browserscomputer programs that display info found on the webE-commerceonline purchases and financial transactions on the Webencryptionused when a message is written i n a secret codehypertext transfer protocol (http)the Internet protocol used to transfer files over the Webnet neutralityusers not discriminated against due to amount/ nature of data they transferportalsweb pages that users launch when they first log on to the webspammingunsolicited commercial e-mailingURLsthe addresses of web pageswhat is the origin of calling junk email ” spam” because of the Spam skit on the Monty Python Showa key advantage that internet retailers like Amazon have over ” bricks and mortar” retailers is calledthe ” long tail” why do some say, ” Piracy is not theft”? b. c the thing ” stolen” is not taken away from owner
the recent actions of the FCC in strengthening net neutrality have greatly enhanced the control that companies like Comcast have on our net work infrastructure
IT HAS REDUCED CONTROL
falsethe first ” killer application” on the internet wasemailto make the internet safer, people should use all of the following EXCEPTa phishing programwhich of the following BEST describes internet portalsuser customizable web pageswhat law requires libraries and schools to filter out inappropriate content on their computers? the Childrens Internet Protection Act____ are a cross b/w a personal web page, diary, and online directory, and a newspaper editorial pageblogswhich country uses standard firewalls and proxychinadevelopers of shareware do not claim copyright protection and do not charge mandatory fees for downloading and usetruewhat does a DNS dotranslates web addresses that people use into addresses the internet usesit is NOT fair to apply the term convergence to what is happening with the web and conventional mediafalsewhich is NOT owned by googlefacebookcookiessmall files that websites leave on their visitor’s computersLocal area networks (LANS)link computers within a department, building, or campusphishingonline scamspywareinformation the secretly sends info about your online activitiestransmission-control protocol/ internet protocolthe basic protocol used by internetwide area networks (WANS)computers miles apartsocial media are online tools used to communicate with othersfalseAmerica Online, the Microsoft Network, and Comcast are ISP’strue
developers of shareware do not claim copyright protection, but do charge fees for downloading and use
THEY DO NOT CHARGE FEES
falseuser-manipulated characters in MUDs are calledavatars____ refers to processing capacity in computer chips doubled about every 18 monthsmoore’s lawjeff bezos designed the 1st graphical Web browserfalseHTMLused to format pages on the webthe first ” killer application” on the internet was the web browsertrueaccording to metcalfe’s law, the value of the internet increases rapidly w. the number of userstrueit is fair to say that the Web continues to converge with and compete with conventional mediatrue
internet2 is synonymous with Web 2. 0
IS NOT
falseweb 1. 0 or the ” semantic web” seeks to attach useful indexing labels to online contentfalseinternet2a new, faster version of the internetweb 2. o (2 collaborate)a new way of using the internet for collaboration and sharing of data among individual userswhat does a DNS do? it translates web addresses that people use into addresses the internet usesthe ” digital divide” shows that all of the following EXCEPT _____ have been slow to adopt the internet due to socio-eco factorscaucasians_____ developed Web pages, and _____ offer access to the Internetcontent providers// ISP’sa group of students led by Marc Andreessen designed the first graphical Web browsertruewhich is NOT a characteristic of the internet? content on the web is not protected by copyrightall are characteristics of the internet EXCEPTall info on the internet is freewhich of the following is TRUE of ARPANETit was initially funded by the US governemntwho are the leaders of the PC market? lenovo and Hewlett-packard____ is the ” basic” protocol of the internetTCP/IPmodemsconvert digital data to analog signals and vice versaprotocolstechnical rules governing data communicationthe first ancestor of ” the internet” isARPANETabout 25 protocols define the internetfalsemost common activity on the Internetchecking e-mailfishing is associated w/ identity theft schemesfalsewhich of the following is the GREATEST threat to the collaborative free culture of the Internetcorporate abuse @hillaryclintonISP’sprovide connections to the internetgovernment intervention in the Internet is problematic because it couldrestrain users’ civil libertiesInternet Protocol (IP) version 6 vastly increases the number of possible network addressestruewhat is TRUE of ARPANETit was initially funded by the gvntmoose’s law states that computers double in processing capacity and speed about every 6 months
false
every 8
digital dividedifference in access to computer technologies between the rich and the poor ONINTERNET SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder Now