E-Commerce Chapter 2
IPv6 uses a _____ number for addresses.
128 bit
In HTML, hyperlinks are created using the HTML _____ tag.
Anchor
_____ is the amount of data that can travel through a communication medium per unit of time.
Bandwidth
The combination of telephone lines and the closed switches that connect them to each other is called a ____.
Circuit
A(n) ______ is any technology that allows people to connect to computers to each other.
Computer Network
A(n) ______ is used when the Internet extends beyond the boundaries of an organization and includes networks of other organizations.
Extranet
A network of computers that are located in the same building is called a wide area network.
False
An HTML document is similar to a word-processing document in that it specifies how a particular text element will appear.
False
An intranet extends beyond the organization that created it.
False
IP addresses appear as five decimal numbers separated by periods.
False
The Internet provides a high degree of security in its basic structure.
False
The USENET was the earliest of the networks that eventually combines to become what we now call the Internet.
False
The leftmost part of a domain is called a top-level domain (TLD).
False
The most important parts of a Web page are the graphics, photographs, and small programs that run in the Web browser.
False
The word "virtual," used as a part of virtual private networks means that the network connection is permanent.
False
The early versions of ____ let Web page designers create text-based electronic documents with headings, title bar titles, bullets, lines, and ordered lists.
HTML
Internet _____ are computers that are directly connected to the Internet.
Hosts
In HTML, the text elements that are related to each another are called ______ elements.
Hypertext
A(n) ______ is a computer that stores files written in HTML.
Hypertext Server
The set of rules for delivering Web page files other the Internet is in a protocol called the ______.
Hypertext Transfer Protocol (HTTP)
A newer e-mail protocol that performs the same basic functions as POP, but includes additional features, is known as _____.
IMAP
_____ lets users create and manipulate e-mail folders and individual e-mail messages while the message are still on the e-mail server.
IMAP
The _____ in TCP/IP specifies the addressing details for each packet, labeling each with the packet's origination and destination addresses.
IP
The 32-bit number used to identify computers connected to the Internet is known as the _____.
IP Address
_____ creates a private passageway through the public Internet that provides secure transmission from one computer to another.
IP tunneling
A computer which uses a specific set of rules and connects networks all over the world to each other is called the _____.
Internet
The _____ is a subnet of the computers on the Internet that are connected to one another in a specific way that makes them and their contents easily accessible to each other.
Internet
The subnet of the Internet includes computers and sensors connected to each other for communication and automatic transaction processing is called the _____.
Internet of Things
A group of network research scientists from nearly 200 universities and a number of major corporations joined together in 1996 to recapture the original enthusiasm of the ARPANET and created an advanced research network called ______.
Internet2
A _____ is a permanent telephone connection between two points.
Leased Line
A(n) ______ hyperlink structure resembles conventional paper documents in that the reader begins on the first page and clicks a Next button to move to the next page in a serial fashion.
Linear
A _____ structure resembles an inverted tree in which the root is at the top and the branches are below it.
Linear Hyperlink
_____ is a set of rules for handling binary files, such as word-processing documents, spreadsheets, photos, or sound clips that are attached to e-mail messages.
MIME
A(n) _____ is an e-mail address that forwards any message it receives to any user who has subscribed to the list.
Mailing List
A(n) _____ is a language that can be used to define other languages.
Metalanguage
_____ was the first Web browser that became widely available for personal computers.
Mosaic
Companies known as _____ sell Internet access rights directly to larger customers and indirectly to smaller firms and individuals through other companies, called ISPs.
Network Access Providers
In subnetting, a computer called a _____ device converts private IP addresses into normal IP addresses when it forwards packaets from those computers on the Internet.
Network Address Translation (NAT)
Usenet survives on the Internet today, with more than 1000 different topic areas that are called _____.
Newsgroups
A(n) _____ is a set of standards that defines, in detail, the relationships among resource description framework (RDF) standards and specific extensible markup language (XML) tags within a particular knowledge domain.
Ontology
A(n) _____ has a hypertext reference (HREF) property, which specifies the remote or local document's address.
Opening Tag
Files and e-mail message sent over the Internet are broken down into small pieces called ______
Packets
A _____ is a collection of rules for formatting, ordering, and error checking data sent across a network.
Protocol
_____ determine how a sending device indicates that it has finished sending a message and how the receiving device indicates that it has received the message.
Protocols
The computer that decides how to best forward each packet from on network to another are called ______.
Routers
The programs on gateway computers that determine the best path on which to send each packet contain rules called _____.
Routing Algorithms
HTML, XML, and XHTML have descended from the original _____ specification.
SGML
_____ specifies the format of a mail message and describes how mail is to be administered on the e-mail server and transmitted on the Internet.
Simple Mail Transfer Protocol (SMTP)
A(n) _____ is a set of instructions that gives Web developers more control over the format of displayed pages.
Stylesheet
The _____ controls the disassembly of a message or a file into packets before it is transmitted over the Internet, and it controls the reassembly of those packets into their original formats when they reach their destinations.
TCP
HTML was developed by _____.
Tim Berners-Lee
A hierarchical hyperlink structure resembles conventional paper documents in that the reader begins on the first page and clicks the Next button to move to the next page in a serial fashion.
True
At a technological level, the Web is nothing more than software that runs on computers that are connected to the Internet.
True
E-mail was born in 1972 when a researcher wrote a program that could send a receive messages over the Defense Department network.
True
Extranets were used to save money and increase efficiency by replacing traditional communication tools such as fax, telephone, and overnight express document carriers.
True
Networks of computer and the Internet that connects them to each other form the basic technological structure that underlies virtually all electronic commerce.
True
Post Office Protocol (POP) allows the user to view only the header and the e-mail sender's name before deciding to download the entire message.
True
Public networks, private networks, and VPNs are independent of organizational boundaries.
True
SGML offers a system of marking up documents that is independent of any software application.
True
Simple Mail Transfer Protocol (SMTP) is a common protocol used for sending and retrieving e-mail.
True
The Internet Corporation for Assigned Names and Numbers (ICANN) has the responsibility of managing domain names and coordinating them with the IP address registrars.
True
The Post Office Protocol (POP) provides support for Multipurpose Internet Mail Extensions.
True
The Semantic Web project envisions words on Web pages being tagged with their meanings.
True
The first e-mail mailing lists appeared on military and education research networks.
True
The higher the bandwidth, the faster the transmission of data through a communication medium.
True
The term "cascading" is used in cascading style sheets because designers can apply many style sheets to the same Web page, one on top of the other.
True
Virtual private network software must be installed on the computers at both ends of a transmission.
True
The combination of a protocol name and a domain name is called a(n) _____.
Uniform Resource Locator (URL)
_____ is a measure of the amount of information that can travel from a user to the Internet in a given amount of time.
Upload Bandwidth
In 1979, a group of students and programmers at Duke University and the University of North Carolina started _____, which allows anyone who connects to the network to read and post articles on a variety of subjects.
Usenet
_____ is a connection that uses public networks and their protocols to send data using a technology called IP tunneling
Virtual Private Network
The purpose of a(n) _____ is to respond to requests for Web pages from Web clients.
Web server
_____ tags convey the meaning (the semantics) of the information included within them.
XML
_____ uses paired start and stop tags in much the same way as a database software defines a record structure.
XML