Web and email
false
Scripts were designed to replaced normal HTML.
Ada
Server side scripts can be written using any of the following except__.
XHTML
(extensible HTML) a markup language that is very similar to HTML but is stricter about punctuation and other details of coding...sometimes called HTML
Web bug or clear GIF
1x1 pixel graphic embedded in a Web page or email message. Almost invisible due to size and is designed to track who's reading the web page or message
false
A C2C e-commerce transaction occurs when an individual consumers purchase goods and services from online merchants.
false
A Web indexer is a computer program that is automated to methodically visit Web sites.
status code
A Web server's response to a browser's request includes an HTTP ____ that indicates whether the browser's request could be fulfilled.
Persistent
A ____Http connection reuses the same HTTP connection to send and receive multiple requests.
true
A conversion process called MIME provides clever way of disguising digital photos, sounds, and other media as plain ASCII code that can travel over the iNternet as email attachments.
Meta keyword
A___keyword is entered into a header section of a web page when it is created and is supposed to describe the page contents.
Sockets
An HTTP exchange takes place over a pair of_______.
Html
An email message in_______format can include graphics in addition to a wide variety of fonts and font colors.
quotations marks
For the next search, she wants only web pages containing the complete phrase, "mars exploration". which search operator should she use to formulate her query?
true
Http is a protocol that works with TCP/IP to get Web resources to your desktop.
File extension
In the URL found in the figure. .htm is the____.
Folder name
In the URL, http;//www.cnn.com/showbiz/movies.htm, showbiz is a________.
Web server name
In the URL, http;//www.cnn.com/showbiz/movies.htm, www.cnn.com is the___.
Pop3
Incoming mail can be stored on a ___server until it is downloaded to the inbox on your hard disk.
Stuffing
Keyword____is an unethical practice in which meta keywords are manipulated to gain high relevancy rankings.
B2B
Paypal is a pioneering example of a _______payment system.
email protocol
POP3 pulls mail down, IMAP will leave copy of message on server not just local machine, SMTP for sending to push mail out
false
Pharming is less surreptitious and easier to detect than most other hacker schemes.
search engine optimization
SEO, can affect the ranking and visibility of Web pages
*
The ____wildcard character allows a search engine to find pages with any derivation of a basic word.
URL
Uniform resource locator/ unique address
Surfer
Visitors to a web site are sometimes called Web_________.
True
Web 3.0 refers to innovations like cloud computing and other new technologies likely to further change the way we use the Web.
HTML
When working with_______mail, make sure your antivirus software is checking incoming messages
B2C
When you purchase a textbook online from a site like www.amazon.com, you are participating in ____ e-commerce.
Web bug
When you view a page infested with a_____an Http set cookie request automatically goes to a third party server, which may set a cookie on your computer for later retrieval or record your IP address.
Cookies
_______allow a web site to store information on the client computer for later retrieval.
IMAP
___is similar to POP3, but it leaves messages on the server until you specifically delete them.
The World wide web
a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called HTTP.
Web crawler
a computer program that is automated to methodically visit Web sites
false
a flash cookie is typically a 1x1 pixel graphic embedded in a web page or email message designed to track who is reading the web page or email message.
server side
a popular ___activity is verifying billing data at an ecommerce site.
plug in
a program that extends a browsers ability to work with file formats
search operator
a word or symbol that describes a relationship between search terms and thereby helps you create a more focused query (and, or, not, " ", * ..)
flash cookie
also called, local shared object, is the flash equivalent of a conventional Web cookie.
Web server
an Internet based computer that stores Web site content and accepts requests from browsers
an electronic document transmitted over a computer network-need email connection, software, and account.
phishing
an email scam designed to persuade you to reveal confidential information, such as your bank account number or social security number
pharming
an exploit that redirects users to fake sites by poisoning a domain name server with a false IP address
C2C sites
auction site like ebay
e-commerce
business transactions conducted electronically over a computer network (B2C-business to consumer, C2C etc)
Interactive web page
can interact with this page
Javascript
commonly used to add logic and other programmable elements to a Web page
bidirectional links
connect two documents using a two-way that can be followed from either document.
dynamic Web page
customized content in response to keyboard or mouse actions, or based on information supplied directly or indirectly by the person viewing the page.
Webmail
free service and access through web browser
static Web page
displays same information regardless of who accesses it.
unidirectional links
document a links to document b
client side
embedded in an HTML document and run locally when a Web page is displayed by a browser.
HTTP secure connection
encrypts data stream between client devices and servers
meta keyword
entered into a header section of a Web page when it is created and is supposed to describe the page contents (keyword stuffing)
false
http provides a secure connection for web based transactions.
HTML
hypertext markup language, set of specifications for creating documents that a browser can display as a Web page
HTTPS
hypertext transfer protocol secure
HTTP
hypertext transfer protocol, communication protocol that works with TCP/IP to get the elements for Web pages to a local browser
false
in a POP3 email system, your messages remain on a web server, rather than being downloaded to your computer.
netiquette
internet ettiquette
Web page
is based on an HTML source document that is stored as a file on a Web server.
Web browser
is client software that displays Web page elements and handles links between those pages.
link popularity
is measured by quality and quantity of links from one Web page to others
BCC
people won't have to scroll through addresses to reach the message
antispyware
neutralizes bugs
ad-blocking software
prevents ads from appearing on screens
search engine query
processor looks for you search terms in search engine's indexed database and returns a list of relevant Web sites
ad-serving cookies
receive cookie when shop at a site, reads ad serving cookie at next site and shows what sites you have been to.
server side scripts
run on Web servers rather than on your local device
client side
scripts tend to be used for interactive user interface elements.
SSL
secure sockets layer
cookies
small chunk of data generated by a Web server and stored in a text file on computers hard disk
email attachments
software converts email attachment using a conversion process called MIME (multipurpose internet mail extension)-converts to format for transfer
search engine indexer
software that pulls keywords from a Web page and stores them in an index database
linkrot
sometimes links lead to pages that are no longer available
HTML tags
specify how the document should appear when displayed in a browser window
local email
stores mail on the server stores incoming messages until you launch you email client and get your mail -Based on store and forward technology
TLS
transport layer security
spam filter
type of utility software that captures unsolicited email messages before they reach your inbox.
Web site
typically contains a collection of related information organized and formatted so it can be accessed using a browser
spam
unwanted electronic junk mail, major hacking tool for cybercriminals with phishing
hypertext
used to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read.
anonymous proxy
uses proxy server to relay Web page requests after masking the originating IP address. -encrypts address, web page is sent through proxy server.
hypertext links
web pages connected by these (syllabus that contains links to other documents)
browser cache
when browser fetches pages and graphics to form a Web page, it stores material on device in temporary files
cache
when your browser fetches pages and graphics to form a web page, it stores them in temporary files on your hard drive called a web______.