Chapter 4 Flashcards

1
Q

The ____ is a worldwide set of interconnected computers, servers, and networks.

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ____ is composed of Internet server computers on networks that provide online information in a specific format.

A

World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ allows Web authors to combine text, graphic images, audio, video, and hyperlinks into a single document.

A

HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Instructions written in HTML code specify how a local computer’s Web ____ should display the words, pictures, and other elements on a user’s screen.

A

Browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Most Internet transmissions are based on ____.

A

Port Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It is estimated that over 100 trillion e-mails are sent annually, increasing at a rate of ____ percent each year.

A

10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The SMTP server listens on port number ____.

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The current version of IMAP is ____.

A

IMAP4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

E-mail ____ are documents that are connected to an e-mail message, such as word processing documents, spreadsheets, or pictures.

A

Attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ is a scripting language that does not create standalone applications.

A

Javascript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ is a complete programming language that can be used to create stand-alone applications.

A

Java

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A(n) ____ is a program that does not come from a trusted source.

A

Unsigned Java Applet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unsigned Java applets run in a security ____, which is like a fence that surrounds the program and keeps it away from private data and other resources on a local computer.

A

Sandbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ represent a specific way of implementing ActiveX and are sometimes called ActiveX applications.

A

Actie x controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ActiveX controls can be invoked from Web pages through the use of a ____ or directly by an HTML command.

A

Scripting Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Known as ____, the deleted cookie’s unique ID can still be assigned to a new cookie using the data stored in a Flash cookie as a backup.

A

Respawning

17
Q

____ is a technology that can associate a user’s identity to a public key, in which the user’s public key has been “digitally signed” by a trusted third party.

A

A digital certificate

18
Q

____ look for specific words and block e-mail messages containing those words.

A

Spam Filters

19
Q

____ uses graphical images of text in order to circumvent text-based filters.

A

Image Spam

20
Q

A(n) ____ is a business from which users purchase Internet access.

A

Internet service provider

21
Q

Most e-mail clients contain a ____ that allows the user to read an e-mail message without actually opening it.

A

Reading Pane

22
Q

Identifies the program or service that is being requested

A

Port Number

23
Q

A file used to store user-specific information on the user’s local computer and then retrieve it later

24
Q

An HTML element that allows for one HTML document to be embedded inside the main document

25
Sent the first e-mail message in 1971
Ray Tomlinson
26
Automatically blocks over 80 different types of file attachments that may contain malware
Microsoft Outlook
27
The standard port for HTTP transmissions
Port 180
28
A list of senders for which the user does not want to receive any e-mail
Blacklist
29
A list of senders for which the user will accept e-mail
Whitelist
30
Helps to protect the user from malicious code that may be embedded in the attachment because scripts and ActiveX controls are disabled during this process
Preview Attachments