Deck 3: E-Commerce Infrastructure: the Internet, Web, and Mobile Platform
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/86
Play
Full screen (f)
Deck 3: E-Commerce Infrastructure: the Internet, Web, and Mobile Platform
1
IPv6 provides for 64-bit IP addresses.
False
2
Google Apps is an example of cloud computing.
True
3
Streaming media reduces the effects of latency.
False
4
The major hubs in the United States where the Internet backbone intersects with regional and local networks are now commonly referred to as Internet Exchange Points (IXPs).
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
5
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:
A) routing.
B) the Transmission Control Protocol.
C) packet switching.
D) the File Transfer Protocol.
A) routing.
B) the Transmission Control Protocol.
C) packet switching.
D) the File Transfer Protocol.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is not one of the basic technological foundations of the Internet?
A) client/server computing
B) Tracert
C) TCP/IP communications protocol
D) packet-switching hardware
A) client/server computing
B) Tracert
C) TCP/IP communications protocol
D) packet-switching hardware
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
7
One of Internet2's projects is a nationwide 100 gigabit-per-second network.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
8
Packet switching requires a dedicated circuit.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
9
During which period of time did the Institutionalization phase of Internet development take place?
A) 1950-1960
B) 1961-1974
C) 1975-1995
D) 1995-through the present
A) 1950-1960
B) 1961-1974
C) 1975-1995
D) 1995-through the present
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
10
FTP is a protocol used to transfer files to and from a server.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
11
T1 and T3 refer to international telephone standards for digital communication.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following occurred during the Commercialization phase of Internet development?
A) The fundamental building blocks of the Internet were realized in actual hardware and software.
B) Large mainframes on different college campuses were linked.
C) The Domain Name System was introduced.
D) NSF privatized the operation of the Internet's backbone.
A) The fundamental building blocks of the Internet were realized in actual hardware and software.
B) Large mainframes on different college campuses were linked.
C) The Domain Name System was introduced.
D) NSF privatized the operation of the Internet's backbone.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
13
WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
14
Internet access providers typically provide faster download speeds than upload speeds to consumers.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
15
RSS is an XML format that allows users to have digital content automatically sent to their computers over the Internet.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
16
Transmission Control Protocol is the protocol that provides the Internet addressing scheme.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
17
During which phase of the development of the Internet was Ethernet invented?
A) Commercialization phase
B) Institutional phase
C) Innovation phase
D) Consolidation phase
A) Commercialization phase
B) Institutional phase
C) Innovation phase
D) Consolidation phase
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
18
HTML is the Internet protocol used to transfer Web pages.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
19
XML is used to format the structure and style of a Web page.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
20
Tablet computers rely on the Internet cloud for processing and storage.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
21
The Internet Layer of TCP/IP is responsible for which of the following?
A) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
C) providing communication with the application by acknowledging and sequencing the packets to and from the application
D) providing a variety of applications with the ability to access the services of the lower layers
A) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
C) providing communication with the application by acknowledging and sequencing the packets to and from the application
D) providing a variety of applications with the ability to access the services of the lower layers
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
22
An IPv4 address is expressed as a:
A) 32-bit number that appears as a series of four separate numbers separated by semicolons.
B) 64-bit number that appears as a series of four separate numbers separated by semicolons.
C) 64-bit number that appears as a series of four separate numbers separated by periods.
D) 32-bit number that appears as a series of four separate numbers separated by periods.
A) 32-bit number that appears as a series of four separate numbers separated by semicolons.
B) 64-bit number that appears as a series of four separate numbers separated by semicolons.
C) 64-bit number that appears as a series of four separate numbers separated by periods.
D) 32-bit number that appears as a series of four separate numbers separated by periods.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
23
________ is a utility program that allows you to check the connection between your client and a TCP/IP network.
A) Ping
B) Telnet
C) Tracert
D) Finger
A) Ping
B) Telnet
C) Tracert
D) Finger
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is the core communications protocol for the Internet?
A) Telnet
B) FTP
C) TCP/IP
D) SSL
A) Telnet
B) FTP
C) TCP/IP
D) SSL
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
25
Which layer of Internet architecture is composed of the telecommunications networks and protocols?
A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer
A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
26
________ is a model of computing in which firms and individuals obtain computing power and software applications over the Internet, rather than purchasing and installing it on their own computers.
A) Client/server computing
B) P2P computing
C) Mobile computing
D) Cloud computing
A) Client/server computing
B) P2P computing
C) Mobile computing
D) Cloud computing
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following protocols is used to send mail to a server?
A) SMTP
B) FTP
C) HTTP
D) SSL
A) SMTP
B) FTP
C) HTTP
D) SSL
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
28
TCP/IP operates in which layer of Internet architecture?
A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer
A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
29
The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication is called the:
A) Network Technology Substrate layer.
B) Middleware Services layer.
C) Transport Services and Representation Standards layer.
D) Applications layer.
A) Network Technology Substrate layer.
B) Middleware Services layer.
C) Transport Services and Representation Standards layer.
D) Applications layer.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
30
The addresses used by browsers to identify the location of content on the Web are called:
A) domain names.
B) uniform resource locators.
C) IP addresses.
D) file paths.
A) domain names.
B) uniform resource locators.
C) IP addresses.
D) file paths.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
31
The backbone of the Internet is formed by:
A) Internet Exchange Points (IXPs).
B) Network Service Providers (NSPs).
C) Internet Service Providers (ISPs).
D) Metropolitan Area Exchanges (MAEs).
A) Internet Exchange Points (IXPs).
B) Network Service Providers (NSPs).
C) Internet Service Providers (ISPs).
D) Metropolitan Area Exchanges (MAEs).
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
32
A(n) ________ is an audio presentation stored as an audio file and posted to the Web for users to download.
A) podcast
B) RSS subscription
C) weblog
D) widget
A) podcast
B) RSS subscription
C) weblog
D) widget
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following allows users to communicate visually and aurally in real-time, and uses high-resolution monitors to simulate the presence of participants?
A) telepresence
B) videoconferencing
C) VOIP
D) IP telephony
A) telepresence
B) videoconferencing
C) VOIP
D) IP telephony
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
34
________ is one of the original Internet services and is used to transfer files from a server computer to a client computer and vice versa.
A) SMTP
B) FTP
C) HTTP
D) SSL
A) SMTP
B) FTP
C) HTTP
D) SSL
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
35
Where does TSL operate within TCP/IP?
A) between the Internet Layer and the Transport Layer
B) between the Transport Layer and the Application Layer
C) between the Network Interface Layer and the Transport Layer
D) between the Internet Layer and the Application Layer
A) between the Internet Layer and the Transport Layer
B) between the Transport Layer and the Application Layer
C) between the Network Interface Layer and the Transport Layer
D) between the Internet Layer and the Application Layer
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following statements about client/server computing is true?
A) It exploded the available communications capacity.
B) It provided communication rules and regulations.
C) It connects multiple powerful personal computers together in one network with one or more servers dedicated to common functions that they all need.
D) It does not provide sufficient computing capacity to support graphics or color.
A) It exploded the available communications capacity.
B) It provided communication rules and regulations.
C) It connects multiple powerful personal computers together in one network with one or more servers dedicated to common functions that they all need.
D) It does not provide sufficient computing capacity to support graphics or color.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
37
The Transport Layer of TCP/IP is responsible for which of the following?
A) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
C) providing communication with the application by acknowledging and sequencing the packets to and from the application
D) providing a variety of applications with the ability to access the services of the lower layers
A) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
C) providing communication with the application by acknowledging and sequencing the packets to and from the application
D) providing a variety of applications with the ability to access the services of the lower layers
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
38
An Internet-enabled media player would run in which layer of Internet architecture?
A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer
A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
39
The natural language convention used to represent IP addresses is called the:
A) uniform resource locator system.
B) Internet protocol addressing schema.
C) domain name system.
D) assigned numbers and names (ANN) system.
A) uniform resource locator system.
B) Internet protocol addressing schema.
C) domain name system.
D) assigned numbers and names (ANN) system.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is not an advantage of client/server computing over centralized mainframe computing?
A) It is easy to expand capacity by adding servers and clients.
B) Each client added to the network increases the network's overall capacity and transmission speeds.
C) Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer.
D) There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.
A) It is easy to expand capacity by adding servers and clients.
B) Each client added to the network increases the network's overall capacity and transmission speeds.
C) Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer.
D) There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
41
The concept behind document formatting had its roots in which of the following?
A) XML
B) SGML
C) HTML
D) GML
A) XML
B) SGML
C) HTML
D) GML
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is a Web application that enables Internet users to communicate with each other, although not in real time?
A) online chat
B) online forum
C) IM
D) VoIP
A) online chat
B) online forum
C) IM
D) VoIP
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is not true about the mobile platform?
A) Most smartphones use Intel chips.
B) The number of cell phones worldwide exceeds the number of PCs.
C) About 25% of the world's cell phones are smartphones.
D) Unlike PCs, smartphones do not need fans.
A) Most smartphones use Intel chips.
B) The number of cell phones worldwide exceeds the number of PCs.
C) About 25% of the world's cell phones are smartphones.
D) Unlike PCs, smartphones do not need fans.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following is currently the most popular Web browser?
A) Internet Explorer
B) Netscape
C) Safari
D) Firefox
A) Internet Explorer
B) Netscape
C) Safari
D) Firefox
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
45
The "hubs" where the backbone owners connect with one another are called:
A) Internet Exchange Points (IXPs).
B) Network Service Providers (NSPs).
C) Internet Service Providers (ISPs).
D) Metropolitan Access Points (MAPs).
A) Internet Exchange Points (IXPs).
B) Network Service Providers (NSPs).
C) Internet Service Providers (ISPs).
D) Metropolitan Access Points (MAPs).
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following is not a limitation of the current Internet?
A) HTML, which is not proficient for designing business documents or databases for Web viewing
B) limited bandwidth, which causes congestion and cannot adequately handle video and voice traffic
C) architectural restrictions, which stipulate that numerous requests for the same file must each be answered individually, slowing network performance
D) the difficulty in expanding capacity by adding servers and clients
A) HTML, which is not proficient for designing business documents or databases for Web viewing
B) limited bandwidth, which causes congestion and cannot adequately handle video and voice traffic
C) architectural restrictions, which stipulate that numerous requests for the same file must each be answered individually, slowing network performance
D) the difficulty in expanding capacity by adding servers and clients
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
47
The ________ helps define the overall structure of the Internet.
A) IAB
B) IESG
C) W3C
D) ITU
A) IAB
B) IESG
C) W3C
D) ITU
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following is a short-range, low-power, wireless network technology useful for remotely controlling industrial, medical, and home automation devices?
A) Wi-Fi
B) WiMAX
C) UWB
D) ZigBee
A) Wi-Fi
B) WiMAX
C) UWB
D) ZigBee
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
49
In the United States, there are two main types of cellular networks, CDMA and:
A) GSM.
B) Bluetooth.
C) wireless.
D) WiMAX.
A) GSM.
B) Bluetooth.
C) wireless.
D) WiMAX.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
50
Local area networks that operate within a single organization that leases access to the Web directly from regional and national carriers are called:
A) wide area networks.
B) extranets.
C) campus area networks.
D) private exchanges.
A) wide area networks.
B) extranets.
C) campus area networks.
D) private exchanges.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following statements about fiber-optic cable is not true?
A) It consists of twelve or sixteen strands of glass.
B) It is thinner and lighter than coaxial or twisted pair cable.
C) It enables better data security than coaxial cable.
D) There are thousands of miles of installed fiber-optic cable in the United States that are not being used.
A) It consists of twelve or sixteen strands of glass.
B) It is thinner and lighter than coaxial or twisted pair cable.
C) It enables better data security than coaxial cable.
D) There are thousands of miles of installed fiber-optic cable in the United States that are not being used.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
52
The major technologies used with wireless local area networks are:
A) Wi-Fi and Bluetooth.
B) Wi-Fi and WiMAX.
C) Bluetooth and 3G.
D) WiMAX and 3G.
A) Wi-Fi and Bluetooth.
B) Wi-Fi and WiMAX.
C) Bluetooth and 3G.
D) WiMAX and 3G.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
53
The first Web browser to make it possible to view documents on the Web with colored background, images, and animations was:
A) Netscape Navigator.
B) Mosaic.
C) Mozilla.
D) Internet Explorer.
A) Netscape Navigator.
B) Mosaic.
C) Mozilla.
D) Internet Explorer.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
54
In the address http://www.company.com/clients.html, which of the following is the top-level domain?
A) )com
B) company.com
C) www
D) http
A) )com
B) company.com
C) www
D) http
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
55
Siri is a type of:
A) intelligent personal assistant.
B) widget.
C) gadget.
D) social network.
A) intelligent personal assistant.
B) widget.
C) gadget.
D) social network.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
56
When talking about the physical elements of the Internet, the term redundancy refers to:
A) transmitting multiple copies of a single packet to safeguard against data loss.
B) the use of tiered high-speed switching computers to connect the backbone to regional and local networks.
C) delays in messages caused by the uneven flow of information through the network.
D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.
A) transmitting multiple copies of a single packet to safeguard against data loss.
B) the use of tiered high-speed switching computers to connect the backbone to regional and local networks.
C) delays in messages caused by the uneven flow of information through the network.
D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following is a high-speed, medium-range, broadband wireless metropolitan area network?
A) Wi-Fi
B) WiMAX
C) Bluetooth
D) ZigBee
A) Wi-Fi
B) WiMAX
C) Bluetooth
D) ZigBee
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following is the "killer app" of 2012?
A) social networks
B) blogs
C) tablet PCs
D) search engines
A) social networks
B) blogs
C) tablet PCs
D) search engines
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
59
You could expect to find all of the following services in a Web server software package except:
A) security services.
B) FTP.
C) data capture.
D) an RSS aggregator.
A) security services.
B) FTP.
C) data capture.
D) an RSS aggregator.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
60
The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.
A) Internet Engineering Steering Group (IESG)
B) World Wide Web Consortium (W3C)
C) Internet Engineering Task Force (IETF)
D) Internet Society (ISOC)
A) Internet Engineering Steering Group (IESG)
B) World Wide Web Consortium (W3C)
C) Internet Engineering Task Force (IETF)
D) Internet Society (ISOC)
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
61
________ is a way of formatting pages with embedded links that connect documents to one another and that also link pages to other objects.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
62
Outside of e-mail, using a(n) ________ is the most common online daily activity.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
63
Specialized computers that interconnect the thousands of computers that make up the Internet in order to transmit message parcels along available communication paths and on to their destinations are called ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
64
A TCP/IP network located within a single organization for the purposes of communication and information processing is called a(n) ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
65
________ software refers to the software that enables a computer to deliver Web pages written in HTML to client computers on a network that request this service by sending an HTTP request.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
66
An iPad is an example of a(n) ________ computer.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
67
A(n) ________ is a Web application that allows users to easily add and edit content on a Web page.
A) wiki
B) podcast
C) blog
D) RSS feed
A) wiki
B) podcast
C) blog
D) RSS feed
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
68
________ refers to delays in messages caused by the uneven flow of information packets through the network.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
69
The totality of blog-related Web sites is referred to as the ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
70
A small application that you embed in a Web page in order to include content and functionality from a different Web site is called a(n) ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
71
A set of rules for transferring data is called a(n) ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
72
________ are central directories that list all domain names currently in use for specific domains.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
73
________ is a utility program that allows you to track the path of a message you send from your client to a remote computer on the Internet.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
74
The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:
A) VoIP.
B) IPTP.
C) VTP.
D) IP.
A) VoIP.
B) IPTP.
C) VTP.
D) IP.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following is a Web 2.0 service or application?
A) wikis
B) e-mail
C) IM
D) online forums
A) wikis
B) e-mail
C) IM
D) online forums
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
76
Which of the following was the largest source of mobile commerce revenue in 2012?
A) mobile advertising
B) location-based services
C) e-book sales
D) mobile retail purchases
A) mobile advertising
B) location-based services
C) e-book sales
D) mobile retail purchases
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
77
A(n) ________ is a personal Web page of chronological entries created by an individual or corporation to communicate with readers.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
78
All of the following are true about iPhone apps except:
A) They are distributed through Apple's App Store.
B) They are typically written in the Java programming language.
C) They were estimated to generate over $2 billion in 2012.
D) More than 30 billion have been downloaded.
A) They are distributed through Apple's App Store.
B) They are typically written in the Java programming language.
C) They were estimated to generate over $2 billion in 2012.
D) More than 30 billion have been downloaded.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
79
Computing devices attached to the Internet that are capable of making HTTP requests and displaying HTML pages are referred to as ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
80
TCP/IP is divided into four separate ________, each handling a different aspect of the communication problem.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck