Chapter 9 Review
Hyperlink
A ____ is a clickable navigation element in a web page.
hyperlink
A ____ is a clickable navigation element, in a webpage to another webpage of the same website, or even a completely new website.
Computer virus
A ____ is a malicious computer program that can copy itself and infect a computer, typically without the user being aware of it.
virus
A ____ is a malicious computer program that can copy itself and infect a computer, typically without the user being aware of it.
Worm
A ____ is like a virus in that it spreads quickly and is extremely harmful, but does not need to attach itself to an existing program.
firewall
A ____ is specialized hardware and software working together that insures that only authorized personnel within an organization can use the Intranet.
Trojan horse
A ____ is usually a harmless or interesting looking program that when executed, unleashes harmful viruses into a users system.
knowledge system
A ____ lets employees exchange ideas and content within their own organizations.
Browser
A ____, is application software that provides an interface which lets a user display and interacts with text, images, and other information located on the World Wide Web.
server; client
A computer on a network that stores webpages is called the ____ or shot, and the computer on the network that requests those webpages is called a ____.
browser application
A website is a collection of web pages on a server which can be requested by a client and displayed with
browser application software
A website is a collection of web pages on a server which can be requested by a client and displayed with ____ which exist on a server somewhere on the World Wide Web.
Browser
A website is a collection of web pages on a server which can be requested by a client and displayed with a
Interactive
A website that engages the user makes it memorable is said to be
Intranet
A(n) ____ is a like a private version of the Internet that works the same way as the Internet, but is confined within an organization.
Internet Service Provider (ISP)
An ____ is a business or organization that provides people a way to access the Internet and World Wide Web.
browser
Essentially, a ____ is used to display information from the WWW onto your computer screen.
intranet
Firewalls keep public networks like the Internet from accessing private networks like an
Standard protocol
Http refers to the ____, or the rules of exchanging files from a server to a client on the Internet.
Advance Research Project Agency Network (ARPANET)
In 1969 at the University of California at Los Angeles (UCLA), ____ was born, one of the precursors to today's Internet.
World Wide Web (WWW)
It is important to know that the ____ is a part of the Internet.
virtual storefronts
Large established retail organizations can enhance their scope and reach beyond physical boundaries by opening ____ on the Web.
HTML
Most web pages are typically programmed with
Web developers or webmasters
People that produce websites are called
Webmasters/web developers
People that produce websites are called
javaScript
Some browsers are able to understand a programming language called ____ as well as HTML.
Keyword search engines
Some search engines, called "____" only require the user to type in the keyword or phrase.
outside hackers
The Internet and the World Wide Web are public, which means that your browser and computer can be compromised by
Client/Server
The Internet is a network called a ____ model.
client/server
The Internet is a network called a ____ model.
Privacy
The key aspect of an Intranet is
information or content
The most important aspect of any website is always its
content
The most important aspect of any website is always its information, or
Windows Internet Explorer
The most popular browser is
doing business; rules of business still apply
The promises of e-commerce are limitless, so it is extremely important to remember that e-commerce is still the process of "____" on the Web, and therefore, all ____.
Hypertext Markup Language (HTML); Hypertext Transfer Protocol (TTP)
Tim Berners-Lee at CERN (Center for European Nuclear Research) invented a standard programming language called ____ and the protocol to move information through the internet called ____
telephony
VoIP is a subset of
Phone service (typically phone calls over the Internet)
VoIP is often referred to as
World Wide Web
WWW refers to
Joint Photographic Expert Group (JPEG) and Graphics Interchange Format (GIF)
We browsers display images with ____ file formats.
Uniform Resource Locators (URLs)
Websites have address called
Never answer or even open a spam email
What can be done to reduce or eliminate spam?
Usually a harmless or interesting looking program that when executed, unleashes harmful virus into a user's system.
What is a trojan horse?
Internet: (Network) is available to everyone, and everyone can see it Intranet: Private version of the internet, one that is confined within an organization
What is the difference between the Internet and an Intranet?
None of the recipients know who else received the same email, or whether anyone other than them received it at all.
What is the point of a blind carbon copy in an email system and how does it work?
VoIP (Voice over Internet Protocol)
What sort of products use telephony?
Specifically outlines e-mail usage and protocols.
Why do email server owners have Term of Service Agreements?
Internet Protocol address (IP)
With millions of computers connected to the Web, it becomes important to come up with an address system or an ____ in order to identify and communicate throughout the network.
internet
Without a firewall, an Intranet is just another part of the
Bookmarts
____ are also called "Favorites".
Popups
____ are separate browser windows that are programmed by website designers to open extra browser windows without user interaction, typically an advertisement, while accessing a website.
Cookies
____ are text files sent to a browser and then sent back unchanged by he browser to the originating server.
Cookies
____ are text files sent to a browser and then sent back unchanged by the browser to the originating server.
Metasearch
____ engines look and work like keyword searches, but return the results of many search engines at once and eliminate duplicates hits.
Consumer to Consumer (C2C)
____ involves e-commerce between consumers, usually facilitated some third party.
Broadband Internet access ("broadband")
____ is a high data-transmission rate Internet connection.
Search engine
____ is a website that lets a user type in specific keywords or phrases and then returns a list of hits (hyperlinks) that best match the search criteria.
Business to Business (B2B)
____ is businesses distributing, buying, selling, advertising, and marketing of goods or services over the Web to other businesses. ____ transactions are inclined to take place within specific categories.
Spyware
____ is software that installs itself on a user's system without permission and gleans personal data and information about a user without their knowledge or permission.
Adware
____ is software which routinely displays advertising to a computer system after the software is installed, usually without the users consent.
Electronic commerce
____ is the distributing, buying, selling, advertising, and marketing of goods or services over the Web.
e-commerce
____ is the distributing, buying, selling, advertising, and marketing of goods or services over the Web.
Communication
____ is the most common use of the Internet.
Voice over Internet Protocol (VoIP)
____ is the routing of voice conversations, or typically, phone calls over the Internet.
Connectivity
____ is when one computer can connect to another or many computers and share information and resources.
Caching
____ is when the browser stores copies on a user's computer of previously viewed web pages that a user has already accessed so it does not have to find it again on the World Wide Web or request it again from the originating server.
Caching
____ is when the browser stores copies on a user's computer of previously viewed web pages that a user has already accessed so it does not have to find it again on the World Wide Web.
Browser hijacking
____ is when the browser's setting are modified by Malware.
Business to Consumer (B2C)
____ is where commercial organizations sell to consumers.
Internet hosting services
____ runs Internet servers, which are then available to serve content such as webpages to the Internet, or clients.
Cookies
____are text files sent to a browser and the sent back unchanged by the browser to the originating server.
spam
any unwanted mail like phishing is called