.


:




:

































 

 

 

 


Search operator is a word or




Ad-blocking software

a) to prevent ads from appearing on their screens.

b) claim that the datain their cookies is used simply to select and display ads that might interestyou.

c) which uses an intermediary, or proxy, serverto relay Web page requests after masking the originating IP address

d) is a type of security software designed to identify and neutralize Web bugs, ad-serving cookies, and other spyware.

e) Online storefronts offer goods, merchandise, andservicesto consumers.

2. ad‑servingcookies

a) claim that the datain their cookies is used simply to select and display ads that might interestyou.

b) to prevent ads from appearing on their screens.

c) which uses an intermediary, or proxy, serverto relay Web page requests after masking the originatingIP address

d) is a type of security software designed to identify and neutralize Web bugs, ad-serving cookies, and other spyware.

e) Online storefronts offergoods, merchandise, andservicesto consumers.

 

Anonymous proxy service

a) which uses an intermediary, or proxy, serverto relay Web page requests after masking the originatingIP address

b) claim that the datain their cookies is used simply to select and display ads that might interestyou.

c) to prevent ads from appearing on their screens.

d) is a type of security software designed to identify and neutralize Web bugs, ad-serving cookies, and other spyware.

e) Online storefronts offer goods, merchandise, andservicesto consumers.

 

 

Antispyware

a) is a type of security software designed to identify and neutralize Web bugs, ad-serving cookies, and other spyware.

b) claim that the datain their cookies is used simply to select and display ads that might interestyou.

c) to prevent ads from appearing on their screens.

d) which uses an intermediary, or proxy, serverto relay Web page requests after masking the originatingIP address

 

e) Online storefronts offergoods, merchandise, andservicesto consumers.

 

B2C

a) Online storefronts offergoods, merchandise, andservicesto consumers.

b) claim that the datain their cookies is used simply to select and display ads that might interestyou.

c) to prevent ads from appearing on their screens.

d) which uses an intermediary, or proxy, serverto relay Web page requests after masking the originatingIP address

e) is a type of security software designed to identify and neutralize Web bugs, ad-serving cookies, and other spyware.

B2B and B2G

a) Businesses sell goods and services to other businessesor to the government.

b) is an advertisementembedded at the top of a Web page.

c) Consumers sell to each other at popular auction and list sites such as eBay and

d) craigslist.

e) the number of times that site visitors click the ad to connect to theadvertisers site.

f) (technically an HTTP cookie) is a smallchunk of data generated by a Web server and stored in a text file on yourcomputers hard disk.

 

Bannerad

a) is an advertisementembedded at the top of a Web page.

b) Businesses sell goods and services to other businessesor to the government.

c) Consumers sell to each other at popular auction and list sites such as eBay and

d) craigslist.

e) the number of times that site visitors click the ad to connect to theadvertisers site.

f) (technically an HTTP cookie) is a smallchunk of data generated by a Web server and stored in a text file on yourcomputers hard disk.

 

C2C

a) Consumers sell to each other at popular auction and list sites such as eBay and craigslist.

b) Businesses sell goods and services to other businessesor to the government.

c) is an advertisementembedded at the top of a Web page.

d) the number of times that site visitors click the ad to connect to theadvertisers site.

e) (technically an HTTP cookie) is a smallchunk of data generated by a Web server and stored in a text file on yourcomputers hard disk.

 

Click-through rate

a) the number of times that site visitors click the ad to connect to theadvertisers site.

b) Businesses sell goods and services to other businessesor to the government.

c) is an advertisementembedded at the top of a Web page.

d) Consumers sell to each other at popular auction and list sites such as eBay and craigslist.

e) (technically an HTTP cookie) is a smallchunk of data generated by a Web server and stored in a text file on yourcomputers hard disk.

 

10. When the HTML source document thats received by your local browser handles interactions, the process is referred to

a) client-side

b) cookie

c) e-commerce

d) e-mail account

e) e-mail address

Cookie

a) (technically an HTTP cookie) is a smallchunk of data generated by a Web server and stored in a text file on yourcomputers hard disk.

b) the number of times that site visitors click the ad to connect to theadvertisers site.

c) Businesses sell goods and services to other businessesor to the government.

d) is an advertisementembedded at the top of a Web page.

e) Consumers sell to each other at popular auction and list sites such as eBay and

E-commerce

a) typically refers to business transactionsthat are conducted electronically over a computer network.

b) gets your electronicmailbox set up on an e-mail server.

c) is an electronicdocument transmitted over a computer network.

d) a computerthat essentially acts as a central post office for a group of people.

e) is created by the Web sitethat you are visiting.

 

E-mail account

a) gets your electronicmailbox set up on an e-mail server.

b) typically refers to business transactions that are conducted electronically over a computer network

c) is an electronic document transmitted over a computer network.

d) a computer that essentially acts as a central post office for a group of people.

e) is created by the Web site that you are visiting.

f) also called a local shared object, is the Flash equivalent of a conventional Web cookie.

 

14.Whether you use local e-mail or Webmail, your e-mail account has a unique

A) e-mail address

B) hover ad

c) Flash cookie

D) first-party cookie

e) e-mail server

15.Any file that travels with an e-mail message is called an

A) e-mail attachment

B) hover ad

c) Flash cookie

D) first-party cookie

e) e-mail server

16.The software you use to send, receive, and manage messages is called

A) e-mail client software

B) hover ad

c) Flash cookie

D) first-party cookie

e) e-mail server

 

E-mail message

a) is an electronic document transmitted over a computer network.

b) gets your electronicmailbox set up on an e-mail server.

c) typically refers to business transactions that are conducted electronically over a computer network

d) a computer that essentially acts as a central post office for a group of people.

e) is created by the Web site that you are visiting.

 

18.The computers and software that provide e-mail services form an

a) e-mail system.

B) e-mail client software

C) hover ad

d) Flash cookie

E) first-party cookie

 

E-mail server

a) a computerthat essentially acts as a central post office for a group of people.

b) is an electronic document transmitted over a computer network.

c) gets your electronicmailbox set up on an e-mail server.

d) typically refers to business transactions that are conducted electronically over a computer network

e) is created by the Web site that you are visiting.

 

First-party cookie

a) is created by the Web sitethat you are visiting.

b) a computerthat essentially acts as a central post office for a group of people.

c) is an electronic document transmitted over a computer network.

d) gets your electronicmailbox set up on an e-mail server.

e) typically refers to business transactions that are conducted electronically over a computer network

 

Flash cookie

a) also called a local sharedobject, is the Flash equivalent of a conventional Web cookie.

b) overlays thecontent on a Web page, sometimes obscuring it until you click the ad or itstimer expires and the ad disappears.

c) (Hypertext Markup Language) is a setof specifications for creating documents that a browser can displayas a Web page.

d) adds HTML tags to a document, spreadsheet,or other text-based file to create an HTML document that can bedisplayed by a browser.

e) which is similar to a word processing file, but hasan.htm or.html extension.

 

Hover ad

a) overlays thecontent on a Web page, sometimes obscuring it until you click the ad or itstimer expires and the ad disappears.

b) also called a local sharedobject, is the Flash equivalent of a conventional Web cookie.

c) (Hypertext Markup Language) is a setof specifications for creating documents that a browser can displayas a Web page.

d) adds HTML tags to a document, spreadsheet,or other text-based file to create an HTML document that can bedisplayed by a browser.

e) which is similar to a word processing file, but hasan.htm or.html extension.

HTML

a) (Hypertext Markup Language) is a setof specifications for creating documents that a browser can displayas a Web page.

b) also called a local sharedobject, is the Flash equivalent of a conventional Web cookie.

c) overlays thecontent on a Web page, sometimes obscuring it until you click the ad or itstimer expires and the ad disappears.

d) adds HTML tags to a document, spreadsheet,or other text-based file to create an HTML document that can bedisplayed by a browser.

e) which is similar to a word processing file, but hasan.htm or.html extension.

 

HTML conversion utility

a) adds HTML tags to a document, spreadsheet,or other text-based file to create an HTML document that can bedisplayed by a browser.

b) (Hypertext Markup Language) is a setof specifications for creating documents that a browser can displayas a Web page.

c) also called a local sharedobject, is the Flash equivalent of a conventional Web cookie.

d) overlays thecontent on a Web page, sometimes obscuring it until you click the ad or itstimer expires and the ad disappears.

e) which is similar to a word processing file, but hasan.htm or.html extension.

 

HTML document

a) which is similar to a word processing file, but hasan.htm or.html extension

b) (Hypertext Markup Language) is a setof specifications for creating documents that a browser can displayas a Web page.

c) also called a local sharedobject, is the Flash equivalent of a conventional Web cookie.

d) overlays thecontent on a Web page, sometimes obscuring it until you click the ad or itstimer expires and the ad disappears.

e) adds HTML tags to a document, spreadsheet,or other text-based file to create an HTML document that can bedisplayed by a browser.

 

 

HTML form

a) uses the <form> tagto accept typed input.

b) is aterm used for e-mail messages containing HTML tags that produce bold,italicized, and underlined text; fancy fonts; embedded graphics; and variousfont sizes.

c) that specify how the document should appear when display n a computer screen or printed.

d) the current version was introduced in 2010.

e) is a protocol that works with TCP/IPto get Web resources to your desktop.

 

HTML mail

a) is aterm used for e-mail messages containing HTML tags that produce bold,italicized, and underlined text; fancy fonts; embedded graphics; and variousfont sizes.

b) uses the <form> tagto accept typed input.

c) that specify how the document should appear when display a computer screen or printed.

d) the current version was introduced in 2010.

e) is a protocol that works with TCP/IPto get Web resources to your desktop.

 

HTML tags

a) that specify how the document should appear when displayedon a computer screen or printed.

b) uses the <form> tagto accept typed input.

c) is aterm used for e-mail messages containing HTML tags that produce bold,italicized, and underlined text; fancy fonts; embedded graphics; and variousfont sizes.

d) the current version was introduced in 2010.

e) is a protocol that works with TCP/IPto get Web resources to your desktop.

 

HTML5

a) the current version was introduced in 2010.

b) uses the <form> tagto accept typed input.

c) is aterm used for e-mail messages containing HTML tags that produce bold,italicized, and underlined text; fancy fonts; embedded graphics; and variousfont sizes.

d) that specify how the document should appear when displayedon a computer screen or printed.

e) is a protocol that works with TCP/IPto get Web resources to your desktop.

 

HTTP

a) is a protocol that works with TCP/IPto get Web resources to your desktop.

b) uses the <form> tagto accept typed input.

c) is aterm used for e-mail messages containing HTML tags that produce bold,italicized, and underlined text; fancy fonts; embedded graphics; and variousfont sizes.

d) that specify how the document should appear when displayedon a computer screen or printed.

e) the current version was introduced in 2010.

 

HTTP statuscode

a) that indicateswhether the browsers request could be fulfilled.

b) (Hypertext Transfer Protocol Secure) is acombination of HTTP and SSL/TLS that provides a secure connection forWeb-based transactions.

c) to describe a computer system that could storeliterary documents, link them according to logical relationships,and allow readers to comment and annotate what they read.

d) InternetMessage Access Protocol) are used to manage your incoming mail.

e) is commonly used to addlogic and other programmable elements to a Web page.

 

HTTPS

a) (Hypertext Transfer Protocol Secure) is acombination of HTTP and SSL/TLS that provides a secure connection forWeb-based transactions.

b) that indicateswhether the browsers request could be fulfilled.

c) to describe a computer system that could storeliterary documents, link them according to logical relationships,and allow readers to comment and annotate what they read.

d) InternetMessage Access Protocol) are used to manage your incoming mail.

e) is commonly used to addlogic and other programmable elements to a Web page.

 

Hypertext

a) to describe a computer system that could storeliterary documents, link them according to logical relationships,and allow readers to comment and annotate what they read.

b) that indicateswhether the browsers request could be fulfilled.

c) to describe a computer system that could storeliterary documents, link them according to logical relationships,and allow readers to comment and annotate what they read.

d) InternetMessage Access Protocol) are used to manage your incoming mail.

e) is commonly used to addlogic and other programmable elements to a Web page.

 

34.Whenusing a browser, you can access aWeb page by clicking a

a) Hypertextlink

b) local e-mail.

C) Link popularity

D) Keyword stuffing

E) JavaScript

IMAP

a) (InternetMessage Access Protocol) are used to manage your incoming mail.

b) that indicateswhether the browsers request could be fulfilled.

c) (Hypertext Transfer Protocol Secure) is acombination of HTTP and SSL/TLS that provides a secure connection forWeb-based transactions.

d) to describe a computer system that could storeliterary documents, link them according to logical relationships,and allow readers to comment and annotate what they read.

e) is commonly used to addlogic and other programmable elements to a Web page.

 

JavaScript

a) is commonly used to addlogic and other programmable elements to a Web page.

b) that indicateswhether the browsers request could be fulfilled.

c) (Hypertext Transfer Protocol Secure) is acombination of HTTP and SSL/TLS that provides a secure connection forWeb-based transactions.

d) to describe a computer system that could storeliterary documents, link them according to logical relationships,and allow readers to comment and annotate what they read.

e) InternetMessage Access Protocol) are used to manage your incoming mail.

 

Keyword stuffing

a) is an unethical practice in which meta keywords aremanipulated to gain high relevancy rankings.

b) is a measure of the qualityand quantity of the links from one Web page to others.

c) becauseauthors mark up documents by inserting special instructions.

d) is entered into a headersection of a Web page when it is created and is supposed to describe the page contents.

e) that searches a series of other searchengines and compiles the search results.

 

Link popularity

a) is a measure of the qualityand quantity of the links from one Web page to others.

b) is an unethical practice in which meta keywords aremanipulated to gain high relevancy rankings.

c) becauseauthors mark up documents by inserting special instructions.

d) is entered into a headersection of a Web page when it is created and is supposed to describe the page contents.

e) that searches a series of other searchengines and compiles the search results.

Markup language

a) becauseauthors mark up documents by inserting special instructions.

b) is an unethical practice in which meta keywords aremanipulated to gain high relevancy rankings.

c) is a measure of the quality and quantity of the links from one Web page to others.

d) is entered into a head rsection of a Web page when it is created and is supposed to describe the page contents.

e) that searches a series of other searchengines and compiles the search results.

Meta keyword

a) is entered into a headersection of a Web page when it is created and is supposed to describe the page contents.

b) is an unethical practice in which meta keywords aremanipulated to gain high relevancy rankings.

c) is a measure of the qualityand quantity of the links from one Web page to others.

d) becauseauthors mark up documents by inserting special instructions.

e) that searches a series of other searchengines and compiles the search results.

 

Metasearch engine

a) that searches a series of other searchengines and compiles the search results.

b) is an unethical practice in which meta keywords aremanipulated to gain high relevancy rankings.

c) is a measure of the qualityand quantity of the links from one Web page to others.

d) becauseauthors mark up documents by inserting special instructions.

e) is entered into a headersection of a Web page when it is created and is supposed to describe the page contents.

MIME

a) (Multipurpose Internet Mail Extensions)provides a clever way of disguising digitalphotos, sounds, and other mediaas plain ASCII code that can travel over the Internet with text-based e-mail data.

b) is online jargon for Internet etiquette.It is a series of customs or guidelines for maintaining civilized and effectivecommunications in online discussions and e-mail exchanges.

c) a cyberspace versionof the metal cart you wheel around a store and fill up with merchandise.

d) reuses the same HTTP connection tosend and receive multiple requests.

e) sometimes called a P2P payment, an online payment, or a thirdpartypayment) offers an alternative to credit cards.

 

Netiquette

a) is online jargon for Internet etiquette.It is a series of customs or guidelines for maintaining civilized and effectivecommunications in online discussions and e-mail exchanges.

b) (Multipurpose Internet Mail Extensions)provides a clever way of disguising digitalphotos, sounds, and other mediaas plain ASCII code that can travel over the Internet with text-based e-mail data.

c) a cyberspace versionof the metal cart you wheel around a store and fill up with merchandise.

d) reuses the same HTTP connection tosend and receive multiple requests.

e) sometimes called a P2P payment, an online payment, or a thirdpartypayment) offers an alternative to credit cards.

 

Online shopping cart

a) a cyberspace versionof the metal cart you wheel around a store and fill up with merchandise.

b) (Multipurpose Internet Mail Extensions)provides a clever way of disguising digitalphotos, sounds, and other mediaas plain ASCII code that can travel over the Internet with text-based e-mail data.

c) is online jargon for Internet etiquette.It is a series of customs or guidelines for maintaining civilized and effectivecommunications in online discussions and e-mail exchanges.

d) reuses the same HTTP connection tosend and receive multiple requests.

e) sometimes called a P2P payment, an online payment, or a thirdpartypayment) offers an alternative to credit cards.

 

Persistent HTTP connection

a) reuses the same HTTP connection tosend and receive multiple requests.

b) (Multipurpose Internet Mail Extensions)provides a clever way of disguising digitalphotos, sounds, and other mediaas plain ASCII code that can travel over the Internet with text-based e-mail data.

c) is online jargon for Internet etiquette.It is a series of customs or guidelines for maintaining civilized and effectivecommunications in online discussions and e-mail exchanges.

d) a cyberspace versionof the metal cart you wheel around a store and fill up with merchandise.

e) sometimes called a P2P payment, an online payment, or a thirdpartypayment) offers an alternative to credit cards.

 

Person-to-personpayment

a) (sometimes called a P2P payment, an online payment, or a thirdpartypayment) offers an alternative to credit cards.

b) (Multipurpose Internet Mail Extensions)provides a clever way of disguising digitalphotos, sounds, and other media as plain ASCII code that can travel over the Internet with text-based e-mail data.

c) is online jargon for Internet etiquette.It is a series of customs or guidelines for maintaining civilized and effective ecommunications in online discussions and e-mail exchanges.

d) a cyberspace versionof the metal cart you wheel around a store and fill up with merchandise.

e) reuses the same HTTP connection to send and receive multiple requests.

 

Pharming

a) is an exploit that redirects usersto fake sites by poisoning a domain name server with a false IP address.

b) is an e-mail based scam thats designed to persuade you to reveal confidential information such as your bank account number or Social Security number.

c) is a program that extends a browsers ability to work with file formats.

d) (Post Office Protocol version 3) used to manage your incoming mail.

e) such as the one in Figure7-29, is an advertisement that appears in a separate window when you connect to a Web page.

 

Phishing

a) is an e-mail based scam thatsdesigned to persuade you to reveal confidential information such as yourbank account number or Social Security number.

b) is an exploit that redirects users to fake sites by poisoning a domain name server with a false IP address.

c) is a program that extends a browsers ability to work with file formats.

d) (Post Office Protocol version 3) used to manage your incoming mail.

e) such as the one in Figure7-29, is an advertisement that appears in a separate window when you connect to a Web page.

 

Plug-in

is a program that extends a browsersability to work with file formats.

is an e-mail based scam thats designed to persuade you to reveal confidential information such as your bank account number or Social Security number.

is an exploit that redirects users to fake sites by poisoning a domain name server with a false IP address.

(Post Office Protocol version 3) used to manage your incoming mail.

such as the one in Figure7-29, is an advertisement that appears in a separate window when you connect to a Web page.

 

 

POP3

a) (Post Office Protocol version 3) used to manage your incoming mail.

b) is a program that extends a browsers ability to work with file formats.

c) is an e-mail based scam thats designed to persuade you to reveal confidential information such as your bank account number or Social Security number.

d) is an exploit that redirects users to fake sites by poisoning a domain name server with a false IP address.

e) such as the one in Figure7-29, is an advertisement that appears in a separate window when you connect to a Web page.

 

 

Pop-up ad

a) such as the one in Figure7-29, is an advertisement that appears in a separate window when you connect to a Web page.

b) is a program that extends a browsers ability to work with file formats.

c) is an e-mail based scam thats designed to persuade you to reveal confidential information such as your bank account number or Social Security number.

d) is an exploit that redirects users to fake sites by poisoning a domain name server with a false IP address.

e) (Post Office Protocol version 3) used to manage your incoming mail.

 

Query processor

a) looks for your search terms in thesearch engines indexed database and returns a list of relevant Web sites.

b) is software that pulls keywords from a Web page and stores themin an index database.

c) symbol that describes a relationship between search terms and therebyhelps you create a more focused query.

d) encrypts the data transmitted between your computer and a Website.

e) are symbols suchas:-) that represent emotions.

 

Search engineindexer

a) is software that pulls keywords from a Web page and stores themin an index database.

b) looks for your search terms in thesearch engines indexed database and returns a list of relevant Web sites.

c) symbol that describes a relationship between search terms and therebyhelps you create a more focused query.

d) encrypts the data transmitted between your computer and a Website.

e) are symbols suchas:-) that represent emotions.

 

search operator is a word or

a) symbol that describes a relationship between search terms and therebyhelps you create a more focused query.

b) looks for your search terms in thesearch engines indexed database and returns a list of relevant Web sites.

c) is software that pulls keywords from a Web page and stores themin an index database.

d) encrypts the data transmitted between your computer and a Website.

e) are symbols suchas:-) that represent emotions.

 

Secure connection

a) encrypts the data transmitted between your computer and a Website.

 

b) looks for your search terms in thesearch engines indexed database and returns a list of relevant Web sites.

c) is software that pulls keywords from a Web page and stores themin an index database.

d) symbol that describes a relationship between search terms and therebyhelps you create a more focused query.

e) are symbols suchas:-) that represent emotions.

 

Smileys

a) are symbols suchas:-) that represent emotions.

b) encrypts the data transmitted between your computer and a Website.

c) looks for your search terms in thesearch engines indexed database and returns a list of relevant Web sites.

d) is software that pulls keywords from a Web page and stores themin an index database.

e) symbol that describes a relationship between search terms and therebyhelps you create a more focused query.

 

SMTP

a) (Simple Mail Transfer Protocol) handles outgoing mail.

b) is an abstract concept that represents one end of a connection.

c) because it is the source of the HTML tags used to construct a Web page.

d) unwanted electronic junk mail about medical products, low-cost loans,and fake software upgrades that arrives in your online mailbox.

e) is a type of utility software that captures unsolicitede-mail messages before they reach your Inbox.

Socket

a) is an abstract concept that represents one end of a connection.

b) (Simple Mail Transfer Protocol) handles outgoing mail.

c) because it is the source of the HTML tags used to construct a Web page.

d) unwanted electronic junk mail about medical products, low-cost loans,and fake software upgrades that arrives in your online mailbox.

e) is a type of utility software that captures unsolicitede-mail messages before they reach your Inbox.

Sourcedocument

a) because it is the source of the HTML tags used to construct a Web page.

b) (Simple Mail Transfer Protocol) handles outgoing mail.

c) is an abstract concept that represents one end of a connection.

d) unwanted electronic junk mail about medical products, low-cost loans,and fake software upgrades that arrives in your online mailbox.

e) is a type of utility software that captures unsolicitede-mail messages before they reach your Inbox.

Spam

a) unwanted electronic junk mail about medical products, low-cost loans,and fake software upgrades that arrives in your online mailbox.

b) (Simple Mail Transfer Protocol) handles outgoing mail.

c) is an abstract concept that represents one end of a connection.

d) because it is the source of the HTML tags used to construct a Web page.

e) is a type of utility software that captures unsolicitede-mail messages before they reach your Inbox.

 

Spam filter

a) is a type of utility software that captures unsolicitede-mail messages before they reach your Inbox.

b) (Simple Mail Transfer Protocol) handles outgoing mail.

c) is an abstract concept that represents one end of a connection.

d) because it is the source of the HTML tags used to construct a Web page.

e) unwanted electronic junk mail about medical products, low-cost loans,and fake software upgrades that arrives in your online mailbox.

 

TLS

a) (Transport Layer Security) protocol that encrypt data travelingbetween a client computer and an HTTP server.

b) (Secure Sockets Layer) protocol that encrypt data travelingbetween a client computer and an HTTP server.

c) is one that is set by an affiliated site.

d) (short for World Wide Web) is a collection of document, image, video, and sound files that can be linked and accessed over the Internet using a protocol called HTTP.

e) or HTML editors, which provid es tools specifically designed to enter and format Web page text, graphics,and links.

Web

a) (short for World Wide Web) is a collection of document, image, video, and sound files that can be linked and accessed over the Internet using a protocol called HTTP.

b) (Secure Sockets Layer) protocol that encrypt data travelingbetween a client computer and an HTTP server.

c) is one that is set by an affiliated site.

d) (Transport Layer Security) protocol that encrypt data travelingbetween a client computer and an HTTP server.

e) or HTML editors, which providestools specifically designed to enter and format Web page text, graphics,and links.

 

Web authoring software

a) or HTML editors, which providestools specifically designed to enter and format Web page text, graphics,and links.

b) (Secure Sockets Layer) protocol that encrypt data travelingbetween a client computer and an HTTP server.

c) is one that is set by an affiliated site.

d) (Transport Layer Security) protocol that encrypt data travelingbetween a client computer and an HTTP server.

e) (short for World Wide Web) is a collection of document, image, video, and sound files that can be linked and accessed over the Internet using a protocol called HTTP.

 

Webbrowser

a) (commonly referred to asa browser) is client software thatdisplays Web page elements andhandles links between pages.

b) (also called a clear GIF or pixel tag) is a 1x1 pixel graphic embedded in a Web page or an e-mail message.

c) (also referred to as a Webspider) is a computer program that is automated to methodically visit Websites.

d) is the product or output of oneor more Web-based files displayed in a format similar to a page in a book.

e) (commonlyreferred to simply as a search engine) is a program designed to help peoplelocate information on the Web by formulating simple queries consistingof one or more words called keywords or search terms.

 

 

Web bug

a) (also called a clear GIF or pixel tag) is a 1x1 pixel graphic embedded in a Web page or an e-mail message.

b) (commonly referred to asa browser) is client software thatdisplays Web page elements andhandles links between pages.

c) (also referred to as a Webspider) is a computer program that is automated to methodically visit Websites.

d) is the product or output of oneor more Web-based files displayed in a format similar to a page in a book.

e) (commonlyreferred to simply as a search engine) is a program designed to help peoplelocate information on the Web by formulating simple queries consistingof one or more words called keywords or search terms.

 

Web crawler

a) (also referred to as a Webspider) is a computer program that is automated to methodically visit Websites.

b) (commonly referred to asa browser) is client software thatdisplays Web page elements andhandles links between pages.

c) (also called a clear GIF or pixel tag) is a 1x1 pixel graphic embedded in a Web page or an e-mail message.

d) is the product or output of oneor more Web-based files displayed in a format similar to a page in a book.

e) (commonlyreferred to simply as a search engine) is a program designed to help peoplelocate information on the Web by formulating simple queries consistingof one or more words called keywords or search terms.

 

Web page

a) is the product or output of oneor more Web-based files displayed in a format similar to a page in a book.

b) (commonlyreferred to simply as a search engine) is a program designed to help peoplelocate information on the Web by formulating simple queries consistingof one or more words called keywords or search terms.

c) is an Internet-based computer that accepts requests from browsers.

d) typically contains a collection of related information organized and formatted so it can be accessed using software called a browser.

e) is a markup language very similar to HTML, but it can becustomized with tags that describe the data in databases.

 

Web search engine

a) (commonlyreferred to simply as a search engine) is a program designed to help peoplelocate information on the Web by formulating simple queries consistingof one or more words called keywords or search terms.

b) is the product or output of oneor more Web-based files displayed in a format similar to a page in a book.

c) is an Internet-based computer that accepts requests from browsers.

d) typically contains a collection of related information organized and formatted so it can be accessed using software called a browser.

e) is a markup language very similar to HTML, but it can becustomized with tags that describe the data in databases.

 

Web server

a) is an Internet-based computer that accepts requests from browsers.

b) is the product or output of oneor more Web-based files displayed in a format similar to a page in a book.

c) (commonlyreferred to simply as a search engine) is a program designed to help peoplelocate information on the Web by formulating simple queries consistingof one or more words called keywords or search terms.

d) typically contains a collection of related information organized and formatted so it can be accessed using software called a browser.

e) is a markup language very similar to HTML, but it can becustomized with tags that describe the data in databases.

 

Web site

a) is the product or output of oneor more Web-based files displayed in a format similar to a page in a book.

b) (commonlyreferred to simply as a search engine) is a program designed to help peoplelocate information on the Web by formulating simple queries consistingof one or more words called keywords or search terms.

c) is an Internet-based computer that accepts requests from browsers.

d) typically contains a collection of related information organized and formatted so it can be accessed using software called a browser.

e) is a markup language very similar to HTML, but it can becustomized with tags that describe the data in databases.

 

XHTML

a) is a markup language very similar to HTML, but it can becustomized with tags that describe the data in databases.

b) is the product or output of oneor more Web-based files displayed in a format similar to a page in a book.

c) (commonlyreferred to simply as a search engine) is a program designed to help peoplelocate information on the Web by formulating simple queries consistingof one or more words called keywords or search terms.

d) is an Internet-based computer that accepts requests from browsers.

e) typically contains a collection of related information organized and formatted so it can be accessed using software called a browser.

 

73. Always on connection,

a) is linked to your ISP and is online whenever your computer and modem are on, even if you are not actively accessing the Internet.

b) can be accessed by logging in without a password by using the user ID anonymous. Some anonymous sites request users to enter their e‑mail addresses as a pass‑word, but rarely is that piece of information used for verification or tracking.

c) that one person posts a message using the Internet.

d) a file sharing protocol that distrib‑utes the role of a file server across a collection of dispersed computers

e) is similar to an online diary; it is maintained by a person, a company, or an organization, and contains a series of entries on one or more topics.

 

Anonymous FTP

a) can be accessed by logging in without a password by using the user ID anonymous. Some anonymous sites request users to enter their e‑mail addresses as a pass word, but rarely is that piece of information used for verification or tracking.

b) is linked to your ISP and is online whenever your computer and modem are on, even if you are not actively accessing the Internet.

c) that one person posts a message using the Internet.

d) a file sharing protocol that distrib‑utes the role of a file server across a collection of dispersed computers

e) is similar to an online diary; it is maintained by a person, a company, or an organization, and contains a series of entries on one or more topics.

 

 





:


: 2017-01-21; !; : 333 |


:

:

, ,
==> ...

1663 - | 1653 -


© 2015-2024 lektsii.org - -

: 0.426 .