Chapter 4 Flashcards

1
Q

The ____ is a worldwide set of interconnected computers, servers, and networks.

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ____ is composed of Internet server computers on networks that provide online information in a specific format.

A

World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ allows Web authors to combine text, graphic images, audio, video, and hyperlinks into a single document.

A

HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Instructions written in HTML code specify how a local computer’s Web ____ should display the words, pictures, and other elements on a user’s screen.

A

Browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Most Internet transmissions are based on ____.

A

Port Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It is estimated that over 100 trillion e-mails are sent annually, increasing at a rate of ____ percent each year.

A

10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The SMTP server listens on port number ____.

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The current version of IMAP is ____.

A

IMAP4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

E-mail ____ are documents that are connected to an e-mail message, such as word processing documents, spreadsheets, or pictures.

A

Attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ is a scripting language that does not create standalone applications.

A

Javascript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ is a complete programming language that can be used to create stand-alone applications.

A

Java

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A(n) ____ is a program that does not come from a trusted source.

A

Unsigned Java Applet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unsigned Java applets run in a security ____, which is like a fence that surrounds the program and keeps it away from private data and other resources on a local computer.

A

Sandbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ represent a specific way of implementing ActiveX and are sometimes called ActiveX applications.

A

Actie x controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ActiveX controls can be invoked from Web pages through the use of a ____ or directly by an HTML command.

A

Scripting Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Known as ____, the deleted cookie’s unique ID can still be assigned to a new cookie using the data stored in a Flash cookie as a backup.

A

Respawning

17
Q

____ is a technology that can associate a user’s identity to a public key, in which the user’s public key has been “digitally signed” by a trusted third party.

A

A digital certificate

18
Q

____ look for specific words and block e-mail messages containing those words.

A

Spam Filters

19
Q

____ uses graphical images of text in order to circumvent text-based filters.

A

Image Spam

20
Q

A(n) ____ is a business from which users purchase Internet access.

A

Internet service provider

21
Q

Most e-mail clients contain a ____ that allows the user to read an e-mail message without actually opening it.

A

Reading Pane

22
Q

Identifies the program or service that is being requested

A

Port Number

23
Q

A file used to store user-specific information on the user’s local computer and then retrieve it later

A

Cookie

24
Q

An HTML element that allows for one HTML document to be embedded inside the main document

A

iFrame

25
Q

Sent the first e-mail message in 1971

A

Ray Tomlinson

26
Q

Automatically blocks over 80 different types of file attachments that may contain malware

A

Microsoft Outlook

27
Q

The standard port for HTTP transmissions

A

Port 180

28
Q

A list of senders for which the user does not want to receive any e-mail

A

Blacklist

29
Q

A list of senders for which the user will accept e-mail

A

Whitelist

30
Q

Helps to protect the user from malicious code that may be embedded in the attachment because scripts and ActiveX controls are disabled during this process

A

Preview Attachments