CSCI multiple choice pt 1 final
wiki
A ______ is a collaborative Web site that can accessed and edited by anyone who wants to contribute to it.
query processor
A search engine's _____ looks for your search terms in the search engine's indexed database and returns a list of relevant Web sites.
Proxies
A trade-off to the anonymity offered by anonymous _____ is that they tend not to operate at the same speed as your regular browser.
Spam filter
A(n) ______ is a type of utility software that captures unsolicited emails before they reach your inbox.
Web Site
A(n) _______ is a collection of related information organized and formatted so it can be accessed using software called a browser.
browser
A(n) _______ is client software that displays Web page elements and handles links between pages.
HTML script
A(n) is a series of instructions that is embedded directly into an HTML document that instruct the browser to carry out specific actions or to respond to specific user actions.
Phishing
An e-mail scam designed to persuade you into revealing confidential information by replying to an e-mail is called ______.
cookies
Flash_____ can collect and store personal data, such as a user's process in a game.
quotations marks
For the next search, she wants only Web pages containing the complete phrase "Mars exploration." Which search operator should she use to formulate her query?
forms
HTML ____ are typically used to collect shipping and payment information during checkout at an e-commerce Web site.
meta tag
HTML code that a web page creator places in the page header for the specific purpose of informing WEb reobots about the content of the page
message header
In an e-mail message, such as the one found in the accompanying figure, the recipient's e-mail address and the message subject are found in the ______.
Web bugs
Junk e-mail messages may use ____ to monitor the number of people who view the e-mail. The data is collected and sometimes used to determine the direction of marketing campains.
stuffing
Keyword ____ is an unethical practice in which meta keywords are manipulated to gain high relevancy rankings.
Web-based
Melissa checking her email all over the world.
Bcc
Melissa wants to save some time and send her resume to all the human resources offices of her target employers at one time.
MIME
Multipurpose Internet Mail Extensions. Specifies how to encode non-text data, such as graphics and sound, so it can travel over the Internet
meta
Often, Web page authors include a(n) _____ keyword in a header section of a Web page when it is created to describe the page contents.
indexer
Search engine ____ software is designed to pull keywords from a Web page and store them in a database.
crawler
Some search engines use a program called a Web _____ that combs the Web to gather data that is representative of the contents of Web pages.
*
The _____ wildcard character allows a search engine to find pages with any derivation of a basic word.
Bcc
To include a third party on an e-mail message to someone without informing them of the third party recipient, you should ______.
client
To use POP e-mail you must install e-mail _____ software on your computer.
fair use
US copyright law that allows a limited amount of copyrighted information to be used
False
Web pages that provide a secure connection start with httpx: instead of http:.
your name
When you use a search engine, it stores all the following information about your query EXCEPT _____.
cache
When your browser fetches pages and graphics to form a Web page, it stores them in temporary files on your hard drive called a Web ____.
Web-based
_____ e-mail stores your e-mail messages on a server, where you have less control over who can access them.
Anti-spyware
_____ software is a type of security software designed to identify and neutralize Web bugs, ad-serving cookies and other types of malware.
Pharming
______ Schemes redirect users to fake sites by poisoning a domain name server with a fake IP address.
IMAP (Internet messaging Access protocol)
______ is similar to POP, but it gives you the option of downloading your mail or leaving it on the server.
POP (post office Protocol)
______ temporarily stores new messages in your inbox on an inbox on an e-mail server. When you request your mail, it is download and stored on your computer.
HTTP
_______ is the protocol that works in conjuction with TCP/IP to get Web resources to your desktop.
search engine
a Web site that finds other Web pages that match a word or phrase you enter
World Wide Web
a collection of files that reside on computers
Web robot (bot or spider)
a program that automatically searches the Web to find new Web sites and updtae information about old web sites that are already in the database
Web servers
connected to the internet
read-only
file that you can view but that you cannot change
Web server name
http:// www.cnn.com/showbiz/movies.htm In the URL found in the accompanying figure, www.cnn.com is the ______.
Web protocol standard
http:// www.cnn.com/showbiz/movies.htm In the URL in the accompanying figure, http is the _______.
InPrivate Browsing mode
if you do not wish to have this information store. Use this is internet explorer
Private browsing mode
if you do not wish to have this information stored, use this in firefox
internet
interconnected network. how networks are connected to each other
Primary browsers in use today
internet explorer mozilla firefox google chrome safari
POP messages or POP3
messages that are routed through a domain
Incognito mode
private browsing in google chrome
SMTP
simple mail transfer protocol. Determines which paths an email message takes on the Internet
Internet
specific interconnected network that connects computers all over the world using a common set of interconnection standards
Web browser
the software that allows your computer or device to connect to, locate, retrieve, and display Web content
metasearch engine
tool that combines the power of multiple search engines
web client
when you use your Internet connection to become part of the Web