Exam 7: The Web and E-Mail

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A tradeoff to the anonymity offered by anonymous ____ is that they tend not to operate at the same speed as your regular browser.

(Multiple Choice)
4.7/5
(28)

A Web indexer is a computer program that is automated to methodically visit Web sites._________________________

(True/False)
4.7/5
(39)

HTML ____ are typically used to collect shipping and payment information during checkout at an e-commerce Web site.

(Multiple Choice)
4.8/5
(34)

Jessica likes to participate in B2C e-commerce, but recently has had a number of friends who have had problems shopping online. She wonders if it is safe to shop online and just how much she is compromising her privacy by doing so. Jessica is justifiably worried about the security of the personal information and credit card information she regularly supplies while shopping on the Web. In addition, she knows that merchants who market goods and services over the Internet sometimes secretly gather information and provide it to advertisers or other interested parties. -Jessica has an always-on connection to the Internet.She has read about IP addresses and knows that some Web sites can track them.She would like to surf the Internet anonymously to protect her privacy. How can she do this?

(Multiple Choice)
4.9/5
(46)

The term player is sometimes used to refer to plug-ins,but it also can refer to standalone software that does not require a host program.

(True/False)
4.8/5
(38)

Jessica likes to participate in B2C e-commerce, but recently has had a number of friends who have had problems shopping online. She wonders if it is safe to shop online and just how much she is compromising her privacy by doing so. Jessica is justifiably worried about the security of the personal information and credit card information she regularly supplies while shopping on the Web. In addition, she knows that merchants who market goods and services over the Internet sometimes secretly gather information and provide it to advertisers or other interested parties. -What type of information does Jessica find Web sites typically store in cookies?

(Multiple Choice)
4.8/5
(40)

____ allow a Web site to store information on the client computer for later retrieval.

(Multiple Choice)
4.9/5
(34)

Visitors to a Web site are sometimes called Web ____.

(Multiple Choice)
4.8/5
(41)

Search engine ____ software is designed to pull keywords from a Web page and store them in a database.

(Multiple Choice)
4.9/5
(40)

HTTP is a markup language that works with TCP/IP to deliver Web resources to the desktop.

(True/False)
5.0/5
(35)

Melissa has decided to obtain an e-mail account. Although she plans to use the e-mail account to communicate with her many friends, her main purpose in establishing it is to aid in the search for a job. She has a list of e-mail addresses for a group of potential employers. Melissa intends to e-mail her resume, along with a general message, to each of them. She will use the same message for all recipients. -Melissa wants to ensure that the resume she attaches to the e-mail messages she is sending to the potential employers will successfully make it to them.She should try to limit the size of the attachment to ____ or less for dial-up connections.

(Multiple Choice)
4.9/5
(37)

When working with ____ mail,make sure your antivirus software is checking incoming messages.

(Multiple Choice)
5.0/5
(33)

A C2C e-commerce transaction occurs when individual consumers purchase goods and services from online merchants.

(True/False)
4.8/5
(33)

A(n)____ certificate is an electronic attachment to a file that verifies the identity of its source.

(Multiple Choice)
4.8/5
(38)

Banner and pop-up ads earn revenue for hosting merchants based on the ____________________,which is the number of times that site visitors click the ad to connect to the advertiser's site.

(Short Answer)
4.8/5
(26)

____ schemes redirect users to fake sites by poisoning a domain name server with a fake IP address.

(Multiple Choice)
4.8/5
(49)

A ____ HTTP connection reuses the same HTTP connection to send and receive multiple requests.

(Multiple Choice)
4.8/5
(45)

Any server that creates a cookie on your hard drive can request that cookie the next time your browser is accessing a Web page from the Web site server.

(True/False)
4.7/5
(33)

A(n)spam filter captures unsolicited e-mail messages before they reach your inbox._________________________

(True/False)
4.8/5
(37)

____ e-commerce occurs when businesses sell to governments.

(Multiple Choice)
4.9/5
(35)
Showing 21 - 40 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)