You are on page 1of 24

New Perspectives on Computer

Concepts 2014 Comprehensive 17th


Edition Parsons Test Bank
Visit to download the full and correct content document: https://testbankdeal.com/dow
nload/new-perspectives-on-computer-concepts-2014-comprehensive-17th-edition-par
sons-test-bank/
Chapter 7: The Web and E-mail

TRUE/FALSE

1. HTML is called a markup language because authors mark up their documents by inserting HTML tags.

ANS: T PTS: 1 REF: 362

2. HTTP is a protocol that works with TCP/IP to get Web resources to your desktop.

ANS: T PTS: 1 REF: 364

3. The two applications shown in the accompanying figure are examples of Web browser software.

ANS: T PTS: 1 REF: 366

4. Older versions of software like the kind shown in the accompanying figure, typically will support new
HTML features, so upgrading browsers to the latest version is not essential or recommended.

ANS: F PTS: 1 REF: 367

5. The term player is sometimes used to refer to plug-ins, but it also can refer to standalone software that
does not require a host program.

ANS: T PTS: 1 REF: 367

6. Any server that creates a cookie on your hard drive can request that cookie the next time your browser
is accessing a Web page from the Web site server.

ANS: T PTS: 1 REF: 368

7. The framework for an HTML document consists of two sections: a head and a body.

ANS: T PTS: 1 REF: 369

8. Scripts were designed to replace normal HTML.


ANS: F PTS: 1 REF: 371

9. Adobe Acrobat is a multimedia technology that can be used to create animation and interactive
modules.

ANS: F PTS: 1 REF: 373

10. Researchers estimate that the most extensive search engines cover less than 20% of the Web.

ANS: T PTS: 1 REF: 376

11. Many search engines keep records of your queries.

ANS: T PTS: 1 REF: 381

12. A C2C e-commerce transaction occurs when individual consumers purchase goods and services from
online merchants.

ANS: F PTS: 1 REF: 385

13. HTTP provides a secure connection for Web-based transactions.

ANS: F PTS: 1 REF: 390

14. E-mail is based on store-and-forward technology.

ANS: T PTS: 1 REF: 394

15. When configuring local e-mail, the incoming and outgoing servers must have the same settings.

ANS: F PTS: 1 REF: 395

16. A conversion process called MIME provides a clever way of disguising digital photos, sounds, and
other media as plain ASCII code that can travel over the Internet as e-mail attachments.

ANS: T PTS: 1 REF: 398

17. Netiquette is online jargon for Internet etiquette.

ANS: T PTS: 1 REF: 399

18. If you turn off cookies, you may not be able to make online purchases at some sites.

ANS: T PTS: 1 REF: 402

19. As users are frequently deleting or blocking conventional cookies, marketers are turning to Flash
cookies to track and target customers.

ANS: T PTS: 1 REF: 402

20. Pharming is less surreptitious and easier to detect than most other hacker schemes.

ANS: F PTS: 1 REF: 406


MODIFIED TRUE/FALSE

1. Every Web page has a unique address called a(n) Uniform Resource Locator.
_________________________

ANS: T PTS: 1 REF: 361

2. Web 3.0 refers to innovations like cloud computing and other new technologies likely to further
change the way we use the Web. _________________________

ANS: T PTS: 1 REF: 361

3. The current version of HTML, HTML 4.01, was introduced in 2010. _________________________

ANS: F, 5

PTS: 1 REF: 362

4. The file name for a Web site’s main page, like www.cnn.com, is usually short and to the point.
_________________________

ANS: F
URL
Uniform Resource Locator
Uniform Resource Locator (URL)
URL (Uniform Resource Locator)

PTS: 1 REF: 362

5. HTML documents use special instructions, called HTML logos, that specify how the document should
appear when displayed on a computer screen or printed. _________________________

ANS: F, tags

PTS: 1 REF: 362


6. The applications shown in the accompanying figure are examples of Web browsers.
_________________________

ANS: T PTS: 1 REF: 366

7. A(n) control is a program that extends the ability of the kind of applications shown in the
accompanying figure to work with file formats. _________________________

ANS: F
browser add-on
plug-in
add-on

PTS: 1 REF: 367

8. Flash, once the dominant tool for interactive Web pages, is gradually being replaced by PerlScript and
new features available in HTML5. _________________________

ANS: F, JavaScript

PTS: 1 REF: 373

9. A Web indexer is a computer program that is automated to methodically visit Web sites.
_________________________

ANS: F
crawler
spider

PTS: 1 REF: 375

10. Online auctions are examples of B2G e-commerce. _________________________

ANS: F
C2C
Consumer-to-consumer
Consumer-to-consumer (C2C)
C2C (Consumer-to-consumer)

PTS: 1 REF: 385


11. The recipient of the e-mail in the accompanying figure is Ann Hill. _________________________

ANS: T PTS: 1 REF: 392

12. In a(n) POP3 e-mail system, your messages remain on a Web server, rather than being downloaded to
your computer. _________________________

ANS: F, Webmail

PTS: 1 REF: 396

13. A(n) Flash cookie is typically a 1x1 pixel graphic embedded in a Web page or e-mail message
designed to track who is reading the Web page or e-mail message. _________________________

ANS: F
Web bug
clear GIF

PTS: 1 REF: 403

14. A(n) spam filter captures unsolicited e-mail messages before they reach your inbox.
_________________________

ANS: T PTS: 1 REF: 404

15. Phishing is an e-mail based scam that’s designed to persuade you to reveal confidential information
such as your bank account number or Social Security number. _________________________

ANS: T PTS: 1 REF: 405


MULTIPLE CHOICE

1. Which of the following Web-based applications is NOT sometimes characterized as Web 2.0?
a. wikis c. social networking
b. blogs d. cloud computing
ANS: D PTS: 1 REF: 360-361

2. A(n) ____ is a collection of related information organized and formatted so it can be accessed using
software called a browser.
a. Web site c. podcast
b. Internet d. tag
ANS: A PTS: 1 REF: 361

3. The hand icon shown in the accompanying figure is pointing to a ____.


a. cookie c. link
b. key d. tunnel
ANS: C PTS: 1 REF: 361

4. Visitors to a Web site are sometimes called Web ____.


a. browsers c. surfers
b. servers d. users
ANS: C PTS: 1 REF: 361

5. Examples of Uniform Resource Identifiers include ____.


a. URLs c. ISBNs
b. Social Security numbers d. all of the above
ANS: D PTS: 1 REF: 361

6. A(n) ____ is client software that displays Web page elements and handles links between pages.
a. explorer c. navigator
b. browser d. manager
ANS: B PTS: 1 REF: 361

7. In the URL found in the accompanying figure, http is the ____.


a. Web protocol standard c. folder name
b. Web server name d. file extension
ANS: A PTS: 1 REF: 362

8. In the URL found in the accompanying figure, .htm is the ____.


a. Web protocol standard c. folder name
b. Web server name d. file extension
ANS: D PTS: 1 REF: 362

9. In the URL found in the accompanying figure, showbiz is a ____.


a. Web protocol standard c. folder name
b. Web server name d. file extension
ANS: C PTS: 1 REF: 362

10. In the URL found in the accompanying figure, www.cnn.com is the ____.
a. Web protocol standard c. folder name
b. Web server name d. file extension
ANS: B PTS: 1 REF: 362
11. The image of the vegetables in the accompanying figure is produced by a(n) ____ HTML tag when the
Web page is displayed by a browser.
a. <graphic> c. <pic>
b. <img> d. <jpeg>
ANS: B PTS: 1 REF: 363

12. Which of the following is a Web resource?


a. an HTML document c. a graphic
b. a sound file d. any of the above
ANS: D PTS: 1 REF: 364

13. For HTTP, ____ usually are associated with port 80 on the client and server.
a. exchanges c. sockets
b. methods d. actions
ANS: C PTS: 1 REF: 364

14. ____ is the most frequently used HTTP method.


a. FTP c. POST
b. THIS d. GET
ANS: D PTS: 1 REF: 364

15. ____ is a protocol that works in conjunction with TCP/IP to get Web resources to your desktop.
a. HTML c. HTTP
b. URL d. FTP
ANS: C PTS: 1 REF: 364
16. An HTTP exchange takes place over a pair of ____.
a. sockets c. switches
b. packets d. networks
ANS: A PTS: 1 REF: 364

17. A ____ HTTP connection reuses the same HTTP connection to send and receive multiple requests.
a. status c. server
b. port-based d. persistent
ANS: D PTS: 1 REF: 365

18. A Web server’s response to a browser’s request includes an HTTP ____ that indicates whether the
browser’s request could be fulfilled.
a. socket code c. status code
b. protocol code d. completion code
ANS: C PTS: 1 REF: 365

19. When your browser fetches pages and graphics to form a Web page, it stores them in temporary files
on your hard drive called a Web ____.
a. cache c. converter
b. plug-in d. source
ANS: A PTS: 1 REF: 365

20. All of the following are currently popular browsers EXCEPT ____.
a. Firefox c. Safari
b. Chrome d. Netscape Navigator
ANS: D PTS: 1 REF: 366

21. ____ allow a Web site to store information on the client computer for later retrieval.
a. Tags c. Biscuits
b. Cookies d. Labels
ANS: B PTS: 1 REF: 368

22. A ____ enables a Web server to keep track of your activity and compile a list of your purchases.
a. cookie c. socket
b. plug-in d. style sheet
ANS: A PTS: 1 REF: 368

23. A(n) ____ adds HTML tags to a document, spreadsheet, or other text-based file to create an HTML
document that can be displayed by a browser.
a. online Web authoring tool c. HTML conversion utility
b. Web authoring software program d. wiki
ANS: C PTS: 1 REF: 369

24. ____ provides tools specifically designed to enter and format Web page text, graphics, and links.
a. A text editor c. Web Creator
b. Web authoring software d. W3C
ANS: B PTS: 1 REF: 369
25. ____ consists of a series of instructions that is embedded directly into an HTML document that
instruct the browser to carry out specific actions or to respond to specific user actions.
a. An HTML tag c. A podcast
b. JavaScript d. A cookie
ANS: B PTS: 1 REF: 372

26. HTML ____ are used to display a question and a box into which you can enter an answer.
a. bins c. gateways
b. tables d. forms
ANS: D PTS: 1 REF: 372

27. Server-side scripts can be written using any of the following EXCEPT ____.
a. Perl c. Java
b. C# d. Ada
ANS: D PTS: 1 REF: 373

28. ____ scripts tend to be used for interactive user interface elements.
a. Server-side c. User-side
b. Client-side d. Java-side
ANS: B PTS: 1 REF: 373

29. ____ scripts accept data submitted by a form, process that data, and then generate a custom HTML
document that is sent to the browser for display.
a. Server-side c. User-side
b. Client-side d. Java-side
ANS: A PTS: 1 REF: 373

30. A popular ____ activity is verifying billing data at an e-commerce site.


a. Server-side c. User-side
b. Client-side d. Java-side
ANS: A PTS: 1 REF: 373

31. A(n) ____ helps people locate information on the Web by formulating simple keyword queries.
a. navigator c. search engine
b. browser d. HTML tag
ANS: C PTS: 1 REF: 374

32. A Web ____, automated to methodically visit Web sites, can be programmed to perform various
activities as it visits those sites.
a. converter c. archive
b. crawler d. glossary
ANS: B PTS: 1 REF: 375

33. Search engine ____ software is designed to pull keywords from a Web page and store them in a
database.
a. indexer c. archive
b. crawler d. tracker
ANS: A PTS: 1 REF: 376
34. A search engine’s ____ looks for your search terms in the search engine’s indexed database and
returns a list of relevant Web sites.
a. query processor c. Web crawler
b. link d. indexer
ANS: A PTS: 1 REF: 376

35. A(n) ____ keyword is entered into a header section of a Web page when it is created and is supposed
to describe the page contents.
a. query c. archive
b. link d. meta
ANS: D PTS: 1 REF: 377

36. When a Web page author includes meta keywords, like sex, that have little to do with the information
on the page, the author is engaging in ____.
a. formulating searches c. keyword stuffing
b. metasearching d. e-commerce
ANS: C PTS: 1 REF: 377

37. Keyword ____ is an unethical practice in which meta keywords are manipulated to gain high relevancy
rankings.
a. packing c. archiving
b. stuffing d. indexing
ANS: B PTS: 1 REF: 377

38. The ____ wildcard character allows a search engine to find pages with any derivation of a basic word.
a. + c. *
b. & d. $
ANS: C PTS: 1 REF: 379

39. In addition to using search engines, you can also find Web-based information using a(n) ____ engine
that searches a series of other search engines and compiles the search results.
a. compiled c. metasearch
b. stuffed d. secure
ANS: C PTS: 1 REF: 380

40. When you use a search engine, it stores all of the following information about your query EXCEPT
____.
a. your name c. the date and time of the query
b. your IP address d. the search terms you used
ANS: A PTS: 1 REF: 382

41. Many ____ sites act as relay stations to forward your searches to search engines without leaving a trail
back to a cookie or IP address.
a. pharming c. annihilator
b. anonymizer d. phishing
ANS: B PTS: 1 REF: 382
42. When you purchase a textbook online from a site like www.amazon.com, you are participating in ____
e-commerce.
a. C2C c. B2B
b. B2C d. B2G
ANS: B PTS: 1 REF: 385

43. When you purchase a used digital camera directly from the owner on an online auction, you are
participating in ____ e-commerce.
a. C2C c. B2B
b. B2C d. B2G
ANS: A PTS: 1 REF: 385

44. ____ e-commerce involves one enterprise buying goods or services from another enterprise.
a. C2C c. B2B
b. B2C d. B2G
ANS: C PTS: 1 REF: 385

45. ____ e-commerce occurs when businesses sell to governments.


a. G2B c. C2G
b. B2G d. G2G
ANS: B PTS: 1 REF: 385

46. A ____ ad overlays the content on a Web page, sometimes obscuring it until you click the ad or its
timer expires and the ad disappears.
a. banner c. pop-up
b. hover d. click-through
ANS: B PTS: 1 REF: 385

47. Both SSL and its successor, ____, are protocols that encrypt data traveling between a client computer
and an HTTP server.
a. TLS c. P2P
b. S-HTTP d. EDGE
ANS: A PTS: 1 REF: 390

48. ____ checks a Web server’s security certificate to determine if the site is legitimate.
a. XML c. HTTPS
b. TLS d. P2P
ANS: C PTS: 1 REF: 390

49. The following statement is NOT true: ____.


a. Secure connections differ from secure Web sites.
b. A secure connection encrypts the data transmitted between your computer and a Web site.
c. A secure Web site uses password security to prevent unauthorized access to pages on the
site.
d. Web pages that provide a secure connection start with httpx: instead of http:.
ANS: D PTS: 1 REF: 389-390

50. PayPal is a pioneering example of a(n) ____ payment system.


a. B2B (business-to-business) c. electronic wallet
b. P2P (person-to-person) d. C2B (consumer-to-business)
ANS: B PTS: 1 REF: 391

51. In an e-mail message, such as the one found in the accompanying figure, the recipient’s e-mail address
and the message subject are found in the ____.
a. tool bar c. attachment
b. message header d. message body
ANS: B PTS: 1 REF: 392

52. Incoming mail can be stored on a(n) ____ server until it is downloaded to the inbox on your hard disk.
a. Webmail c. IMAP
b. POP3 d. SMTP
ANS: B PTS: 1 REF: 394

53. ____ is similar to POP3, but it leaves messages on the server until you specifically delete them.
a. SMTP (Simple Mail Transfer Protocol)
b. IMAP (Internet Messaging Access Protocol)
c. PIN (Private Identification Number)
d. URL (Uniform Resource Locator)
ANS: B PTS: 1 REF: 394

54. To use local e-mail you must install e-mail ____ software on your computer.
a. server c. resource
b. database d. client
ANS: D PTS: 1 REF: 395
55. In a classic Webmail configuration, messages are sent immediately and thus a(n) ____ is not needed.
a. server c. Inbox
b. client d. Outbox
ANS: D PTS: 1 REF: 396

56. Webmail allows you to use a(n) ____ to access and view your e-mail messages.
a. operating system c. browser
b. server d. crawler
ANS: C PTS: 1 REF: 396

57. An e-mail message in ____ format can include graphics in addition to a wide variety of fonts and font
colors.
a. HTML c. ASCII
b. MIME d. RTF
ANS: A PTS: 1 REF: 397

58. When working with ____ mail, make sure your antivirus software is checking incoming messages.
a. MIME c. ASCII
b. HTML d. RTF
ANS: B PTS: 1 REF: 397

59. Before sending a large attachment in an e-mail, you can use a(n) ____ to shrink it.
a. crawler program c. netiquette scanner
b. compression program d. index utility
ANS: B PTS: 1 REF: 398

60. You just sent an e-mail message to your co-worker that includes the following message body:

MARY-
CAN YOU PLEASE TELL ME WHEN YOU WILL HAVE THE REPORTS COMPLETED?

Why might your coworker be offended by the message?


a. You used negative emoticons.
b. In terms of netiquette, you were using sarcasm and humor.
c. In terms of netiquette, you were shouting.
d. Your message was impolitely worded.
ANS: C PTS: 1 REF: 399

61. ____ may pose a threat to your computer’s security and/or your privacy.
a. Flash cookies c. Ad-serving cookies
b. Web bugs d. all of the above
ANS: D PTS: 1 REF: 400-403

62. ____ software is a type of security software designed to identify and neutralize Web bugs, ad-serving
cookies, and other types of malware.
a. Antivirus c. Antispyware
b. Crawler d. Indexer
ANS: C PTS: 1 REF: 403
63. Flash ____ can collect and store personal data, such as a user’s name or the user’s progress in a game.
a. cookies c. icons
b. bugs d. indices
ANS: A PTS: 1 REF: 402

64. To access settings for Flash cookies, look for Flash Player in the ____ (PCs) or in System Preferences
(Macs).
a. Preference Library c. Preference Panel
b. Control Panel d. Control Library
ANS: B PTS: 1 REF: 402

65. When you view a page infested with a(n) ____, an HTTP set-cookie request automatically goes to a
third-party server, which may set a cookie on your computer for later retrieval or record your IP
address.
a. Flash cookie c. Web bug
b. anonymous proxy server d. spam filter
ANS: C PTS: 1 REF: 403

66. A tradeoff to the anonymity offered by anonymous ____ is that they tend not to operate at the same
speed as your regular browser.
a. FTP sites c. URLs
b. proxies d. indices
ANS: B PTS: 1 REF: 403

67. A(n) ____ is a type of utility software that captures unsolicited e-mails before they reach your inbox.
a. quick check c. proxy
b. spam filter d. anonymizer
ANS: B PTS: 1 REF: 404

68. An e-mail scam designed to persuade you into revealing confidential information by replying to an
e-mail is called ____.
a. phishing c. pharming
b. spoofing d. anonymizing
ANS: A PTS: 1 REF: 405

69. To avoid becoming a spam victim, you should ____.


a. reply to spam when you receive it
b. always click on the links in e-mail messages
c. provide your e-mail address to all sites that request it
d. use a disposable e-mail address when you register for online sites
ANS: D PTS: 1 REF: 405

70. ____ schemes redirect users to fake sites by poisoning a domain name server with a fake IP address.
a. Filtering c. Proxy
b. Hypertexting d. Pharming
ANS: D PTS: 1 REF: 406
Case-Based Critical Thinking Questions
Case 7-1

Mark is interested in Internet e-commerce security issues. His friend Amelia runs a small B2C site that
sells vintage clothing. He discusses the topic with Amelia, and learns how browsers and Web servers
communicate with each other.

71. Amelia tells Mark that when he enters a URL in his browser’s Address box and presses the Enter key,
a communications process begins. The domain name contained in the URL leads to a Web server that
his browser contacts. The browser opens a socket and connects to a similar open socket at the Web
server. Then the browser generates and sends an HTTP message through the socket. The server
responds by sending back the requested HTML document through the open sockets. At this point,
Amelia tells Mark, the final step in the process occurs. What is this last step?
a. The server sends the request to a printer.
b. The browser goes back to the server to find images to display.
c. The server closes its socket, and the browser closes its socket.
d. The browser sends the data to other browsers connected to the network.
ANS: C PTS: 1 REF: 364 TOP: Critical Thinking

72. Amelia explains that there is a difference between HTTP and HTTPS. HTTPS is a combination of
HTTP and ____
a. SSL c. TLS
b. SSL/TLS d. AAC
ANS: B PTS: 1 REF: 390 TOP: Critical Thinking

Case-Based Critical Thinking Questions


Case 7-2

Jessica likes to participate in B2C e-commerce, but recently has had a number of friends who have had
problems shopping online. She wonders if it is safe to shop online and just how much she is
compromising her privacy by doing so. Jessica is justifiably worried about the security of the personal
information and credit card information she regularly supplies while shopping on the Web. In addition,
she knows that merchants who market goods and services over the Internet sometimes secretly gather
information and provide it to advertisers or other interested parties.

73. As Jessica begins her research of just how shopping carts work, she is surprised to find that many
e-commerce sites store information about her Web visits on her hard drive. What do these sites use to
store visit information?
a. certificate authorities c. digital certificates
b. cookies d. Web servers
ANS: B PTS: 1 REF: 387 TOP: Critical Thinking

74. What type of information does Jessica find Web sites typically store in cookies?
a. Pages she has viewed while visiting the site.
b. Items she has placed in her shopping cart.
c. Personal information she has keyed into a Web page form on the site.
d. All of the above.
ANS: D PTS: 1 REF: 368 TOP: Critical Thinking
75. Jessica has an always-on connection to the Internet. She has read about IP addresses and knows that
some Web sites can track them. She would like to surf the Internet anonymously to protect her privacy.
How can she do this?
a. Use antivirus software c. Run a Java applet
b. Install a Web bug d. Use an anonymous proxy service
ANS: D PTS: 1 REF: 403 TOP: Critical Thinking

Case-Based Critical Thinking Questions


Case 7-3

Melissa has decided to obtain an e-mail account. Although she plans to use the e-mail account to
communicate with her many friends, her main purpose in establishing it is to aid in the search for a
job. She has a list of e-mail addresses for a group of potential employers. Melissa intends to e-mail her
resume, along with a general message, to each of them. She will use the same message for all
recipients.

76. Melissa wants to ensure that the resume she attaches to the e-mail messages she is sending to the
potential employers will successfully make it to them. She should try to limit the size of the attachment
to ____ or less for dial-up connections.
a. 10 KB c. 100 KB
b. 50 KB d. 200 KB
ANS: B PTS: 1 REF: 398 TOP: Critical Thinking

77. Melissa is concerned about the security of her computer, and she wants to avoid malicious exploits,
which can work their way into her computer through various security holes. Which type of e-mail
service has been the target of many such exploits?
a. Webmail c. IMAP
b. POP3 d. QUALCOMM
ANS: A PTS: 1 REF: 396 TOP: Critical Thinking

78. Melissa is planning to travel a great deal in the coming weeks. She will not be taking her computer
with her, but knows that the hotels she will be staying at have business centers with Internet-enabled
computers. She plans to access her e-mail account every day so that she can quickly respond should
she be contacted by a prospective employer. Which one of the following account types should she use?
a. POP3 c. IMAP
b. Webmail d. QUALCOMM
ANS: B PTS: 1 REF: 394-396 TOP: Critical Thinking

Case-Based Critical Thinking Questions


Case 7-4

Elizabeth has to conduct a series of Internet searches to collect information for a number of research
papers she is writing. After much trial and error, she is finding that there are efficient and precise ways
to do these searches.

79. Her first search is for pages that include the term “railroad history,” but she is not interested in “cars.”
What search operator should she use to precede the keyword “cars”?
a. AND c. OR
b. NOT d. quotation marks
ANS: B PTS: 1 REF: 379 TOP: Critical Thinking
80. For the next search, she wants only Web pages containing the complete phrase “Mars exploration.”
Which search operator should she use to formulate her query?
a. AND c. OR
b. NOT d. quotation marks
ANS: D PTS: 1 REF: 379 TOP: Critical Thinking

COMPLETION

1. The term ____________________ was first used in the mid-1960s to describe a computer system that
could store literary documents, link them according to logical relationships, and allow readers to
comment and annotate what they read.

ANS: hypertext

PTS: 1 REF: 360

2. The ____________________ is a collection of files that can be linked and accessed using HTTP.

ANS:
Web
WWW
World Wide Web
World Wide Web (WWW)
WWW (World Wide Web)

PTS: 1 REF: 360

3. The applications in the accompanying figure assemble a document on your computer screen according
to the specifications contained in ____________________ tags.

ANS:
HTML
Hypertext Markup Language
Hypertext Markup Language (HTML)
HTML (Hypertext Markup Language)
PTS: 1 REF: 362

4. Web ____________________ software provides tools specifically designed to enter and format Web
page text, graphics, and links.

ANS: authoring

PTS: 1 REF: 369

5. A(n) ____________________ script consists of scripting statements that run on your local computer.

ANS: client-side

PTS: 1 REF: 372

6. A(n) ____________________ displays results or hits as a list of relevant Web sites, accompanied by
links to source pages and short excerpts containing the keywords.

ANS:
search engine
Web search engine

PTS: 1 REF: 374

7. ____________________ is typically used to describe business transactions that are conducted over a
computer network.

ANS: E-commerce

PTS: 1 REF: 384

8. Banner and pop-up ads earn revenue for hosting merchants based on the ____________________,
which is the number of times that site visitors click the ad to connect to the advertiser’s site.

ANS: click-through rate

PTS: 1 REF: 385

9. A(n) ____________________ is an advertisement, typically embedded at the top of a Web page.

ANS: banner ad

PTS: 1 REF: 385

10. A(n) ____________________ is an advertisement that appears in a separate window when you enter a
Web site.

ANS:
pop-up ad
pop-up

PTS: 1 REF: 385


11. A(n) ____________________ is a cyberspace version of the metal cart you wheel around a store and
fill up with merchandise.

ANS:
online shopping cart
shopping cart

PTS: 1 REF: 387

12. Technologies that create ____________________ connections include SSL/TLS and HTTPS.

ANS: secure

PTS: 1 REF: 389

13. PayPal is an example of a(n) ____________________ payment service.

ANS:
P2P
online
third-party
person-to-person

PTS: 1 REF: 391

14. If Chelsea Barton were sending a Word document along with the message in the accompanying figure,
that document would be considered an e-mail ____________________.

ANS: attachment
PTS: 1 REF: 398

15. Obtaining an e-mail ____________________ gets your electronic mailbox set up on an e-mail server.

ANS: account

PTS: 1 REF: 393

16. If you click an ad, a third party can create a(n) ____________________ cookie without your
knowledge and use it to track your activities at any site containing banner ads from that third party.

ANS: ad-serving

PTS: 1 REF: 400

17. ____________________ is a type of security software designed to identify and neutralize Web bugs,
ad-serving cookies, and other spyware.

ANS: Antispyware

PTS: 1 REF: 403

18. Individuals who prefer not to leave a trail of their Internet activities surf through a(n)
____________________ proxy service, which uses an intermediary server to relay Web page requests
after masking the originating IP address.

ANS: anonymous

PTS: 1 REF: 403

19. The popular term for unwanted electronic junk mail about medical products, low-cost loans, and fake
software upgrades that arrives in your online mailbox is ____________________.

ANS: spam

PTS: 1 REF: 404

20. ____________________ is an exploit that redirects users to fake sites by poisoning a domain name
server with a false IP address.

ANS: Pharming

PTS: 1 REF: 406

MATCHING

Identify the letter of the choice that best matches the phrase or definition.
a. pharming g. XHTML
b. spam h. socket
c. HTTP i. B2C
d. cookie j. anonymous proxy service
e. phishing k. stateless protocol
f. Web server l. browser
1. An exploit that redirects users to fake sites by poisoning a domain name server with a false IP address
2. A small chunk of data generated by a Web server and stored in a text file on your computer’s hard disk
3. An Internet-based computer that accepts requests from browsers
4. Software program that runs on your computer and helps you access Web pages
5. Unwanted electronic junk mail about, say, medical products, low-cost loans, and fake software
upgrades that arrives in your online mailbox
6. An e-mail based scam that is designed to persuade you to reveal confidential information
7. Represents one end of a connection
8. Protocol used to get Web resources to your desktop
9. An e-commerce activity whereby businesses supply goods and services to individual consumers
10. Maintains no record of previous interactions
11. Used by individuals who prefer not to leave a trail of their Internet activities
12. These kinds of documents are required to adhere to a strict set of syntax rules

1. ANS: A PTS: 1 REF: 406


2. ANS: D PTS: 1 REF: 368
3. ANS: F PTS: 1 REF: 361
4. ANS: L PTS: 1 REF: 361
5. ANS: B PTS: 1 REF: 404
6. ANS: E PTS: 1 REF: 405
7. ANS: H PTS: 1 REF: 364
8. ANS: C PTS: 1 REF: 364
9. ANS: I PTS: 1 REF: 385
10. ANS: K PTS: 1 REF: 368
11. ANS: J PTS: 1 REF: 403
12. ANS: G PTS: 1 REF: 362

ESSAY

1. Give two reasons why it is important to upgrade your browser when a new version becomes available.

ANS:
The problem with using an old browser is that some Web pages depend on new HTML features
supported only by the latest browser versions. Without the latest upgrade, you might encounter errors
when your browser tries to display a page, but cannot interpret some of the HTML. In other cases,
your browser might display the Web page without errors, but you will not see all the intended effects.
Another important reason to upgrade is for increased security. As hackers discover and take advantage
of security holes, browser publishers try to patch the holes. Upgrades usually contain patches for
known security holes, although new features might sometimes open new holes.

PTS: 1 REF: 367 TOP: Critical Thinking

2. What are the advantages of local e-mail?

ANS:
Because local e-mail stores your Inbox and Outbox on your computer, you can compose and read mail
offline. You are required to go online only to transfer outgoing mail from your Inbox to the e-mail
server and to receive incoming messages. On a slow dial-up connection or in situations where you are
charged for dial-up service by the minute, local e-mail might be preferable to Webmail.
Local e-mail also works well with broadband always-on connections, such as DSL, cable Internet, or
satellite Internet. When using these connections, you can remain online throughout the entire process
of collecting, reading, and sending mail. By configuring your e-mail client to send messages
immediately, messages can be sent as they are composed instead of remaining in your Outbox and
being sent as a batch.

The major advantage of local e-mail is control. Once your messages are transferred to your computer’s
hard disk, you can control access to them. With this control, however, comes the responsibility for
maintaining backups of your important e-mail messages.

PTS: 1 REF: 394 TOP: Critical Thinking

3. What are the pros and cons of Webmail?

ANS:
Webmail is ideal for people who travel because accounts can be accessed from any computer
connected to the Internet. Accessing e-mail from a public computer can be a security risk, however. If
possible, reboot the computer before logging into your e-mail account. Avoid entering sensitive
information, such as your credit card number, in case your keystrokes are being monitored by
malicious software lurking on the public computer. Be sure to log off when your session is finished.
Log out of Windows, and shut down the computer if you are allowed to do so.

Even when accessing Webmail from your home, security can be an issue. Unfortunately, Webmail
services are the target of many malicious exploits, which can work their way into your computer
through various security holes. When using Webmail, your computer must be protected by security
software, and your computer will be more secure if you log out of your e-mail account when you are
not using it.

Webmail can be accessed from mobile devices when your computer is not handy. If you opt to use
mobile mail, read the options offered by your e-mail service provider and make sure you understand
how to sync your mobile e-mail with the mail you view on your computer so that you don’t miss an
important message.

Free Webmail is supported by advertising, so expect to see advertisements. Today’s sophisticated ad


servers can search the content of an incoming message looking for keywords and then use them to
display targeted ads in your e-mail window. Some Webmail services offer an ad-free option for a
monthly fee.

PTS: 1 REF: 396 TOP: Critical Thinking

You might also like