IISY 101 WEEK 7 QUIZ

Feedback
IISY 101 WEEK 7 QUIZ
1 A n __________ is client software that displays Web page elements and handles links between pages.

2.	HTML is called a markup language because authors mark up their documents by inserting HTML tags, which represent special instructions that specify how the document should appear when displayed on a computer screen or printed.

3.	The __________ for a Web site's main page, such as www.cnn.com, is usually short and to the point.

4.	__________ is a protocol that works in conjunction with TCP/IP to get Web resources to your desktop.

5.	A Web server's response to a browser's request includes an HTTP __________ that indicates whether the browser's request could be fulfilled.

6.	A __________ enables a Web server to keep track of your activity and compile a list of your purchases.

7.	__________ provides tools specifically designed to enter and format Web page text, graphics, and links.


8.	When you purchase a textbook online from a site such as www.amazon.com, you are participating in __________; however, when you purchase a used digital camera directly from the owner on an online auction, you are participating in __________ e-commerce.

9.	As Jessica begins her research of just how shopping carts work, she is surprised to find that many e-commerce sites store information about her Web visits on her hard drive. What do these sites use to store visit information?

10.	Most e-mail software has an HTML option. If the recipient of your HTML e-mail does not have HTML-compliant e-mail software, your message will be delivered as plain, unformatted __________ text.

11.	__________ temporarily stores new messages in your inbox on an e-mail server. When you request your mail, it is downloaded and stored on your computer.

12.	Web-based e-mail allows you to use a(n) __________ to access and view your e-mail messages.

13.	__________ e-mail stores your e-mail messages on a server, where you have less control over who can access them.

14.	To avoid becoming a spam victim you should:

15.	__________ schemes redirect users to fake sites by poisoning a domain name server with a fake IP address, whereas __________ is an e-mail scam designed to persuade you into revealing confidential information by replying to an e-mail.


	


Answer Detail

Get This Answer

Invite Tutor