Filters
Question type

Study Flashcards

Technologies that create ____________________ connections include SSL/TLS and HTTPS.

Correct Answer

verifed

verified

Melissa has decided to obtain an e-mail account. Although she plans to use the e-mail account to communicate with her many friends, her main purpose in establishing it is to aid in the search for a job. She has a list of e-mail addresses for a group of potential employers. Melissa intends to e-mail her resume, along with a general message, to each of them. She will use the same message for all recipients. -Melissa wants to ensure that the resume she attaches to the e-mail messages she is sending to the potential employers will successfully make it to them.She should try to limit the size of the attachment to ____ or less for dial-up connections.


A) 10 KB
B) 50 KB
C) 100 KB
D) 200 KB

Correct Answer

verifed

verified

  -In an e-mail message,such as the one found in the accompanying figure,the recipient's e-mail address and the message subject are found in the ____. A)  tool bar B)  message header C)  attachment D)  message body -In an e-mail message,such as the one found in the accompanying figure,the recipient's e-mail address and the message subject are found in the ____.


A) tool bar
B) message header
C) attachment
D) message body

Correct Answer

verifed

verified

Examples of Uniform Resource Identifiers include ____.


A) URLs
B) Social Security numbers
C) ISBNs
D) all of the above

Correct Answer

verifed

verified

E-mail is based on store-and-forward technology.

Correct Answer

verifed

verified

A(n)____________________ is an advertisement that appears in a separate window when you enter a Web site.

Correct Answer

verifed

verified

Incoming mail can be stored on a(n) ____ server until it is downloaded to the inbox on your hard disk.


A) Webmail
B) POP3
C) IMAP
D) SMTP

Correct Answer

verifed

verified

Every Web page has a unique address called a(n) Uniform Resource Locator._________________________

Correct Answer

verifed

verified

A Web server's response to a browser's request includes an HTTP ____ that indicates whether the browser's request could be fulfilled.


A) socket code
B) protocol code
C) status code
D) completion code

Correct Answer

verifed

verified

The ____________________ is a collection of files that can be linked and accessed using HTTP.

Correct Answer

verifed

verified

Web
WWW
World Wide W...

View Answer

What are the pros and cons of Webmail?

Correct Answer

verifed

verified

Webmail is ideal for people who travel b...

View Answer

____ is the most frequently used HTTP method.


A) FTP
B) THIS
C) POST
D) GET

Correct Answer

verifed

verified

For HTTP,____ usually are associated with port 80 on the client and server.


A) exchanges
B) methods
C) sockets
D) actions

Correct Answer

verifed

verified

Pharming is less surreptitious and easier to detect than most other hacker schemes.

Correct Answer

verifed

verified

Individuals who prefer not to leave a trail of their Internet activities surf through a(n)____________________ proxy service,which uses an intermediary server to relay Web page requests after masking the originating IP address.

Correct Answer

verifed

verified

  -If Chelsea Barton were sending a Word document along with the message in the accompanying figure,that document would be considered an e-mail ____________________. -If Chelsea Barton were sending a Word document along with the message in the accompanying figure,that document would be considered an e-mail ____________________.

Correct Answer

verifed

verified

      -A(n)<u>control</u> is a program that extends the ability of the kind of applications shown in the accompanying figure to work with file formats._________________________       -A(n)<u>control</u> is a program that extends the ability of the kind of applications shown in the accompanying figure to work with file formats._________________________ -A(n)control is a program that extends the ability of the kind of applications shown in the accompanying figure to work with file formats._________________________

Correct Answer

verifed

verified

Banner and pop-up ads earn revenue for hosting merchants based on the ____________________,which is the number of times that site visitors click the ad to connect to the advertiser's site.

Correct Answer

verifed

verified

The ____ wildcard character allows a search engine to find pages with any derivation of a basic word.


A) +
B) &
C) *
D) $

Correct Answer

verifed

verified

____ may pose a threat to your computer's security and/or your privacy.


A) Flash cookies
B) Web bugs
C) Ad-serving cookies
D) all of the above

Correct Answer

verifed

verified

Showing 81 - 100 of 150

Related Exams

Show Answer