1,956
9
Essay, 3 pages (600 words)

Cs/is chapter 2

No single person or government agency controls or owns the InternetTrueThe W3C is responsible for maintaining all networks and content on the InternetFalseUsers typically pay additional fees for mobile hot spot and tethering servicesTrueA gigabyte (GB) is the basic storage unit on a computer or mobile device and represents a single characterFalseVisitors to a dynamic webpage can customize some or all of the viewed content, such as desired stock quotes, weather, or ticket availability for flights. TrueBrowsers usually are not included by default with mobile devices and smartphones. FalseMobile apps sometimes have fewer features than a web app. TrueA subject directory is software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic. TrueOne technique you can use to improve search results is to use specific nouns. TrueThe term, blogosphere, refers to the worldwide collection of blogsTrueUnregistered wiki users can review the content, as well as edit it and add comments. TrueTethering is the process of transferring data in a continuous and even flow, which allows users to access and use a file while its transmitting. FalseA __ is any computer that provides services and connections to other computers on a network. host__ access takes place when a modem in a computer connects to the Internet via a standard telephone line that transmits data and information using an analog signal. Dial UpAn __ is a sequence of numbers that uniquely identifies the location of each computer or device connected to the internet. IP AddressYou register a domain name through ___, which is an organization that sells and manages domain names. ICANNOne way to protect your identity while browsing is to use a ___, which is another computer that screens all your incoming and outgoing messages. proxy server___ is a set of rules that defines how webpages transfer on the Internet. Hypertext Transfer ProtocolA ___ website contains factual info, such as libraries, encyclopedias, dictionaries, directories, guides, and other types of reference. InformationalA ___, which consists of a number sign (#) followed by a keyword, describes and categorizes a tweet. HashtagTechnique that transforms a smartphone or internet-capable tablet into a portable communications device that shares its internet access with other computers and devices wirelessly. Tetheringterm used to refer to the major carriers of network trafficInternet backbonetext-based name that corresponds to the IP address of a server that hosts a websiteDomain namecomputer that delivers requested webpages to your computer or mobile devicesWeb Servera webpage’s unique addressURLmethod of pulling content that has changed on a websiteWeb feedprogram that extends the capability of a browserplug-inreal-time conversation that takes place on a computer or mobile device with many other online userschatharassment, often involving teens and preteens, using technologycyberbullyingwebsites and tools that foster communications and/or interactions among users, including online social networks, media sharing sites, blogs and microblogs, wikis, podcasts, and online gaming. social mediabuy and register unused or lapsed domain names so that they can profit from selling themCybersquattersWhat’s the goal of the Anticybersquatting consumer protection act? protect trademark owners from being forced to pay a cybersquatter for a domain name that includes their trademark. Scam in which a perpetrator attempts to obtain your personal and/or financial infophishingbusiness transaction that occurs over an electronic networks such as the internete-commerceE-commerce that takes place on a mobile devicem-commerceWorldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individualsThe InternetCommonly known today as a server, provides services and connections to other computers on a network. HostWhat was the first network calledARPANETBandwidthRepresents the amount of data over a networkBookmarking sitewebsite that enables members to organize, tag, and share links to online contentGigabyteequal to approx. 1 billion charactersHot spotWireless network that provides internet connections to mobile computersMegabyteEqual to approx. 1 million charactersNetiquetteCode of acceptable behaviors users should follow while on the internetRegistrarSells and manages domain namesVolPenables users to speak to other users via their internet connection ONCS/IS CHAPTER 2 SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder NowTags:

  • Smartphone

Thank's for Your Vote!
Cs/is chapter 2. Page 1
Cs/is chapter 2. Page 2
Cs/is chapter 2. Page 3
Cs/is chapter 2. Page 4

This work, titled "Cs/is chapter 2" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Cs/is chapter 2'. 2 August.

Reference

AssignBuster. (2022, August 2). Cs/is chapter 2. Retrieved from https://assignbuster.com/csis-chapter-2/

References

AssignBuster. 2022. "Cs/is chapter 2." August 2, 2022. https://assignbuster.com/csis-chapter-2/.

1. AssignBuster. "Cs/is chapter 2." August 2, 2022. https://assignbuster.com/csis-chapter-2/.


Bibliography


AssignBuster. "Cs/is chapter 2." August 2, 2022. https://assignbuster.com/csis-chapter-2/.

Work Cited

"Cs/is chapter 2." AssignBuster, 2 Aug. 2022, assignbuster.com/csis-chapter-2/.

Get in Touch

Please, let us know if you have any ideas on improving Cs/is chapter 2, or our service. We will be happy to hear what you think: [email protected]