Exam 2: Technology Infrastructure: the Internet and the World Wide Web
Exam 1: Introduction to Electronic Commerce81 Questions
Exam 2: Technology Infrastructure: the Internet and the World Wide Web85 Questions
Exam 3: Selling on the Web81 Questions
Exam 4: Marketing on the Web86 Questions
Exam 5: Business-To-Business Activities: Improving Efficiency and Reducing Costs82 Questions
Exam 6: Social Networking, Mobile Commerce, and Online Auctions80 Questions
Exam 7: The Environment of Electronic Commerce: Legal, Ethical, and Tax Issues83 Questions
Exam 8: Web Server Hardware and Software80 Questions
Exam 9: Electronic Commerce Software80 Questions
Exam 10: Electronic Commerce Security84 Questions
Exam 11: Payment Systems for Electronic Commerce81 Questions
Exam 12: Managing Electronic Commerce Implementations84 Questions
Select questions type
Files and e-mail messages sent over the Internet are broken down into small pieces called _____.
(Multiple Choice)
4.9/5
(35)
_____ is a set of rules for handling binary files, such as word-processing documents, spreadsheets, photos, or sound clips that are attached to e-mail messages.
(Multiple Choice)
4.8/5
(39)
The Internet provides a high degree of security in its basic structure.
(True/False)
4.9/5
(31)
The Internet Corporation for Assigned Names and Numbers (ICANN) has the responsibility of managing domain names and coordinating them with the IP address registrars.
(True/False)
4.9/5
(32)
The Post Office Protocol (POP) provides support for Multipurpose Internet Mail Extensions (MIME).
(True/False)
4.8/5
(31)
_____ lets users create and manipulate e-mail folders and individual e-mail messages while the messages are still on the e-mail server.
(Multiple Choice)
4.7/5
(40)
The higher the bandwidth, the faster the transmission of data through a communication medium.
(True/False)
4.8/5
(28)
The programs on gateway computers that determine the best path on which to send each packet contain rules called _____.
(Multiple Choice)
4.7/5
(34)
The word "virtual," used as part of virtual private networks means that the network connection is permanent.
(True/False)
4.7/5
(38)
The purpose of a(n) _____ is to respond to requests for Web pages from Web clients.
(Multiple Choice)
4.8/5
(38)
A(n) _____ is used when the Internet extends beyond the boundaries of an organization and includes networks of other organizations.
(Short Answer)
4.8/5
(33)
_____ is a measure of the amount of information that can travel from a user to the Internet in a given amount of time.
(Short Answer)
4.9/5
(44)
A(n) _____ hyperlink structure resembles conventional paper documents in that the reader begins on the first page and clicks a Next button to move to the next page in a serial fashion.
(Short Answer)
4.8/5
(29)
The ______ in an HTML document are interpreted by the web browser and used by it to format the display of enclosed text.
(Multiple Choice)
4.9/5
(32)
Data-type definitions (DTD's) are a form of common standard for XML tags.
(True/False)
4.8/5
(32)
The term "cascading" is used in cascading style sheets because designers can apply many style sheets to the same Web page, one on top of the other.
(True/False)
4.8/5
(41)
The combination of telephone lines and the closed switches that connect them to each other is called a _____.
(Multiple Choice)
4.8/5
(41)
A(n) _____ is a set of instructions that gives Web developers more control over the format of displayed pages.
(Short Answer)
4.8/5
(33)
A(n) _____ is a language that can be used to define other languages.
(Short Answer)
4.9/5
(39)
Showing 41 - 60 of 85
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)