Chapter 9 Review

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Hyperlink

A ____ is a clickable navigation element in a web page.

hyperlink

A ____ is a clickable navigation element, in a webpage to another webpage of the same website, or even a completely new website.

Computer virus

A ____ is a malicious computer program that can copy itself and infect a computer, typically without the user being aware of it.

virus

A ____ is a malicious computer program that can copy itself and infect a computer, typically without the user being aware of it.

Worm

A ____ is like a virus in that it spreads quickly and is extremely harmful, but does not need to attach itself to an existing program.

firewall

A ____ is specialized hardware and software working together that insures that only authorized personnel within an organization can use the Intranet.

Trojan horse

A ____ is usually a harmless or interesting looking program that when executed, unleashes harmful viruses into a users system.

knowledge system

A ____ lets employees exchange ideas and content within their own organizations.

Browser

A ____, is application software that provides an interface which lets a user display and interacts with text, images, and other information located on the World Wide Web.

server; client

A computer on a network that stores webpages is called the ____ or shot, and the computer on the network that requests those webpages is called a ____.

browser application

A website is a collection of web pages on a server which can be requested by a client and displayed with

browser application software

A website is a collection of web pages on a server which can be requested by a client and displayed with ____ which exist on a server somewhere on the World Wide Web.

Browser

A website is a collection of web pages on a server which can be requested by a client and displayed with a

Interactive

A website that engages the user makes it memorable is said to be

Intranet

A(n) ____ is a like a private version of the Internet that works the same way as the Internet, but is confined within an organization.

Internet Service Provider (ISP)

An ____ is a business or organization that provides people a way to access the Internet and World Wide Web.

browser

Essentially, a ____ is used to display information from the WWW onto your computer screen.

intranet

Firewalls keep public networks like the Internet from accessing private networks like an

Standard protocol

Http refers to the ____, or the rules of exchanging files from a server to a client on the Internet.

Advance Research Project Agency Network (ARPANET)

In 1969 at the University of California at Los Angeles (UCLA), ____ was born, one of the precursors to today's Internet.

World Wide Web (WWW)

It is important to know that the ____ is a part of the Internet.

virtual storefronts

Large established retail organizations can enhance their scope and reach beyond physical boundaries by opening ____ on the Web.

HTML

Most web pages are typically programmed with

Web developers or webmasters

People that produce websites are called

Webmasters/web developers

People that produce websites are called

javaScript

Some browsers are able to understand a programming language called ____ as well as HTML.

Keyword search engines

Some search engines, called "____" only require the user to type in the keyword or phrase.

outside hackers

The Internet and the World Wide Web are public, which means that your browser and computer can be compromised by

Client/Server

The Internet is a network called a ____ model.

client/server

The Internet is a network called a ____ model.

Privacy

The key aspect of an Intranet is

information or content

The most important aspect of any website is always its

content

The most important aspect of any website is always its information, or

Windows Internet Explorer

The most popular browser is

doing business; rules of business still apply

The promises of e-commerce are limitless, so it is extremely important to remember that e-commerce is still the process of "____" on the Web, and therefore, all ____.

Hypertext Markup Language (HTML); Hypertext Transfer Protocol (TTP)

Tim Berners-Lee at CERN (Center for European Nuclear Research) invented a standard programming language called ____ and the protocol to move information through the internet called ____

telephony

VoIP is a subset of

Phone service (typically phone calls over the Internet)

VoIP is often referred to as

World Wide Web

WWW refers to

Joint Photographic Expert Group (JPEG) and Graphics Interchange Format (GIF)

We browsers display images with ____ file formats.

Uniform Resource Locators (URLs)

Websites have address called

Never answer or even open a spam email

What can be done to reduce or eliminate spam?

Usually a harmless or interesting looking program that when executed, unleashes harmful virus into a user's system.

What is a trojan horse?

Internet: (Network) is available to everyone, and everyone can see it Intranet: Private version of the internet, one that is confined within an organization

What is the difference between the Internet and an Intranet?

None of the recipients know who else received the same email, or whether anyone other than them received it at all.

What is the point of a blind carbon copy in an email system and how does it work?

VoIP (Voice over Internet Protocol)

What sort of products use telephony?

Specifically outlines e-mail usage and protocols.

Why do email server owners have Term of Service Agreements?

Internet Protocol address (IP)

With millions of computers connected to the Web, it becomes important to come up with an address system or an ____ in order to identify and communicate throughout the network.

internet

Without a firewall, an Intranet is just another part of the

Bookmarts

____ are also called "Favorites".

Popups

____ are separate browser windows that are programmed by website designers to open extra browser windows without user interaction, typically an advertisement, while accessing a website.

Cookies

____ are text files sent to a browser and then sent back unchanged by he browser to the originating server.

Cookies

____ are text files sent to a browser and then sent back unchanged by the browser to the originating server.

Metasearch

____ engines look and work like keyword searches, but return the results of many search engines at once and eliminate duplicates hits.

Consumer to Consumer (C2C)

____ involves e-commerce between consumers, usually facilitated some third party.

Broadband Internet access ("broadband")

____ is a high data-transmission rate Internet connection.

Search engine

____ is a website that lets a user type in specific keywords or phrases and then returns a list of hits (hyperlinks) that best match the search criteria.

Business to Business (B2B)

____ is businesses distributing, buying, selling, advertising, and marketing of goods or services over the Web to other businesses. ____ transactions are inclined to take place within specific categories.

Spyware

____ is software that installs itself on a user's system without permission and gleans personal data and information about a user without their knowledge or permission.

Adware

____ is software which routinely displays advertising to a computer system after the software is installed, usually without the users consent.

Electronic commerce

____ is the distributing, buying, selling, advertising, and marketing of goods or services over the Web.

e-commerce

____ is the distributing, buying, selling, advertising, and marketing of goods or services over the Web.

Communication

____ is the most common use of the Internet.

Voice over Internet Protocol (VoIP)

____ is the routing of voice conversations, or typically, phone calls over the Internet.

Connectivity

____ is when one computer can connect to another or many computers and share information and resources.

Caching

____ is when the browser stores copies on a user's computer of previously viewed web pages that a user has already accessed so it does not have to find it again on the World Wide Web or request it again from the originating server.

Caching

____ is when the browser stores copies on a user's computer of previously viewed web pages that a user has already accessed so it does not have to find it again on the World Wide Web.

Browser hijacking

____ is when the browser's setting are modified by Malware.

Business to Consumer (B2C)

____ is where commercial organizations sell to consumers.

Internet hosting services

____ runs Internet servers, which are then available to serve content such as webpages to the Internet, or clients.

Cookies

____are text files sent to a browser and the sent back unchanged by the browser to the originating server.

spam

any unwanted mail like phishing is called


Kaugnay na mga set ng pag-aaral

LearnKey Photoshop CS6 Session 3 Labs and Post Assessment.

View Set

3-8 The Caribbean Today Reading Support

View Set

Allergic Rhinitis, Asthma, and ARDS

View Set

Microeconomics final (example questions)

View Set