer
mirror
question
When you access an FTP site, you usually enter at the site's ____ directory.
answer
root
question
An FTP site usually stores ____.
answer
Folders and Files
question
____ is the Internet protocol that transfers files between computers that are connected to the Internet.
answer
FTP
question
In FTP, ASCII and binary are the two file transfer ____.
answer
modes
question
WebDAV stands for:
answer
Web Distributed Authoring and Versioning
question
A ____ server hosts only one site.
answer
dedicated
question
An absolute path specifies a file's location with absolute precision; there is no reference to the current file.
answer
True
question
general term indicating the separation of the formatting and the content of a document
answer
markup language
question
included in some tags to specify additional information about the content to be formatted by the tag
answer
attributes
question
a commonly used character for separating words in filenames
answer
underscore
question
ignored by the browser, but visible when the HTML document is viewed in text editor
answer
comment tag
question
another term for "ordered"
answer
numbered
question
another term for "unordered"
answer
bulleted
question
a feature necessary for a browser to process a script
answer
scripting engine
question
an example is a toolbar for accessing a search engine without opening its Web site
answer
add-on
question
what raster graphics are composed of
answer
pixels
question
the amount of data that is transferred from a Web server
answer
bandwidth
question
The two Web site creation and management tools discussed in the chapter are ____ and ____.
answer
Microsoft Expression Web, Adobe Dreamweaver
question
____ graphics have the following filename extensions: .ai, .wmf, .cdr, and .dxf.
answer
vector
question
Tags can be one-sided or two-sided.
answer
True
question
An HTML document uses the ____ tag to create the various inputs on a form.
answer
input
question
Notepad is a text interpreter program that is installed with Microsoft Windows.
answer
False
question
Most scripts are enclosed in HTML ____ tags so browsers that cannot execute the script will ignore the script.
answer
comment
question
Some Web pages include ____ content -- content that changes when you view the page.
answer
dynamic
question
Bitmap graphics are also known as ____ graphics.
answer
raster
question
Dreamweaver creates code that is compatible with XHTML version ____.
answer
1.0
question
____ is an additional service potentially offered by a Web hosting service.
answer
a. A summary of site statistics b. The provision of email accounts c. The use of database software d. all of the above*
question
Enhancements, called ____, allow a Web browser to perform tasks it was not originally designed to perform.
answer
Browser extension
question
The <____ /> tag can be used to create a text box, button, option button, or check box in a form.
answer
input
question
There are three types of browser extensions: plug-ins, add-ons, and helper applications.
answer
True
question
To process a script, a browser must have a feature called a scripting ____.
answer
Engine
question
Some Web pages include ____ content -- content that changes when you view the page.
answer
dynamic
question
Director is preferable to Flash if you need to create ____.
answer
three-dimensional presentations
question
A ____ is a Web page you access with your Web site's user name and password, and includes all the tools you need to access and manage your Web site.
answer
control panel
question
To specify a red color within a tag, the syntax would be ____.
answer
color: red
question
The content of Web pages must always remain within the capabilities of HTML.
answer
false
question
You include ____ tags in your Web pages to provide keywords that search engines can use to learn how to list your site.
answer
????
question
HTML specifications that are not included when newer specifications are released or are not included in the XHTML specification are referred to as ____.
answer
deprecated
question
Since a dedicated Web server only hosts one site, it is less expensive to operate than a shared server.
answer
false
question
Email ____ involves a virus sending you an email that includes the name of someone you know in the message's From line.
answer
spoofing
question
____ components are Microsoft's technology for writing small applications that perform some action in Web pages.
answer
ActiveX
question
You feel that Heather knows her stuff. Before you leave, you remind her to visit the Web site that has the most current, detailed information about phishing attacks, ____.
answer
the Anti-Phishing Working Group
question
The text recommended purchasing identity theft ____, which can help pay the expenses required to clear and restore your identity in case of a theft.
answer
insurance
question
SSL stands for ____.
answer
Secure Sockets Layer
question
sending a message with the name of someone known in the From line
answer
spoofing
question
many freeware and shareware programs are sold as this
answer
adware
question
hides encrypted messages within different types of files
answer
steganography
question
user has no control over or knowledge of the ads
answer
spyware
question
tests whether network traffic is filtered or not on a computer
answer
port scan
question
it permits traffic to leave and enter a computer
answer
port
question
people who write programs or manipulate technologies to obtain unauthorized access to computers
answer
hacker
question
type of threat that permits data delays or denial
answer
necessity
question
verifying the identity of a person
answer
authentication
question
occurs when data is disclosed to an unauthorized party
answer
secrecy
question
a component of asymmetric encryption
answer
secrecy key
question
stores login information in an encrypted form
answer
password manager
question
In the text, the term "applet" is associated with ____.
answer
the Java programming language
question
When using SSL-EV with Chrome, the site's verified organization name appears in the Address bar to the left of the URL with a green background and the ____ site information icon.
answer
View
question
Java, JavaScript, and ActiveX programs are all considered proactive content.
answer
False
question
A digital ID is most often used by people using social networks, such as Facebook, to verify their posts.
answer
False
question
Unencrypted information is called ____.
answer
Plain Text
question
An attack that consumes a network's bandwidth is called a __________ attack.
answer
denial of service
question
The term "Web bug" is most associated with the term "____."
answer
cookie
question
A counterstrike is a procedure that recognizes, reduces, or eliminates a threat.
answer
False
question
The ____ firewall software program offers a free version.
answer
ZoneAlarm
question
A server certificate authenticates ____.
answer
a Web site
question
A company can defend its Web server from DoS attacks by adding a DoS ________ to monitor communication between the Web server and the router that connects it to the Internet.
answer
filter
question
A digital ID is usually used by ____.
answer
individuals
question
All of the following are listed in the text as ways to avoid identity theft EXCEPT ____.
answer
canceling and reopening credit card accounts once every three months
question
____ emerged in 2008 from concerns that fraudulent Web sites had started obtaining certificates.
answer
SSL-EV
question
A ________ attack occurs when an attacker disrupts normal computer processing or denies processing entirely.
answer
necessity
question
ActiveX technology was developed by Microsoft.
answer
True
question
If you click a link in a phishing email, you will likely be taken to ____.
answer
the phishing perpetrator's Web site
question
A _____ examines the structure of the data elements that flow through a network
answer
packet sniffer
question
The ____ is a not-for-profit organization that certifies interoperability of Wi-Fi products and promotes Wi-Fi as a standard for wireless LANs.
answer
Wi-Fi Alliance
question
Hackers sometimes use "sniffer programs" to illegally monitor activity on wireless networks.
answer
True
question
a collection of devices connected via Bluetooth technology
answer
piconet
question
a relatively harmless attack that merely sends an anonymous message
answer
bluejacking
question
a security attack using physical proximity to gain someone's personal information
answer
over-the-shoulder
question
a handheld computer that can act as a personal organizer and store notes
answer
PDA
question
an area of Wi-Fi network coverage
answer
hotspot
question
a small wireless device that provides a mobile hotspot
answer
MiFi
question
technology that can send data via light waves
answer
infrared
question
a wireless network that provides network coverage to a large geographical area
answer
WWAN
question
converts audio signals to digital packets for making phone calls via the Internet
answer
VoIP
question
a key typed in by a user to encrypt data
answer
passphrase
question
a standard developed by the Wi-Fi Alliance to address inherent weaknesses in WEP
answer
WPA
question
a unique number that identifies a network interface card
answer
MAC address
question
a unique number that identifies a network interface card
answer
icon
question
A Bluetooth cell phone will also be compatible with a Bluetooth ____.
answer
notebook computer
question
Hackers use ____ programs to monitor activity on a wireless network in order to obtain personal information that unsuspecting users might transmit.
answer
sniffer
question
Any Wi-Fi certified device will always be able to connect to ____ access point.
answer
any 802.11
question
According to the text, ____ is a company that provides subscription-based Wi-Fi service for visitors at many U.S. airports.
answer
Boingo
question
SMS is no longer one of the most widely used and popular forms of communication methods, having been replaced in 1994 by PCS.
answer
False
question
A ____ attack occurs when transmissions, such as messages between users, logins, and normal connections with Web servers, that are being sent between two devices are intercepted by a third party.
answer
man-in-the-middle
question
One of the most serious mistakes that home users make when installing a wireless network is ____.
answer
failing to change the default login for the device
question
Phishing is the act of driving through a neighborhood looking for unsecured wireless networks.
answer
False
question
____ is a term for finding and using somebody else's wireless network, usually illicitly.
answer
Piggybacking
question
The action of issuing a command to delete everything stored on a wireless device is sometimes called a ______wipe.
answer
remote
question
In a wireless mesh network, the number of nodes that need to be wired to an Internet connection is one.
answer
True
question
WPA uses a key to encrypt data so that your key isn't broadcast before your data is encrypted.
answer
preshared
question
If you have both WPA and WEP available to you, your system will be most secure if you use ____.
answer
WPA
question
Security experts warn against ____ in public places.
answer
a. online banking b. checking e-mail c. online shopping
question
Transaction fees, sales commissions, subscription or membership fees, and personal ad fees are ways in which ____ e-businesses generate revenue.
answer
C2C
question
CATEX and Automotix are both examples of B2B subscriptions.
answer
False
question
The number of times a page that includes an ad is loaded in a browser is a method of revenue generation called the _____ method.
answer
cost per impression
question
In a ____ hosting arrangement, multiple e-businesses share a single web server owned by a hosting company.
answer
Shared
question
Early B2C e-retailers that started life in the online marketspace as completely new businesses with no existing brick-and-mortar stores or catalog operations are referred to as ____ e-retailers.
answer
pure-play
question
____ exchanges follow a predetermined set of exchange rules that determine how buyers and sellers communicate with each other throughout the exchange, how they negotiate prices with each other, how they make and accept payments, and also determine product delivery guidelines.
answer
b2b
question
____ is a C2C e-business that sells online classified ad space to individuals trying to sell boats, cars, and other items.
answer
TraderOnline
question
Several business advantages for companies conducting activities online include worldwide sales opportunities, reduced transaction and purchasing costs, and access to small, niche markets.
answer
True
question
A business ____ is the way a company operates to generate revenue, create profits, and continue as a viable business entity.
answer
model
question
____ is an e-retailer's process for packaging and shipping products.
answer
Order fulfillment
question
A ___ is a small segment within a larger market.
answer
niche
question
All the entities involved in creating and distributing products to end users
answer
supply chain
question
Someone who assumes the risks and responsibilities associated with starting his or her own business, and receives the opportunity to earn a profit from the business
answer
entrepreneur
question
The percentage of each transaction that the financial institution will charge an e-business for a merchant account
answer
discount rate
question
Situation that increases the risk of credit card fraud and potential chargebacks
answer
card not present/card holder not present risk,
question
Customizable storefront software residing on an e-retailer's web server
answer
installed storefront software,
question
Founder of Amazon.com
answer
Jeff Bezos
question
A company that provides order fulfillment services for other businesses
answer
third-party fulfillment,
question
A payment gateway vendor
answer
Authorize.Net,
question
A return of funds to a credit card company resulting from a card holder's refusal to pay a credit card charge
answer
chargeback,
question
Launched AuctionWeb, a free online auction
answer
Pierre Omidyar
question
Installed storefront software uses webpage templates that allow stores to be created and products to be added to an online catalog in just a few minutes.
answer
false
question
A ____ is a private network that uses Internet technologies to connect a business with its suppliers and business partners.
answer
extranet
question
Transaction fees, sales commissions, subscription or membership fees, and personal ad fees are ways in which ____ e-businesses generate revenue.
answer
C2C
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New