Web and email

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

false

Scripts were designed to replaced normal HTML.

Ada

Server side scripts can be written using any of the following except__.

XHTML

(extensible HTML) a markup language that is very similar to HTML but is stricter about punctuation and other details of coding...sometimes called HTML

Web bug or clear GIF

1x1 pixel graphic embedded in a Web page or email message. Almost invisible due to size and is designed to track who's reading the web page or message

false

A C2C e-commerce transaction occurs when an individual consumers purchase goods and services from online merchants.

false

A Web indexer is a computer program that is automated to methodically visit Web sites.

status code

A Web server's response to a browser's request includes an HTTP ____ that indicates whether the browser's request could be fulfilled.

Persistent

A ____Http connection reuses the same HTTP connection to send and receive multiple requests.

true

A conversion process called MIME provides clever way of disguising digital photos, sounds, and other media as plain ASCII code that can travel over the iNternet as email attachments.

Meta keyword

A___keyword is entered into a header section of a web page when it is created and is supposed to describe the page contents.

Sockets

An HTTP exchange takes place over a pair of_______.

Html

An email message in_______format can include graphics in addition to a wide variety of fonts and font colors.

quotations marks

For the next search, she wants only web pages containing the complete phrase, "mars exploration". which search operator should she use to formulate her query?

true

Http is a protocol that works with TCP/IP to get Web resources to your desktop.

File extension

In the URL found in the figure. .htm is the____.

Folder name

In the URL, http;//www.cnn.com/showbiz/movies.htm, showbiz is a________.

Web server name

In the URL, http;//www.cnn.com/showbiz/movies.htm, www.cnn.com is the___.

Pop3

Incoming mail can be stored on a ___server until it is downloaded to the inbox on your hard disk.

Stuffing

Keyword____is an unethical practice in which meta keywords are manipulated to gain high relevancy rankings.

B2B

Paypal is a pioneering example of a _______payment system.

email protocol

POP3 pulls mail down, IMAP will leave copy of message on server not just local machine, SMTP for sending to push mail out

false

Pharming is less surreptitious and easier to detect than most other hacker schemes.

search engine optimization

SEO, can affect the ranking and visibility of Web pages

*

The ____wildcard character allows a search engine to find pages with any derivation of a basic word.

URL

Uniform resource locator/ unique address

Surfer

Visitors to a web site are sometimes called Web_________.

True

Web 3.0 refers to innovations like cloud computing and other new technologies likely to further change the way we use the Web.

HTML

When working with_______mail, make sure your antivirus software is checking incoming messages

B2C

When you purchase a textbook online from a site like www.amazon.com, you are participating in ____ e-commerce.

Web bug

When you view a page infested with a_____an Http set cookie request automatically goes to a third party server, which may set a cookie on your computer for later retrieval or record your IP address.

Cookies

_______allow a web site to store information on the client computer for later retrieval.

IMAP

___is similar to POP3, but it leaves messages on the server until you specifically delete them.

The World wide web

a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called HTTP.

Web crawler

a computer program that is automated to methodically visit Web sites

false

a flash cookie is typically a 1x1 pixel graphic embedded in a web page or email message designed to track who is reading the web page or email message.

server side

a popular ___activity is verifying billing data at an ecommerce site.

plug in

a program that extends a browsers ability to work with file formats

search operator

a word or symbol that describes a relationship between search terms and thereby helps you create a more focused query (and, or, not, " ", * ..)

flash cookie

also called, local shared object, is the flash equivalent of a conventional Web cookie.

Web server

an Internet based computer that stores Web site content and accepts requests from browsers

email

an electronic document transmitted over a computer network-need email connection, software, and account.

phishing

an email scam designed to persuade you to reveal confidential information, such as your bank account number or social security number

pharming

an exploit that redirects users to fake sites by poisoning a domain name server with a false IP address

C2C sites

auction site like ebay

e-commerce

business transactions conducted electronically over a computer network (B2C-business to consumer, C2C etc)

Interactive web page

can interact with this page

Javascript

commonly used to add logic and other programmable elements to a Web page

bidirectional links

connect two documents using a two-way that can be followed from either document.

dynamic Web page

customized content in response to keyboard or mouse actions, or based on information supplied directly or indirectly by the person viewing the page.

Webmail

free service and access through web browser

static Web page

displays same information regardless of who accesses it.

unidirectional links

document a links to document b

client side

embedded in an HTML document and run locally when a Web page is displayed by a browser.

HTTP secure connection

encrypts data stream between client devices and servers

meta keyword

entered into a header section of a Web page when it is created and is supposed to describe the page contents (keyword stuffing)

false

http provides a secure connection for web based transactions.

HTML

hypertext markup language, set of specifications for creating documents that a browser can display as a Web page

HTTPS

hypertext transfer protocol secure

HTTP

hypertext transfer protocol, communication protocol that works with TCP/IP to get the elements for Web pages to a local browser

false

in a POP3 email system, your messages remain on a web server, rather than being downloaded to your computer.

netiquette

internet ettiquette

Web page

is based on an HTML source document that is stored as a file on a Web server.

Web browser

is client software that displays Web page elements and handles links between those pages.

link popularity

is measured by quality and quantity of links from one Web page to others

BCC

people won't have to scroll through addresses to reach the message

antispyware

neutralizes bugs

ad-blocking software

prevents ads from appearing on screens

search engine query

processor looks for you search terms in search engine's indexed database and returns a list of relevant Web sites

ad-serving cookies

receive cookie when shop at a site, reads ad serving cookie at next site and shows what sites you have been to.

server side scripts

run on Web servers rather than on your local device

client side

scripts tend to be used for interactive user interface elements.

SSL

secure sockets layer

cookies

small chunk of data generated by a Web server and stored in a text file on computers hard disk

email attachments

software converts email attachment using a conversion process called MIME (multipurpose internet mail extension)-converts to format for transfer

search engine indexer

software that pulls keywords from a Web page and stores them in an index database

linkrot

sometimes links lead to pages that are no longer available

HTML tags

specify how the document should appear when displayed in a browser window

local email

stores mail on the server stores incoming messages until you launch you email client and get your mail -Based on store and forward technology

TLS

transport layer security

spam filter

type of utility software that captures unsolicited email messages before they reach your inbox.

Web site

typically contains a collection of related information organized and formatted so it can be accessed using a browser

spam

unwanted electronic junk mail, major hacking tool for cybercriminals with phishing

hypertext

used to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read.

anonymous proxy

uses proxy server to relay Web page requests after masking the originating IP address. -encrypts address, web page is sent through proxy server.

hypertext links

web pages connected by these (syllabus that contains links to other documents)

browser cache

when browser fetches pages and graphics to form a Web page, it stores material on device in temporary files

cache

when your browser fetches pages and graphics to form a web page, it stores them in temporary files on your hard drive called a web______.


Kaugnay na mga set ng pag-aaral

Intro to Computer Programming Midterm Review

View Set

4x4 places and people in the city 4th nine weeks 13

View Set