Create an account
Which of the following Web-based applications is NOT sometimes characterized as Web 2.0?
A(n) _____ is a collection of related information organized and formatted so it can be accessed using software called a browser.
A ____ HTTP connection reuses the same HTTP connection to send and receive multiple requests.
When your browser fetches pages and graphics to form a Web page, it stores them in a temporary file on your hard drive called a Web _____.
A _____ enables a Web server to keep track of your activity and compile a list of your purchases.
_____ provides tools specifically designed to enter and format Web page text, graphics, and links.
Web authoring software
A(n) _____ is a series of instructions that is embedded directly into an HTML document that instruct the browser to carry out specific action or to respond to specific user actions.
A(n) ____ certificate is an electronic attachment to a file that verifies the identity of its source.
A(n) _____ helps people locate information on the Web by formulating simple keyword queries.
A Web ____, automated to methodically visit Web sites, can be programmed to perform various activities as it visits those sites.
A search engine's _____ looks for your search terms in the search engine's indexed database and returns a list of relevant Web sites.
The _ wildcard character allows a search engine to find pages with any derivation of a basic word.
When you use a search engine, it stores all of the following information about your query EXCEPT ____.
Many ____ sites act as relay stations to forward your searches to search engines without leaving a trail back to a cookie or IP address.
When you purchase a textbook online from a site like "www.amazon.com", you are participating in ____ e-commerce.
Both SSL and its successor, ____, protocols that encrypt data traveling between a client computer and an HTTP server.
Which if the following statements is NOT true?
Web pages that provide a secure connection start with httpx: instead of http:.
Incoming mail can be stored on a(n) ____ server until it's downloaded to the inbox on your hard disk.
____ is similar to POP3, but it leaves messages on the server until you specifically delete them.
IMAP (Internet Messaging Access Protocol)
Before sending a large attachment in an e-mail, you can use a(n) _____ to shrink it.
Which of the following may pose a threat to your computer's security and/or your privacy?
all of the above
____ software is a type of security software designed to identify and neutralize Web bugs, ad-serving cookies, and other types of malware.
A tradeoff to the anonymity offered by anonymous _____ is that they tend not to operate at the same speed as your regular browser.
An e-mail scam designed to persuade you into revealing confidential information by replying to an e-mail is called ____.
To avoid becoming a spam victim, you should _____.
use a disposable e-mail address when you register for online sites.
_____ scheming redirect users to fake sites by poisoning a domain name server with a fake IP address.
The type of manual calculator used in Ancient Rome, Greece, India, China, and Japan is called a(n) ____.
The U.S Census Bureau held a competition to find a way to tabulate the 1890 census. The Hollerith Tabulating Machine. The company is now known as _____.
The general-purpose electronic computer designed to calculate trajectory tables for the U.S. Army was _____.
By the mid-1990s, IBM-compatible computer systems accounted for more than ___ percent of all personal computer sales.
The ____ Act enhances the authority of law enforcement agents to prevent various terrorist acts such as monitoring electronic communication without a warrant.
The ____ Act extends telephone wiretap laws by restricting government agents and unauthorized third parties from tapping into data transmissions without a search warrant.
Electronic Communications Privacy
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together