NAME

Question types


Start with


Question limit

of 79 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. 1995-2000
  2. Hypertext Transfer Protocol (HTTP)
  3. Business-to-Business (B2B) E-Commerce
  4. blog
  5. worm
  1. a internet equivalent of a journal
  2. b what the URL is made up of: domain name, path, and resource name.
  3. c similar to a virus but does not need the action of a user to execute the code and cause damage
  4. d refers to a business providing supplies to other businesses via the Internet
  5. e dot-com boom

5 Multiple choice questions

  1. the process of transferring a file or document from one computer to the user's computer
  2. the process of transferring a file or document from the user's computer to another computer.
  3. knowledgeable thieves remove some of a computer's RAM chips but leave enough to start the computer.
  4. which can be hardware or software, to prevent unauthorized access.
  5. is a type of application software that makes sending and receiving messages through computer networks possible

5 True/False questions

  1. data diddlinginsiders modify data by altering accounts or database records so that it's difficult or impossible to tell that they've stolen funds or equipment

          

  2. spamthe third part of a complete URL, specifies the location of the document on the server.

          

  3. time bombwhich can be hardware or software, to prevent unauthorized access.

          

  4. web browseralert the sender that the spam message has been opened, adding your address to a list of validated addresses.

          

  5. Virussimilar to a virus but does not need the action of a user to execute the code and cause damage

          

Create Set