Professional Documents
Culture Documents
Technology Now
Chapter 5: The World Wide Web
Chapter Review
WHAT IS THE WEB?
1. List three early inventions that led to the development of the World Wide Web.
In 1969 the Department of Defense connected four computers to create a network called ARPANET.
In 1968, Douglas Engelbart demonstrated several experimental technologies to the public, including the mouse,
video conferencing, word processing, and a hypertext interface.
In 1989, researcher Tim Berners-Lee proposed that the Internet be organized into “pages” of related
information. He wanted to link the pages using clickable text and images. He called this design the World Wide
Web.
2. For what purposes did scientists and universities start using the early Web?
ARPANET’s first job was to send email, which was much faster than using telephones or sending letters. The
benefits of email became readily apparent, and soon other universities and government agencies wanted to
connect their computers to the new network, too.
THE BROWSER
3. List four common features of all browsers.
Most Web browsers include common features, so if you have used one browser, you won’t have trouble
learning another. Some of these features are as follows:
Technology Now End of Chapter Exercise Answers Page 2 of 13
• Favorites, or bookmarks, which are saved shortcuts to Web pages.
• Tabbed browsing to access several Web pages in the same browser window.
• A history list of the Web pages you visit for a day, a week, a month, and so on.
• Pop-up blocking in your browser to prevent pop-up ads, or advertisements that appear in separate windows
when you connect to a Web page.
• Private browsing mode, which lets you surf the Web without leaving history, temporary Internet files, or small
text files called “cookies” that Web pages store on your computer’s hard drive to identify you when you visit
their site.
4. Name three current browsers and describe one feature of each browser.
Two popular browsers are Internet Explorer (IE) and Google Chrome, which can enhance your search or
browsing experience by allowing you to do the following:
• Select a word on a Web page, click the button or menu that opens, and select services such as mapping,
translation, and searching.
• Receive warnings of suspected phishing or malware while you browse.
• Remove unnecessary security warnings for downloads from reputable sites using an Application Reputation
feature (Internet Explorer).
• Connect to your cloud storage using the browser.
• Use a combined search and Address bar, where you can type in searches as well as Web addresses.
Safari, the default browser for Mac and iOs, is the first browser to comply with all standards from the W3C
(World Wide Web Consortium), the leading organization for setting Web standards. Safari features include the
following:
• Built-in support for Apple’s VoiceOver screen reader. VoiceOver describes aloud what appears on the screen
and reads the text and links of Websites, making the Web accessible to people with visual impairments.
• Enhanced keyboard navigation for navigating the Web without a mouse, as well as multi-touch gestures—such
as double-tapping the trackpad with two fingers to magnify part of a Web page.
• A Privacy pane, which displays information such as tracking data left by Web sites you visit so you can remove
the data and protect your privacy.
7. Give an example of how you can identify a secure Web site and what types of sites might be secured.
Technology Now End of Chapter Exercise Answers Page 3 of 13
Secure Web sites are essential to protecting sensitive data. A secure Web site is one that uses encryption to
safeguard transmitted information. A Web site can be secured using several methods. Encryption is the process
of temporarily scrambling data so it is not readable until it is decrypted.
The “https” prefix stands for Secure Hypertext Transfer Protocol. Web sites such as banks and retail stores use
the https protocol to make a secure connection to your computer.
Secure Web sites often use a digital certificate to verify the identity of a person or an organization. E-commerce
sites and sites that store personal information should be secure Web site.
9. Describe the functions of a Web crawler, an indexing utility, and a query processor. Explain how they work
together to provide search results.
A Web crawler or spider program is an automated program that uses hyperlinks to jump between Web pages,
collecting data about each page as it goes; Web crawlers can reach millions of Web pages each day.
An indexing utility receives data from a Web crawler and then compiles the collected data into an organized list
of key words and URLs.
A query processor looks for your search criteria in the indexed database and then displays the list of results as
URLs with corresponding descriptive information.
10. Create two different search criteria for finding information about your town using Boolean operators.
Explain the type of results you can expect from each search.
Answers will vary, but each should include search terms related to a town structured using Boolean operators.
Search criteria containing the AND operator indicate that all terms in the criteria must appear on the Web page
for it to be included in the results.
Search criteria containing the OR operator indicate that any one of the terms in the criteria must appear on the
Web page for it to be included in the results.
Search criteria containing the NOT operator indicate that the search term following NOT in the criteria must not
appear on the Web page for it to be included in the results.
12. How are videos transmitted from a Web site to your computer?
Many Web sites use video, which consists of images displayed in motion and usually accompanied by audio.
When you click a link to download a video, it is downloaded from a Web server, where it is stored, to your
computer. A server can transmit an entire video file before it begins to play on your computer.
But more commonly now, videos are also transmitted using streaming, where a small segment of the file is
transmitted and begins to play while the server sends the next segment.
14. List three TLDs, explain what they mean, and give an example of each.
Answers will vary, but thirteen examples of TLDs are presented in Tables 5-5 and 5-6 on page 5-18 in the text.
WEB APPLICATIONS
15. Define and explain the term “Web app.”
Web apps are applications that reside on a server on the Internet, rather than a user’s device, and are run by a
user through a Web browser.
16. What are three advantages and three disadvantages of working in the cloud?
The advantages of working in the cloud are as follows:
• You can collaborate on projects with coworkers in multiple locations, even if you have different work
schedules.
• You can access your work from any location because data is stored on the app’s Web site.
• You save storage space on your computer.
• You don’t have to install updates, since the newest version is always available on the app’s Web site.
• You can access Web apps from any device with a browser and Internet connection, including computers,
smartphones, or even enhanced media players.
ELECTRONIC COMMERCE
17. Define the term “e-commerce” and explain how it is used in our daily lives.
E-commerce refers to the purchase of physical products such as clothing and computers, intangible products
such as music, and services such as education, over the Internet.
Some businesses offer shopping both in the store and online. Both businesses and consumers use e-commerce
to enhance their organizations and private lives.
18. Name three ways you can pay for a service or product you purchase online.
One payment method is to submit your credit card number directly at a merchant’s Web site.
You can also make a person-to-person online payment, especially on auction sites. PayPal and Google Checkout
are two such services, in which you open an account and deposit money from your bank or provide your credit
card number.
Another option is an electronic wallet, also called a digital wallet, which is software that stores the payment
information you enter when you finalize an online purchase.
You also can pay using a one-time-use or virtual account number, which lets you make a single online payment
without revealing your actual account number.
20. Explain three ways in which RFID technology is used today and three ways in which NFC technology is used
today.
RFID tags
• have been in used by businesses for product tracking and loss prevention as well as in employee ID badges;
• provide security access to secure areas for selected people; and
• are used by pet owners who chip their pets to identify them in case they are lost; by transportation
departments on car tags to collect tolls; by airlines, to track and control commercial shipping baggage; in “smart
passports” and credit cards; and in identification badges that let employees access secure areas.
NFC chips
• can be used by organizations, medical professionals, and businesses to collect and transmit information, so
that users with readers installed on smartphones can get data about events or products and share back
information;
• support applications such as digital wallet and contactless payment systems that can be used from a
smartphone.
2. The first browser, Mosaic, was easier to use than previous interfaces because it had
a. a graphical user interface.
b. a command-line interface.
c. video streaming.
d. RFID technology.
4. Web pages include ______________ that direct you to other Web pages.
a. graphics
b. hyperlinks
Technology Now End of Chapter Exercise Answers Page 6 of 13
c. URLs
d. address bars
6. The use of emails that look legitimate but are designed to capture sensitive information is called
a. pharming.
b. phishing.
c. browsing.
d. spam.
8. ______________ is the name of the communications protocol that transports data over the Web.
a. Uniform resource locator (URL)
b. Hypertext Markup Language (HTML)
c. Scripting
d. Hypertext Transfer Protocol (HTTP)
9. The way to display data from a Web database for on-demand Web pages is to use ____________ publishing.
a. static Web
b. XML tag
c. dynamic Web
d. streaming Web
10. The two types of scripts used to enhance HTML pages are ___________ side scripts.
a. client- and dynamic-
b. client- and server-
c. XML- and HTML-
d. URL- and HTTP-
11. Google, Bing, and Yahoo! are examples of popular _______________ sites.
a. search
b. query
c. email
d. technology
12. Search engine technology has four components: a Web crawler, an indexer, a(n) _________, and a query
processor.
a. site
Technology Now End of Chapter Exercise Answers Page 7 of 13
b. database
c. engine
d. utility
14. Web site operators who push their sites to the top of results lists by manipulating meta keywords are
practicing ___________, which is unethical.
a. keyword stuffing
b. Boolean searching
c. indexing
d. Web crawling
15. _____________is the process of temporarily scrambling data so it is not readable until it is decoded.
a. Certification
b. Encryption
c. Coding
d. Securing
16. Web pages use ____________ graphics, which use mathematical formulas instead of pixels, to maintain the
same quality on all screens and have small file sizes.
a. bitmap
b. vector
c. video
d. JPG
17. A _________ is a series of program instructions that can be embedded directly into the HTML code for a
Web page or in a file referenced in the HTML code.
a. vector
b. script
c. bitmap
d. Flash GIF
18. ___________ addresses are allocated to each network on the Internet to ensure that no two computers
have the same address.
a. HTML
b. HTTP
c. URL
d. IP
19. The three letters that follow a "dot," as in .edu, .org, or .mil, are called ___________________.
a. top-level domains
b. domain name servers
c. domain name systems
d. suffixed domains
Technology Now End of Chapter Exercise Answers Page 8 of 13
20. A ________________ is a Web page listing journal entries, in chronological order, that usually reflect an
author’s point of view.
a. wiki
b. blog
c. page
d. social network
Technology Now End of Chapter Exercise Answers Page 9 of 13
21. In the space next to each image below, write the letter of the technology it represents.
a. QR code
b. URL
c. scanner
d. barcode
e. HTML
b. Write a paragraph about each of the three different career search sites (list the URL of the site) comparing
the ease-of-use of each site and how successful you were in locating possible employment options.
Answers will vary over time and based on the specific job sites used. Three sample job sites are:
1) monster.com:
2) indeed.com:
3) careerbuilder.com:
Opinions about the ease of use of each site and success in locating possible employment will vary based on job
site and specific job selected. Factors that would add to ease of use include flexible and powerful search
functions, percent of relevant jobs appearing in search results, ease of accessing job details, and clear,
uncluttered layout of search results and job details.
b. Research and write at least 100 words about how some businesses try to manipulate their reviews on a site
such as Yelp.
Answers will vary, but examples include: employees and friends posting positive reviews posing as customers,
businesses offering discounts or free products in exchange for positive reviews, and businesses paying Yelp for
preferential treatment.
A list of features of Google Chrome at the time this document was created is provided (URL:
https://www.google.com/intl/en_us/chrome/browser/features.html)
Speed: Chrome is designed to be fast in every possible way. It's quick to start up from your desktop, loads web
pages in a snap, and runs complex web applications lightning fast.
Simplicity: Chrome's browser window is streamlined, clean and simple. For example, you can search and
navigate from the same box and arrange tabs however you wish -- quickly and easily.
Security: Chrome is designed to keep you safer and more secure on the web with built-in malware and phishing
protection, auto-updates to make sure you have all the latest security fixes, and more.
Privacy: Chrome puts you in control of your private information while helping protect the information you share
when you’re online.
Customization: There are tons of ways to customize Chrome and make it yours. It's easy to tweak your settings
and add apps, extensions, and themes from the Chrome Web Store.
Signing In: Signing in to Chrome brings your bookmarks, history, and other settings to all your computers. It also
automatically signs you in to all your favorite Google services.
Technology Now End of Chapter Exercise Answers Page 12 of 13
Some may consider remarketing an effective way to deliver ads for products consumers are definitely interested
in, while others may consider the persistence of the ads an annoying disincentive, or may argue that simply
searching for a word or phrase in any context could lead to persistent remarketing ads not actually relevant to a
consumer's purchasing interests.
Credit card advantages: use is widely supported, provides built-in consumer protections, not dependent on
battery life or network connections
Credit card disadvantages: vulnerable to theft or surreptitious card scanners
Mobile wallet advantages: not vulnerable to surreptitious card scanners
Mobile wallet disadvantages: dependent on battery life or network connections, vulnerable to loss or theft,
limited support by number of vendors
b. If you could save money by using discounts that have been applied to your personal mobile wallet payment
account, would you consider using Google Wallet or Apple Passbook? Why?
Technology Now End of Chapter Exercise Answers Page 13 of 13
Answers will vary based on personal opinion. Arguments in favor or using the mobile wallet may include product
discounts, convenience, and consolidating multiple functions into one device and one financial account.
Arguments against the mobile wallet may include privacy concerns, technological limitations, lack of widespread
use and support, and risk of device loss or theft.
c. How could you use mobile wallets to organize store loyalty cards?
Answers will vary, but sample uses include using a mobile wallet in the same way as a store loyalty card, scanned
at time of purchases. A mobile wallet may include a supporting app that allows a consumer to track loyalty
points, create instant custom shopping lists based on past purchase habits, choose loyalty rewards, receive
personalized coupons or discount offers, and connect with the store via social media or direct messaging.
a. When everyone on the team has arrived in the Google Hangout, take a screen shot with all the team
members’ names listed.
Solutions will vary, but should include a screen short image showing the Google Hangout interface with all team
members' names listed.
b. Collaborate with your team members to determine how Google Hangouts could be used for business
teams. Create a short 150+ word document about your ideas.
Answers will vary, but sample business uses of Google Hangouts include live meetings with staff and vendors
supported by multimedia, marketing presentations to customers, live training events, document collaboration,
and remote job interviews.