Exam 7: The Web and E-Mail

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ____________________ is an advertisement, typically embedded at the top of a Web page.

(Short Answer)
4.8/5
(46)

The major advantage of POP e-mail is that you can access your messages from any computer connected to the Internet.

(True/False)
4.8/5
(40)

Web-based mail allows you to use a(n) ____ as e-mail client software.

(Multiple Choice)
4.9/5
(33)

What is a cookie?

(Short Answer)
4.9/5
(42)

IE and Firefox updates only cost $10 a year.

(True/False)
4.9/5
(34)

Pharming is less surreptitious and easier to detect than most other hacker schemes.

(True/False)
4.7/5
(35)

HTML documents use special instructions, called HTML logos , that specify how the document should appear when displayed on a computer screen or printed.

(True/False)
4.9/5
(36)

When your browser fetches pages and graphics to form a Web page, it stores that material on your computer in temporary files sometimes referred to as a Web ____.

(Multiple Choice)
4.8/5
(29)

Netiquette is online jargon for "Internet etiquette."

(True/False)
4.8/5
(33)

Which of the following statements is NOT true?

(Multiple Choice)
4.9/5
(39)

Online auctions and rummage sales are examples of C2C e-commerce.

(True/False)
4.8/5
(43)

  ____, as shown in the above figure, provides tools specifically designed to enter and format Web page text, graphics, and links. ____, as shown in the above figure, provides tools specifically designed to enter and format Web page text, graphics, and links.

(Multiple Choice)
4.9/5
(30)

  In the above figure, .htm is the _____. In the above figure, .htm is the _____.

(Multiple Choice)
4.8/5
(32)

A(n) ____ ad overlays the content on a Web page, sometimes obscuring it until you click the ad or its timer expires and the ad disappears.

(Multiple Choice)
4.8/5
(38)

A(n) Web browser is a software program that runs on your computer and helps you access Web pages.

(True/False)
4.9/5
(23)

In banking jargon, a one-time-use credit card number is called a controlled payment number.

(True/False)
4.9/5
(43)

____________________ is an exploit that redirects users to fake sites by "poisoning" a domain name server with a false IP address.

(Short Answer)
4.8/5
(39)

Three types of e-mail systems are widely used today: SMTP , POP, and Web-based mail.

(True/False)
4.7/5
(33)

A(n) ____________________ is a cyberspace version of the metal cart you wheel around a store and fill up with merchandise.

(Short Answer)
4.8/5
(32)

____________________ is an extension of HTTP that simply encrypts the text of an HTTP message before it is sent.

(Short Answer)
4.9/5
(36)
Showing 41 - 60 of 175
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)