Вы находитесь на странице: 1из 32

Chapter 2

The Internet, the Web, and Electronic Commerce

Multiple Choice

1.

The Internet was launched in 1969 and was originally called


a) AARPNET
b) CERNET
c) CERN
d) ARPANET
Answer: D
Difficulty level: Hard
Page: 30
Response: The Internet was originally called Advanced Research Project
Agency Network (ARPANET).

2.

The actual physical network made up of wires, cables, and satellites that
connects computers and resources throughout the world is the
a) Web
b) Internet
c) e-commerce
d) spiders
Answer: B
Difficulty level: Medium
Page: 30
Response: The Internet is the actual physical network. It is made up of
wires, cables, and satellites.

3.

The most popular Internet activity is


a) going shopping
b) conducting research
c) playing games, reading, listening to music
d) communicating with others
Answer: D
Difficulty level: Easy
Page: 30
Response: Communicating is by far the most popular Internet activity.

4.

The fastest-growing application for the Internet is


a) going shopping
b) conducting research
c) playing games, reading, and listening to music
d) using e-mail
Answer: A
Difficulty level: Medium
Page: 30
Response: Shopping is one of the fastest-growing Internet applications.

5.

Most common uses of the Internet and the Web include communicating,
shopping,
a) searching, entertainment, and education
b) e-commerce, e-mail, and searching
c) e-mail, entertainment, and education
d) e-commerce, e-mail, and education
Answer: A
Difficulty level: Medium
Page: 30
Response: The most common uses of the Internet include communicating,
shopping, searching, entertainment, and education or e-learning.

6.

The __________ is the multimedia interface to resources available on the


Internet.
a) Web
b) ISP
c) browser
d) URL
Answer: A
Difficulty level: Medium
Page: 30
Response: The Web provides a multimedia interface to resources available
on the Internet.

7.

The multimedia interface to the resources available on the Net is called the
a) World Wide Web
b) Internet
c) GUI interface

d) server
Answer: A
Difficulty level: Easy
Page: 30
Response: The Web provides a multimedia interface to resources available
on the Internet.

8.

The most common method for gaining access to the Internet is through a
__________.
a) dumb terminal
b) virtual provider or computer
c) point-to-point computer
d) provider or host computer
Answer: D
Difficulty level: Medium
Page: 31
Response: The most common way to access the Internet is through a
provider or host computer.

9.

The term ISP refers to


a) internal software protocol
b) international shareware pool
c) Internet service provider
d) interface standard protocol
Answer: C
Difficulty level: Medium
Page: 32
Response: ISP is an acronym for Internet service providers.

10.

A __________ program provides access to Web resources.


a) Web
b) ISP
c) browser
d) URL
Answer: C
Difficulty level: Easy
Page: 32
Response: Browsers are programs that provide access to Web resources.

11.

These types of commercial Internet service providers are the most widely
used
a) national service providers
b) regional service providers
c) centralized service providers
d) decentralized service providers
Answer: A
Difficulty level: Medium
Page: 32
Response: National service providers such as AOL are the most widely
used.

12.

In a client/server network, the users computer is considered the


a) server
b) client
c) Web site
d) library
Answer: B
Difficulty level: Hard
Page: 32
Response: The users computer is the client that requests services from the
providers computer or server.

13.

For a browser to connect to other resources, the location or address of the


resources must be specified. These addresses are called
a) URLs
b) packets
c) e-mail forms
d) MSN
Answer: A
Difficulty level: Medium
Page: 32
Response: URLs specify the location or address of the resources.

14.

The two basic parts of URLs are


a) TCP/IP and ISP

b) destination and device


c) the protocol and the domain name
d) TCP and IP
Answer: C
Difficulty level: Hard
Page: 32
Response: URLs have two basic parts the protocol and the domain name
or the name of the server where the resource is located.

15.

Rules for exchanging data between computers are called


a) programs
b) procedures
c) protocols
d) hyperlinks
Answer: C
Difficulty level: Medium
Page: 32
Response: Protocols are rules for exchanging data between computers.

16.

The most widely used Web protocol is


a) http://
b) URL
c) HTML
d) ISP
Answer: A
Difficulty level: Hard
Page: 32
Response: The most widely used Web protocol is http://.

17.

Moving from one Web site to another is called


a) jumping
b) moving
c) surfing
d) applying
Answer: C
Difficulty level: Easy
Page: 32
Response: Browsers allow you to explore, or surf the Web by moving from
one Web site to another.

18.

The extensions .gov, .edu, .mil, and .net are called


a) DNSs
b) e-mail targets
c) domain codes
d) mail to addresses
Answer: C
Difficulty level: Hard
Page: 32
Response: Domain codes such as these are used to identify the type of
organization.

19.

In the e-mail address "justincase@usource.org", what is the domain name?


a) The whole address is called the domain name.
b) .org
c) usource.org
d) justincase
Answer: C
Difficulty level: Hard
Page: 32
Response: The second part of the e-mail address identifies the domain name.

20.

URL is an acronym for __________.


a) Uniform Resource Locator
b) Uniform Resource Link
c) Universal Reference Locator
d) Unlimited Real-time Language
Answer: A
Difficulty level: Medium
Page: 32
Response: URL is an acronym for uniform resource locator.

21.

When surfing the Web, the browser interprets the HTML command found
in a document file, and displays it as a(n)
a) Applet page
b) Java page

c) Web page
d) domain page
Answer: C
Difficulty level: Medium
Page: 33
Response: The browser interprets the HTML commands and displays the
document as a Web page.

22.

HTML is an acronym for __________.


a) Hyperlink Markup Language
b) Hypertext Markup Language
c) Hypertext Markup Link
d) Hypertext Modern Language
Answer: B
Difficulty level: Medium
Page: 33
Response: HTML is an acronym for Hypertext Markup Language.

23.

Connections to other documents or to other locations within a Web site are


a) filters
b) hyperlinks
c) plug-ins
d) bots
Answer: B
Difficulty level: Medium
Page: 33
Response: Hyperlinks or links connect to other documents containing
related information.

24.

Hyperlinks in a Web document typically appear as


a) bolded and underlined
b) italicized and underlined
c) underlined and colored
d) bolded and italicized
Answer: C
Difficulty level: Medium
Page: 33
Response: Hyperlinks appear as underlined and colored on the Web page.

25.

__________ are widely used to add interest and activity to a Web site by
presenting animation, displaying graphics, providing interactive games, and
more.
a) Applets
b) Bots
c) Plug-ins
d) Spiders
Answer: A
Difficulty level: Medium
Page: 33
Response: Applets are widely used to add interest and activity to a Web site
by presenting animation, displaying graphics, providing interactive games,
and more.

26.

Applets are typically written in a programming language called


a) XML
b) Basic
c) Pascal
d) Java
Answer: D
Difficulty level: Hard
Page: 33
Response: Applets are typically written in Java.

27.

Which of the following are not required in order to send and receive email?
a) e-mail account
b) Web page
c) access to the Internet
d) e-mail program
Answer: B
Difficulty level: Easy
Page: 34
Response: You do not require a Web page in order to send and receive email.

28.

Which of the following is not one of the basic elements of an e-mail


message?
a) header

b) footer
c) message
d) signature
Answer: B
Difficulty level: Hard
Page: 34
Response: A footer is not one of the basic elements of an e-mail message.

29.

A one-line description, used to present the topic of an e-mail message, is


referred to as the
a) header
b) address
c) subject
d) signature
Answer: C
Difficulty level: Easy
Page: 34
Response: A one-line description used to present the topic of the message is
the subject.

30.

Unwanted and unsolicited e-mails are called


a) spam
b) junk
c) flame
d) lurk
Answer: A
Difficulty level: Easy
Page: 34
Response: Unwanted and unsolicited e-mails are called spam.

31.

Newsgroups use a special network of computers called the


a) UseNet
b) MailNet
c) AddressNet
d) ChannelNet
Answer: A
Difficulty level: Medium
Page: 36

Response: Newsgroups use a special network of computers called the


UseNet.

32.

A popular chat service is called


a) IM-Chat
b) UseNet Chat
c) Internet Protocol Chat
d) Internet Relay Chat
Answer: D
Difficulty level: Medium
Page: 36
Response: Internet Relay Chat (IRC) is a popular chat service.

33.

Before you submit a contribution to a discussion group, you should first


a) lurk
b) signal
c) queue
d) ping
Answer: A
Difficulty level: Medium
Page: 37
Response: Before you submit a contribution to a discussion group, you
should first lurk (observe or read the communications from others).

34.

Specialized programs that assist you in locating information on the Web


and the Internet are called
a) browsers
b) Gophers
c) search engines
d) applets
Answer: C
Difficulty level: Medium
Page: 40
Response: Search engines are specialized programs that assist you in
locating information on the Web and the Internet.

35.

These search engines receive the results, eliminate duplicates, order the
hits, and then provide the edited list to you
a) megasearch engines

b) metasearch engines
c) keyword search engines
d) directory search engines
Answer: B
Difficulty level: Hard
Page: 41
Response: Metasearch engines are designed to perform all of these tasks.

36.

Buying and selling goods over the Internet is called __________


a) hyper-marketing
b) cyber-selling
c) e-commerce
d) euro-conversion
Answer: C
Difficulty level: Medium
Page: 42
Response: Electronic commerce (e-commerce) is the buying and selling of
goods over the Internet.

37.

This type of electronic commerce involves the sale of a product or service


to the general public.
a) B2C
b) B2P
c) C2C
d) B2B
Answer: A
Difficulty level: Medium
Page: 43
Response: B2C involves the sale of a product or service to the general
public.

38.

This type of e-commerce often takes the form of an electronic version of


the classified ads or an auction.
a) B2C
b) C2C
c) G2C
d) B2B
Answer: B
Difficulty level: Medium
Page: 43

Response: C2C often takes the form of an electronic version of the classified
ads or an auction.

39.

Virtual stores for B2C electronic commerce are also known as


a) auctions
b) houses
c) Web storefronts
d) Internet buyers
Answer: C
Difficulty level: Medium
Page: 43
Response: Web storefronts are virtual stores for B2C electronic commerce.

40.

Another name for electronic cash or e-cash, the Internet equivalent to


traditional cash, is
a) cybercash and analog cash
b) digital cash and cybercom
c) carders and cybercom
d) cybercash and digital cash
Answer: D
Difficulty level: Medium
Page: 44
Response: Electronic cash is also known as cybercash and digital cash.

41.

__________ are specialized utility programs that make using the Internet
and the Web easier and safer.
a) Telecom
b) Web utilities
c) Norton Utilities
d) Web firewalls
Answer: B
Difficulty level: Medium
Page: 45
Response: Web utilities are specialized utility programs that make using the
Internet and the Web easier and safer.

42.

An Internet standard that allows you to connect to another computer (host)


on the Internet and to log on to that computer as if you were on a terminal in
the next room is
a) FTP
b) AOL
c) Listerv
d) Telnet
Answer: D
Difficulty level: Medium
Page: 46
Response: Telnet is the Internet standard that accomplishes this task.

43.

Programs that are automatically loaded and operate as a part of your


browser are referred to as __________.
a) FTP
b) plug-ins
c) add-ons
d) Telnet
Answer: B
Difficulty level: Medium
Page: 46
Response: Plug-ins are programs that are automatically loaded and operate
as part of your browser.

44.

An Internet standard for transferring files is known as


a) IRC
b) Telnet
c) FTP
d) WAIS
Answer: C
Difficulty level: Medium
Page: 46
Response: File transfer protocol (FTP) is an Internet standard for
transferring files.

45.

A(n) __________ can be used to block access to specific sites.


a) filter
b) hardware block
c) censor

d) Rubicon
Answer: A
Difficulty level: Easy
Page: 47
Response: Filters block access to selected sites.

True/False

46.

The Internet was introduced in 1969 at the Center for European Nuclear
Research.
Answer: False
Difficulty level: Hard
Page: 30
Response: The Web was introduced in 1992 at the Center for European
Nuclear Research (CERN) in Switzerland.

47.

The most popular Internet activity is shopping.


Answer: False
Difficulty level: Medium
Page: 30
Response: Communicating is the most popular Internet activity.

48.

The Web is another name for the Internet.


Answer: False
Difficulty level: Medium
Page: 30
Response: The Web is another name for the WWW or the World Wide
Web.

49.

The actual, physical network used for international communication is called


the Internet.
Answer: True
Difficulty level: Medium
Page: 30

Response: The Internet is the actual physical network.

50.

The most common way to access the Internet is through a provider or host
computer.
Answer: True
Difficulty level: Medium
Page: 31
Response: The most common way to access the Internet is through a
provider or host computer.

51.

Some Internet providers offer free Internet access.


Answer: True
Difficulty level: Medium
Page: 31
Response: There are some companies that offer free Internet access.

52.

Regional service providers offer access through standard telephone


connections. Users can access the Internet from almost anywhere within the
country without incurring long-distance telephone charges.
Answer: False
Difficulty level: Medium
Page: 32
Response: Access to the Internet from outside the regional area will incur
long-distance connection charges.

53.

Commercial Internet service providers include national, regional, and


wireless service providers.
Answer: True
Difficulty level: Medium
Page: 32
Response: Commercial Internet service providers include all of these.

54.

Browsers are programs that provide access to Web resources.


Answer: True
Difficulty level: Easy

Page: 32
Response: Browsers are programs that provide access to Web resources.

55.

Users of the Internet are part of a large client/server network.


Answer: True
Difficulty level: Medium
Page: 32
Response: The users computer acts as the client that requests services from
the providers computer or server.

56.

In the Internet address "maryellen@userfriendly.org, the domain name is


maryellen.
Answer: False
Difficulty level: Hard
Page: 32
Response: The domain name is userfriendly.org.

57.

The connections from one page of information on the World Wide Web to
another are called hyperlinks.
Answer: True
Difficulty level: Medium
Page: 33
Response: Hyperlinks or links connect documents on the WWW to other
documents containing related information.

58.

A programming language used to write animation for the World Wide Web
is called applet.
Answer: False
Difficulty level: Medium
Page: 33
Response: Java is the programming language that is used to write animation
for the WWW.

59.

A programming language used to write animation for the World Wide Web
is called Java.
Answer: True
Difficulty level: Medium
Page: 33
Response: Java is the programming language that is used to write animation
for the World Wide Web.

60.

An applet defines the rules for passing information between two or more
computers.
Answer: False
Difficulty level: Medium
Page: 33
Response: Protocols are rules for exchanging data between computers.

61.

You can use e-mail to send messages but not files across the Internet.
Answer: False
Difficulty level: Medium
Page: 34
Response: E-mail can contain many different types of file attachments.

62.
The three parts of an e-mail message are the header, message, and
signature.
Answer: True
Difficulty level: Medium
Page: 34
Response: A typical e-mail address has three basic elements header,
message, and signature.

63.

Two of the most widely used e-mail programs are Netscape's Navigator and
Internet Express.
Answer: False
Difficulty level: Medium
Page: 34
Response: Two of the most widely used e-mail programs are Microsofts
Outlook Express and Netscapes Mail.

64.

Unwelcome e-mail is called spam.


Answer: True
Difficulty level: Easy
Page: 34
Response: Unwelcome e-mail is called spam.

65.

Instant messaging and chat groups are the same.


Answer: False
Difficulty level: Medium
Page: 36
Response: Both allow direct live communication but IM provides greater
control and flexibility.

66.

To participate in a chat group you must select a channel or topic, and


communicate live with others by typing words on your computer.
Answer: True
Difficulty level: Medium
Page: 36
Response: To participate, you join a chat group, select a channel or topic,
and communicate live with others by typing words on your computer.

67.

One popular chat service is called Internet Relational Chat.


Answer: False
Difficulty level: Medium
Page: 36
Response: This popular chat service is called Internet Relay Chat (IRC).

68.

IRC allows people to communicate in "live" discussion.


Answer: True
Difficulty level: Easy
Page: 36
Response: Internet Relay Chat (IRC) allows you to select a channel or topic
in which you are interested, and begin chatting.

69.

Newsgroups, unlike mailing lists, use a special network of computers called


the UseNet.
Answer: True
Difficulty level: Medium
Page: 36
Response: Newsgroups use a special network of computers called the
UseNet.

70.

Eavesdropping describes the process of reading posts to a discussion group


before you post one of your own.
Answer: False
Difficulty level: Medium
Page: 37
Response: This observation process is called lurking.

71.

Special programs called agents, spiders, or bots continually look for new
information and update search services databases.
Answer: True
Difficulty level: Medium
Page: 40
Response: Special programs called agents, spiders, or bots continually look
for new information and update the search services databases.

72.

An index search organizes information into categories like art, science,


sports, etc.
Answer: True
Difficulty level: Hard
Page: 40
Response: An index search allows users to select a category or topic that fits
the information that they want.

73.

Metasearch engines are programs that automatically submit your search


request to a single search engine.

Answer: False
Difficulty level: Medium
Page: 41
Response: Metasearch engines are programs that automatically submit your
search request to several search engines simultaneously.

74.

The use of electronic commerce is growing rapidly.


Answer: True
Difficulty level: Easy
Page: 42
Response: Shopping on the Internet is growing rapidly and there seems to be
no end in sight.

75.

C2C involves the sale of a product or service to the general public.


Answer: False
Difficulty level: Easy
Page: 43
Response: B2C involves the sale of a product or service to the general
public.

76.

B2B involves the sale of a product or service from one business to another.
Answer: True
Difficulty level: Easy
Page: 43
Response: B2B involves the sale of a product or service from one business
to another.

77.

Web storefronts are virtual stores for B2C electronic commerce.


Answer: True
Difficulty level: Easy
Page: 43
Response: Web storefronts are virtual stores for B2C electronic commerce.

78.

Web auctions are identical to traditional auctions in that the buyers and
sellers eventually meet face-to-face.
Answer: False
Difficulty level: Medium
Page: 43

Response: Web auctions are similar to traditional auctions except that


buyers and sellers seldom, if ever, meet face-to-face.

79.

Cybercash is a medium of exchange on the Internet.


Answer: True
Difficulty level: Medium
Page: 44
Response: Cybercash and digital cash are the Internets equivalent to
traditional cash.

80.

A plug-in is an independent program that can be executed by the browser to


add capabilities.
Answer: True
Difficulty level: Medium
Page: 46
Response: Plug-ins are programs that are automatically loaded and operate
as a part of your browser.

81.

FTP allows you to connect to another computer and run programs there.
Answer: False
Difficulty level: Medium
Page: 46
Response: FTP is an Internet standard for transferring files.

82.

Telnet is the Internet standard for transferring files across the Internet.
Answer: False
Difficulty level: Medium
Page: 46
Response: Telnet is an Internet standard that allows you to connect to
another computer (host) on the Internet and to log on to that computer as if
you were on a terminal in the next room.

83.

Copying files from your computer to another computer on the Internet is


called uploading.
Answer: True

Difficulty level: Medium


Page: 46
Response: Uploading is the process of copying files from your computer to
another computer on the Internet.

84.

Filter programs can monitor use and generate reports about Internet usage
on your computer.
Answer: True
Difficulty level: Medium
Page: 47
Response: Filters can monitor use and generate reports detailing the total
time spent on the Internet and the time spent at individual Web sites, chat
groups, and newsgroups.

85.

Filter programs allow only pre-selected words or images to appear on your


browser screen.
Answer: False
Difficulty level: Medium
Page: 47
Response: Filters can also block out selected sites and set time limits.

Fill-In-The-Blank

86.

The __________ is the actual physical network made up of wires, cables,


and satellites.
Answer: Internet
Difficulty level: Medium
Page: 30
Response: The Internet is the actual physical network made up of wires,
cables, and satellites.

87.

The __________ is a multimedia interface to resources available on the


Internet.
Answer: Web
Difficulty level: Medium
Page: 30

Response: The Web is a multimedia interface to resources available on the


Internet.

88.

The most common way for individuals to access the Internet is through a
provider or a __________ computer.
Answer: host
Difficulty level: Medium
Page: 31
Response: The most common way to access the Internet is through a
provider or host computer.

89.

While connected to the Internet, the users computer is the __________ that
requests services from the providers computer or server.
Answer: client
Difficulty level: Medium
Page: 33
Response: The users computer is the client computer.

90.

In the e-mail address sallysilverspoon@macaroon.org, what is the


domain name?
Answer: macaroon.org
Difficulty level: Medium
Page: 32
Response: The second part presents the domain name or the name of the
server where the resource is located.

91.

__________ are programs that provide access to Web resources.


Answer: Browsers
Difficulty level: Easy
Page: 32
Response: Browsers are programs that provide access to Web resources.

92.

__________ are rules for exchanging data between computers.


Answer: Protocols
Difficulty level: Hard
Page: 32

Response: Protocols are rules for exchanging data between computers.

93.

The second part of a URL is referred to as the __________ name. It


identifies the server where the resource is located.
Answer: domain
Difficulty level: Hard
Page: 32
Response: The domain name is the second part of the URL.

94.

__________ are connections to other documents that contain related


information on the World Wide Web.
Answer: Hyperlinks (links)
Difficulty level: Medium
Page: 33
Response: Hyperlinks or links connect documents that contain related
information on the Web.

95.

A programming language used to write animation for the World Wide Web
is called __________.
Answer: Java
Difficulty level: Medium
Page: 33
Response: Java is a programming language that is used to write animation
for the WWW.

96.

__________ are special programs that are typically written in a


programming language called Java.
Answer: Applets
Difficulty level: Medium
Page: 33
Response: Applets are typically written in Java.

97.

In an e-mail message, the __________ element is a one-line description,


used to present the topic of the message.
Answer: subject
Difficulty level: Medium

Page: 34
Response: The subject is a one-line description, used to present the topic of
the message.

98.

Unwanted and unsolicited e-mail is referred to as __________.


Answer: spam
Difficulty level: Easy
Page: 34
Response: Spam is unwanted and unsolicited e-mail.

99.

Destructive programs that are often attached to unsolicited e-mail are called
computer __________.
Answer: viruses
Difficulty level: Easy
Page: 34
Response: Computer viruses are destructive programs that are often
attached to unsolicited e-mail.

100.

__________ lists allow members to communicate by sending messages to a


list address.
Answer: Mailing
Difficulty level: Easy
Page: 36
Response: Mailing lists allow members of a mailing list to communicate by
sending messages to a list address.

101.

__________ groups allow direct live communication. They are typically


composed of individuals who have never met face-to-face.
Answer: Chat
Difficulty level: Medium
Page: 36
Response: Chat groups allow direct live communication and are typically
composed of individuals who have never met face-to-face.

102.

To use instant messaging (IM), you specify a list of friends (also known as
__________ or contacts) and register with an instant message server.
Answer: buddies
Difficulty level: Medium

Page: 36
Response: List of friends is also known as buddies or contacts.

103.

Reading the communications of others before you join a discussion group is


called __________.
Answer: lurking
Difficulty level: Medium
Page: 37
Response: Observing or reading the communications from others before you
submit a contribution to a discussion group is referred to as lurking.

104.

A __________ engine is a specialized program that can assist you in


locating information on the Web and the Internet.
Answer: search
Difficulty level: Easy
Page: 40
Response: Search engines are specialized programs that assist you in
locating information on the Web and the Internet.

105.

In a __________ search, you enter a phrase reflecting the information you


want.
Answer: keyword
Difficulty level: Medium
Page: 40
Response: In a keyword search, you enter a keyword or phrase reflecting the
information you want.

106.

In a directory search, also known as an __________ search, you select a


category or topic that fits the information you want.
Answer: index
Difficulty level: Medium
Page: 40
Response: A directory search is also known as an index search.

107.

__________ engines submit search requests to several search engines


simultaneously.
Answer: Metasearch
Difficulty level: Hard

Page: 41
Response: Metasearch engines are programs that automatically submit your
search request to several search engines simultaneously.

108.

__________ search engines such as www.medsite.com focus on subjectspecific Web sites.


Answer: Specialized
Difficulty level: Hard
Page: 42
Response: www.medsite.com is just one example of a specialized search
engine.

109.

__________ is the term used to describe the buying and selling of goods
over the Internet.
Answer: E-commerce
Difficulty level: Easy
Page: 42
Response: Electronic commerce is the buying and selling of goods over the
Internet.

110.

Criminals known as __________ specialize in stealing, trading, and using


stolen credit cards over the Web.
Answer: carders
Difficulty level: Hard
Page: 44
Response: Criminals known as carders specialize in stealing, trading, and
using stolen credit cards over the Internet.

111.

This basic type of e-commerce (__________) involves the sale of a product


or service to the general public or endusers.
Answer: B2C
Difficulty level: Medium
Page: 43
Response: B2C involves the sale of a product or service to the general
public or end- users.

112.

This basic type of e-commerce (__________) involves individuals selling


to individuals.

Answer: C2C
Difficulty level: Medium
Page: 43
Response: C2C involves individuals selling to individuals.

113.

This basic type of e-commerce (__________) involves the sale of a product


or service from one business to another.
Answer: B2B
Difficulty level: Medium
Page: 43
Response: B2B involves the sale of a product or service from one business
to another.

114.

Web __________ are virtual stores for B2C electronic commerce.


Answer: storefronts
Difficulty level: Medium
Page: 43
Response: Web storefronts are virtual stores for B2C electronic commerce.

115.

In a Web __________, sellers post descriptions of products at a Web site


and buyers submit bids electronically.
Answer: auction
Difficulty level: Medium
Page: 43
Response: In Web auctions, sellers post descriptions of products at a Web
site and buyers submit bids electronically.

116.

Auction __________ sites sell a wide range of merchandise directly to


bidders. These sites operate like a traditional auction.
Answer: house
Difficulty level: Medium
Page: 44
Response: Auction house sites sell a wide range of merchandise directly to
bidders.

117.

__________ cash is the Internets equivalent to traditional cash.


Answer: Electronic
Difficulty level: Medium
Page: 43

Response: E-cash is also known as cybercash and digital cash.

118.

Web __________ are specialized programs that make using the Internet
and the Web easier and safer.
Answer: utilities
Difficulty level: Medium
Page: 45
Response: Web utilities are programs that make working with the Web and
the Internet easier and safer.

119.

__________ is an Internet standard that allows you to connect to another


computer (host) on the Internet and to log on to that computer as if you were
on a terminal in the next room.
Answer: Telnet
Difficulty level: Medium
Page: 46
Response: Telnet is the Internet standard that supports this task.

120.

__________ is an Internet standard for transferring files.


Answer: FTP
Difficulty level: Medium
Page: 46
Response: FTP is an Internet standard for transferring files.

121.

__________ is the ability to copy files to your computer from the Internet.
Answer: Downloading
Difficulty level: Medium
Page: 46
Response: Downloading is the process of copying files to your computer
from the Internet.

122.

A(n) __________ is a program that is automatically loaded with a Web


browser and provides additional capabilities to see multimedia content.
Answer: plug-in
Difficulty level: Medium
Page: 46
Response: Plug-ins are programs that are automatically loaded and operate
as a part of your browser.

123.

A __________ allows an individual to block selected sites that cannot be


browsed.
Answer: filter
Difficulty level: Medium
Page: 47
Response: Filters are used to block access to selected sites.

Essay

124.

List three commercial Internet service providers.


Answer: Three Internet service providers are national service providers
(AOL), regional service providers, and wireless service providers.
Difficulty level: Hard
Page: 32

125. Label and define the elements of a typical e-mail message.


Answer: A typical e-mail message has three basic elements: header,
message, and signature. The header appears first and typically includes the
address, subject and any attachments. The letter or message comes next and
is typically short and to the point. The signature line provides additional
information about the sender. Typically, this information includes the
sender's name, address, and telephone number.
Difficulty level: Medium
Page: 32

126.

Explain the parts of a URL.


Answer: URLs are addresses of Web resources. The first part is the
protocol. The protocol http:// is by far the most common. The second part
presents the domain name or the name of the server where the resource is
located, and the type of domain (org, net, gov, edu).
Difficulty level: Medium
Page: 32

127.

Differentiate between a mailing list and a newsgroup.


Answer: Newsgroups use a special network of computers called the
UseNet. Members of a mailing list communicate by sending e-mail to a list
address.
Difficulty level: Hard
Page: 36

128.

Explain how a chat group differs from instant messaging.


Answer: Chat groups allow direct live communications. To participate,
the user joins a chat group, selects a channel (topic) and communicates live
with others. Others see the typed message and respond in the same
manner. Instant messaging also allows one or more people to communicate
via direct, live communications. The user has greater flexibility and
control, however. The user specifies a list of friends with an instant
messaging service. When the user connects to the Internet, the software
notifies the contacts that this user is online and in turn notifies this user as to
who else is online. Messages can then be sent back and forth.
Difficulty level: Hard
Page: 36

129.

Describe what is meant by lurking on the Internet.


Answer: Lurking describes the process of reading posts to a discussion
group before you post one of your own.
Difficulty level: Medium
Page: 37

130.

Describe what electronic commerce is, and explain the three basic types.
Answer: E-commerce is the buying and selling of goods over the
Internet. There are three basic types of electronic commerce: business-toconsumer, consumer-to-consumer, and business-to-business. Web
storefronts are virtual stores for business-to-consumer (B2C) electronic
commerce. Shoppers visit the stores on the Web to inspect merchandise and
make purchases. Web storefront creation packages or commerce servers are
evolving to help businesses create virtual stores. These packages create Web
sites that allow visitors to register, browse, place products into virtual
shopping carts, and purchase goods and services. Web auctions are similar
to traditional auctions except that buyers and sellers seldom, if ever, meet
face-to-face. Electronic payment options include credit card, check, and
electronic cash or e-cash.
Difficulty level: Medium

Page: 42

131.

Telnet and FTP are Internet standards. Describe each of these concepts.
Answer: Telnet is the Internet service that helps you to connect to another
computer on the Internet and log on to that computer as if you were on a
terminal in the next room. FTP is an Internet service for transferring
files. Many computers on the Internet allow you to copy files to your
computer, called downloading. You can also use FTP to copy files from
your computer to another computer on the Internet called uploading.
Difficulty level: Medium
Page: 46

132.

What is a "plug-in?"
Answer: A plug-in is a program that automatically loads with your browser
and gives your browser additional capabilities.
Difficulty level: Medium
Page: 46

133.

Explain the function and necessity for filters on the Internet.


Answer: Filter programs allow individuals to block out access to selected
Internet sites. Filters allow parents as well as organizations to block out
sites and set time limits. Filters can prevent children from roaming freely on
the Internet.
Difficulty level: Medium
Page: 47

Вам также может понравиться