Exam 7: The Web and E-mail
Exam 1: Computers and Digital Basics147 Questions
Exam 2: Computer Hardware150 Questions
Exam 3: Software149 Questions
Exam 4: Operating Systems and File Management150 Questions
Exam 5: Local Area Networks150 Questions
Exam 6: The Internet149 Questions
Exam 7: The Web and E-mail150 Questions
Exam 8: Digital Media150 Questions
Exam 9: The Computer Industry: History,Careers,and Ethics150 Questions
Exam 10: Information Systems Analysis and Design150 Questions
Exam 11: Databases150 Questions
Exam 12: Computer Programming150 Questions
Select questions type
A popular ____ activity is verifying billing data at an e-commerce site.
(Multiple Choice)
4.8/5
(37)
A(n)____ helps people locate information on the Web by formulating simple keyword queries.
(Multiple Choice)
4.9/5
(35)
____ software is a type of security software designed to identify and neutralize Web bugs,ad-serving cookies,and other types of malware.
(Multiple Choice)
4.8/5
(34)
Melissa has decided to obtain an e-mail account. Although she plans to use the e-mail account to communicate with her many friends, her main purpose in establishing it is to aid in the search for a job. She has a list of e-mail addresses for a group of potential employers. Melissa intends to e-mail her resume, along with a general message, to each of them. She will use the same message for all recipients.
-Melissa is concerned about the security of her computer,and she wants to avoid malicious exploits,which can work their way into her computer through various security holes.Which type of e-mail service has been the target of many such exploits?
(Multiple Choice)
4.7/5
(33)
Jessica likes to participate in B2C e-commerce, but recently has had a number of friends who have had problems shopping online. She wonders if it is safe to shop online and just how much she is compromising her privacy by doing so. Jessica is justifiably worried about the security of the personal information and credit card information she regularly supplies while shopping on the Web. In addition, she knows that merchants who market goods and services over the Internet sometimes secretly gather information and provide it to advertisers or other interested parties.
-What type of information does Jessica find Web sites typically store in cookies?
(Multiple Choice)
4.8/5
(32)
____ schemes redirect users to fake sites by poisoning a domain name server with a fake IP address.
(Multiple Choice)
4.7/5
(45)
When you purchase a used digital camera directly from the owner on an online auction,you are participating in ____ e-commerce.
(Multiple Choice)
4.8/5
(34)
MATCHING
Identify the letter of the choice that best matches the phrase or definition.
-Maintains no record of previous interactions
(Multiple Choice)
4.9/5
(34)
MATCHING
Identify the letter of the choice that best matches the phrase or definition.
-An exploit that redirects users to fake sites by poisoning a domain name server with a false IP address
(Multiple Choice)
4.7/5
(36)
When you view a page infested with a(n)____,an HTTP set-cookie request automatically goes to a third-party server,which may set a cookie on your computer for later retrieval or record your IP address.
(Multiple Choice)
4.8/5
(39)
Researchers estimate that the most extensive search engines cover less than 20% of the Web.
(True/False)
4.9/5
(41)
To access settings for Flash cookies,look for Flash Player in the ____ (PCs)or in System Preferences (Macs).
(Multiple Choice)
4.9/5
(33)
____ e-commerce involves one enterprise buying goods or services from another enterprise.
(Multiple Choice)
4.8/5
(37)
MATCHING
Identify the letter of the choice that best matches the phrase or definition.
-An e-mail based scam that is designed to persuade you to reveal confidential information
(Multiple Choice)
4.7/5
(43)
A(n)____________________ is a cyberspace version of the metal cart you wheel around a store and fill up with merchandise.
(Short Answer)
4.8/5
(42)
When configuring local e-mail,the incoming and outgoing servers must have the same settings.
(True/False)
4.8/5
(35)
A conversion process called MIME provides a clever way of disguising digital photos,sounds,and other media as plain ASCII code that can travel over the Internet as e-mail attachments.
(True/False)
4.8/5
(42)
____ scripts accept data submitted by a form,process that data,and then generate a custom HTML document that is sent to the browser for display.
(Multiple Choice)
4.9/5
(42)
When a Web page author includes meta keywords,like sex,that have little to do with the information on the page,the author is engaging in ____.
(Multiple Choice)
4.8/5
(43)
Showing 21 - 40 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)