quiz 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The Web was introduced in 1991 at A. Center for European Nuclear Research (CERN) B. National Aeronautics and Space Administration (NASA) C. Research Center for Nuclear Physics (RCNP) D. National Science Foundation (NSF)

A. Center for European Nuclear Research (CERN)

The Web was introduced in 1991 at A. Center for European Nuclear Research (CERN) B. Research Center for Nuclear Physics (RCNP) C. National Aeronautics and Space Administration (NASA) D. National Science Foundation (NSF)

A. Center for European Nuclear Research (CERN)

These special programs continually look for new information and update the databases used by search services A. Spiders B. Webcrawlers C. Hits D. Bugs

A. Spiders

After a webcast is completed there are no files left on your computer A. True B. False

A. True

Cloud computing has the potential to free end-users from owning, maintaining, and storing software and data A. True B. False

A. True

JavaScript is a language often used within HTML documents to trigger interactive features A. True B. False

A. True

Which of the following are files inserted into an HTML document that control the appearance of Web pages including layout, colors, and fonts? A. Javascript B. Applets C. CSS D. AJAX

C. CSS

_____ do/does not use streaming technology and are/is used to download media files to your computer. A. Twitter B. Microblogs C. Podcasts D. Webcasts

C. Podcasts

This type of e-mail account is more widely used because it frees the user from installing and maintaining an e-mail client on every computer used to access e-mail A. Cloud B. Mobile C. Web-based D. Client-based

C. Web-based

This type of e-mail account is more widely used because it frees the user from installing and maintaining an e-mail client on every computer used to access e-mail. A. Mobile B. Cloud C. Web-based D. Client-based

C. Web-based

_____ typically broadcast live events and use streaming technology in which audio and video files are continuously downloaded to your computer while you are listening to and/or viewing the content. A. Microblogs B. Twitter C. Webcasts D. Blogs

C. Webcasts

Programs that automatically start and operate as a part of your browser are called A. readers B. pop-ups C. plug-ins D. ActiveX controls

C. plug-ins

For browsers to connect to resources on the Internet, the location of the resources must be specified through addresses called _____. A. hyperlinks B. top-level domains (TLDs) C. uniform resource locators (URLs) D. Hypertext Markup Language (HTML)

C. uniform resource locators (URLs

This method of file transfer distributes file transfers across many different computers A. SSP B. Dropbox.com C. BitTorrent D. FTP

D. FTP

Programs that automatically start and operate as a part of your browser are called: A. ActiveX controls B. readers C. pop-ups D. plug-ins

D. plug-ins

This method of file transfer distributes file transfers across many different computers A. BitTorrent B. FTP C. SSP D. Dropbox.com

B. FTP

All information found on the web through search tools can be considered as factual. A. True B. False

B. False

Attachments to e-mail messages are always safe to open. A. True B. False

B. False

When you enter a keyword or phrase into a search engine the results display as a list of these A. Matches B. Hits C. Subjects D. Entries

B. Hits

Which of the following is not a well-known Web browser? A. Internet Explorer B. Windows Explorer C. Google Chrome D. Safari

B. Windows Explorer


Ensembles d'études connexes

Nissan Missed Opportunities Report

View Set

3.3 Economic Integration and Terms of Trade

View Set

Mergers, Corporate Governance, and Control Topic 8

View Set

Chapter 7 Production and Growth - Macro

View Set

Chapter 2: Global E-business and collaboration

View Set