Computer Concepts Module 4 QuickChecks

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What does a search engine use to rank pages before they are displayed? a. An algorithm b. An indexer c. A Web crawler d. The links to keywords

a. An algorithm

What does a search engine use to organize the data pertaining to Web pages? a. An indexer b. A query processor c. A Web crawler d. An HTML viewer

a. An indexer

When you incorporate Web-based material in research papers, why is it not necessary to get permission from the source? a. Because the Fair Use Doctrine allows it b. Because the material is not copyrighted c. Because it is on the Web d. Because your school library has a deal with the content owner

a. Because the Fair Use Doctrine allows it

Where did the term hypertext originate? a. From Ted Nelson b. From Microsoft c. From IBM d. None of the above

a. From Ted Nelson

Which HTTP method does a browser use to request and HTML source document? a. GET b. POST c. HEAD d. OPTIONS

a. GET

Which of the following would you not expect to find in a browser cache? a. Passwords b. Image files from Web pages c. Images from ads d. HTML documents

a. Passwords

How does HTTPS protect data transmitted from Web pages to Web servers? a. Public key encryption b. Ad blocking c. Setting cookies d. Switching to a stateless protocol

a. Public key encryption

Why do Web designers use dynamic Web pages? a. They are more interesting and interactive b. They are more secure. c. They are easier to produce. d. They are faster than static pages

a. They are more interesting and interactive

The text for a Web page and the HTML tags is stored in _______________. a. a source document b. a file with a .web extension c. a browser d. all of the above

a. a source document

Search engine optimization _______________. a. helps Web sites get higher search engine rankings. b. makes Web sites load faster c. blocks ads and spam d. is not encouraged by major search engine sites

a. helps Web sites get higher search engine rankings

Professional Web designers should avoid using _______________ CSS. a. inline b. internal c. external

a. inline

When a Web server cannot determine if a series of requests comes from the same browser, the protocol is _______________. a. stateless b. a 404 error c. HTML

a. stateless

The HTML tag <h1> specifies the _______________. a. style of text used as headings b. title of an HTML page c. beginning of an HTML document d. format for images

a. style of text used as headings

One of the key transport technologies for Web pages is _______________. a. HTML b. HTTP c. BitTorrent d. Chrome

b. HTTP

Based on the CSS in Figure 4-33, what is the color for visited links? a. Purple b. White c. Blue d. Black

c. Blue

What is typically the name of the file that holds the main page for a Web site? a. Main.html b. Movies.html c. Index.html d. Site.html

c. Index.html

Which one of the following is stored on search engine computers? a. Browsing history b. Browser cache c. Search history d. Search settings

c. Search history

The name of the file that contains the CSS in Figure 4-34 is called _______________. a. Page 1 b. Style Sheet c. SiteStyle.CSS d. "THE GLOBAL CHEF"

c. SiteStyle.CSS

What happens at the end of an HTTP session? a. The Web server goes offline. b. The Web server asks the browser what else it needs. c. The Web server discontinues the connection with the browser. d. The browser forgets which Web site you are viewing.

c. The Web server discontinues the connection with the browser.

Which of the following is not a reason to upgrade your browser? a. To improve security b. To keep up with new Web technologies c. To get a free one

c. To get a free one

Documents created with word processing software _______________. a. can be posted to the web as DOCX files b. cannot be used on the Web c. can be converted to HTML files for the Web d. contain HTML tags

c. can be converted to HTML files for the Web

What can you expect when private browsing is turning on? a. It will delete all the files that arrive on my device while private browsing is on. b. It will delete the browser cache, history, and cookies when I exit private browsing mode. c. It will keep my Web activities hidden from advertisers and government snoopers.

b. It will delete the browser cache, history, and cookies when I exit private browsing mode.

What is the purpose of a Web hosting service? a. Storing documents offline b. Supplying a server platform for Web sites c. Providing Internet service d. Providing access to the Web

b. Supplying a server platform for Web sites

Content is the main emphasis for which of the following? a. The Internet b. The Web c. CSS d. URLs

b. The Web

Why does the cookie in Figure 4-43 refer to Amazon.com? a. The cookie is stored on the Amazon.com Web server. b. The cookie was set by Amazon.com c. The cookie transfers a Web page to Amazon.com

b. The cookie was set by Amazon.com

For which of the following is HTTPS least important? a. When logging in b. When viewing merchandise c. When providing credit card details d. When signing up for an online service

b. When viewing merchandise

Blocking first-party cookies _______________. a. prevents profiling b. makes it difficult to use online shopping carts c. secures your device from fraud d. prevents snoopers from discovering the Web sites you've visited

b. makes it difficult to use online shopping carts

Today's Web uses _______________ links. a. bidirectional b. unidirectional c. A/B d. X

b. unidirectional

If your browser cannot play a video, one reason might be that _______________> a. the file include an audio track b. your browser doesn't have the necessary plugin c. the file is streaming d. the file was downloaded

b. your browser doesn't have the necessary plugin

Bikes.com is an example of a(n) _______________. a. URL b. hypertext link c. domain name d. Web page

c. domain name

The cookies in Figure 4-44 are _______________. a. stateless b. session c. persistent d. second-party

c. persistent

In Figure 4-36, what generated the Web page? a. A database b. An HTML document c. A query d. A server-side script

d. A server-side script

Which of the following would not be considered part of the invisible Web? a. Library of Congress catalog record for a book b. Facebook posts c. A syllabus in the Blackboard learning management system d. An article on CNN entertainment news

d. An article on CNN entertainment news

What do the rectangles in Figure 4-2 represent? a. The Web b. The Internet c. Web sites d. Linked documents

d. Linked documents

How many Web sites are stored on a Web server? a. None b. One c. A maximum of 10 d. One or more

d. One or more

Which one of the following cannot be customized? a. Tabs b. Predictive services c. The home page d. The Close button

d. The Close button

How would you summarize the security risk involved in allowing your browser to store passwords? a. It is not a risk. b. It is a security risk and should be avoided. c. It is more secure to store passwords online. d. The convenience of stored passwords might be worth the small risk.

d. The convenience of stored passwords might be worth the small risk.

The Head section of an HTML document contains _______________. a. the title b. the DOCTYPE declaration c. the <html> declaration d. all of the above

d. all of the above


Set pelajaran terkait

Ch 1 The Uniform Securities Act - Definitions

View Set

Chapter 6 - Personality (and the emerging self) - 175 - 187

View Set

Economic Globalization Assignment

View Set

exam 3 Entrepreneurship chapter 11

View Set

PSYC 203 Chapter 5: Disorders of Trauma and Stress

View Set

Study Guide_Final_PHS112_Pool01_answers.rtf

View Set