Deck 7: The Web and E-Mail

ملء الشاشة (f)
exit full mode
سؤال
Suppose that you are about to check out at an online store, but you don't see any indication that your transaction data will be protected by a secure connection. It would be best, under these circumstances, to use PGP software to encrypt your shipping and billing data. True or false
Suppose that you are about to check out at an online store, but you don't see any indication that your transaction data will be protected by a secure connection. It would be best, under these circumstances, to use PGP software to encrypt your shipping and billing data. True or false  <div style=padding-top: 35px>
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Your Inbox is getting more and more unsolicited messages with "fisd foos" in the header. You decide to generate a new rule for your security software's spam
Your Inbox is getting more and more unsolicited messages with fisd foos in the header. You decide to generate a new rule for your security software's spam   to block those irritating messages.<div style=padding-top: 35px> to block those irritating messages.
سؤال
AND , OR , NOT , and.. are examples of search
AND , OR , NOT , and.. are examples of search   .<div style=padding-top: 35px> .
سؤال
A(n)
A(n)   exploit redirects users to fake sites by poisoning a Domain Name Server with a false IP address.<div style=padding-top: 35px> exploit redirects users to fake sites by poisoning a Domain Name Server with a false IP address.
سؤال
Explain the relationship between an HTML source document and a Web page. List five HTML tags and describe how each is used.
سؤال
Use a search engine and search operators to formulate a search for information about your favorite era in history. Can you make a more targeted search to find out what kind of slang was used during that time period
سؤال
Most search engines keep track of users by assigning a unique ID number, which is stored in a(n)
Most search engines keep track of users by assigning a unique ID number, which is stored in a(n)   on the hard disk of the user's computer.<div style=padding-top: 35px> on the hard disk of the user's computer.
سؤال
The Adobe site provides a Settings Manager that can be used to control
The Adobe site provides a Settings Manager that can be used to control   cookies and prevent your computer's camera from being activated without your knowledge.<div style=padding-top: 35px> cookies and prevent your computer's camera from being activated without your knowledge.
سؤال
Your friend, who is a little computer phobic, is going to be creating his first Web page and asks you to recommend some software for the task. Which one requires the least knowledge of HTML tags: Notepad or Libre Office Writer
Your friend, who is a little computer phobic, is going to be creating his first Web page and asks you to recommend some software for the task. Which one requires the least knowledge of HTML tags: Notepad or Libre Office Writer  <div style=padding-top: 35px>
سؤال
You're conducting a research project that requires you to visit sites with lots of pop-up ads and other junk that you don't want accumulating in your Temporary Internet Files folder. You remember that you can turn on
You're conducting a research project that requires you to visit sites with lots of pop-up ads and other junk that you don't want accumulating in your Temporary Internet Files folder. You remember that you can turn on   browsing to delete all that junk when you end your session.<div style=padding-top: 35px> browsing to delete all that junk when you end your session.
سؤال
To keep track of the Web pages where you obtained information or images, you can highlight the Web page's
To keep track of the Web pages where you obtained information or images, you can highlight the Web page's   , copy it, and then paste it into a list of sources. (Hint: Use the acronym.)<div style=padding-top: 35px> , copy it, and then paste it into a list of sources. (Hint: Use the acronym.)
سؤال
Draw a multi-panel cartoon that shows how a Web server and a browser interact. Include the following terms: Web server, browser, HTTP, HTML, port, socket, HTML document, graphic file, and URL.
سؤال
List the three most commonly used styles of citation and demonstrate how to correctly format a citation to a Web page using each style.
سؤال
Online auction sites such as eBay are examples of B2G e commerce. True or false
Online auction sites such as eBay are examples of B2G e commerce. True or false  <div style=padding-top: 35px>
سؤال
Suppose you visit a Web site that has eye-catching pages. You want to know how these pages were formatted, so you use one of the options on your browser's menu to take a look at the HTML
Suppose you visit a Web site that has eye-catching pages. You want to know how these pages were formatted, so you use one of the options on your browser's menu to take a look at the HTML   document.<div style=padding-top: 35px> document.
سؤال
Explain two ways that shopping carts can work with cookies.
سؤال
One factor in the e-commerce economic model is ad revenue based on
One factor in the e-commerce economic model is ad revenue based on   rates, the number of times that site visitors click an ad to connect to the advertiser's Web site.<div style=padding-top: 35px> rates, the number of times that site visitors click an ad to connect to the advertiser's Web site.
سؤال
Briefly sketch the evolution of Web browsers. Describe how browsers use plug-ins.
سؤال
List three threats to the security of credit card numbers and other sensitive data during e-commerce transactions. Describe how the following e-commerce technologies work: SSL\TLS, HTTPS, and person-to-person payment systems.
سؤال
Most online shopping carts work because they use
Most online shopping carts work because they use   to store information about your activities at a Web site.<div style=padding-top: 35px> to store information about your activities at a Web site.
سؤال
Suppose you click a link at a Web site and get a message that the file cannot be displayed because it is in PDF format. To view the file, you need an updated version of your browser. True or false
Suppose you click a link at a Web site and get a message that the file cannot be displayed because it is in PDF format. To view the file, you need an updated version of your browser. True or false  <div style=padding-top: 35px>
سؤال
Create a table that compares and contrasts local mail with Webmail.
سؤال
Product pages at e-commerce sites with URLs that contain a(n)
Product pages at e-commerce sites with URLs that contain a(n)   symbol, cgi, php, or asp are most likely assembled by a server-side script from the information in a database.<div style=padding-top: 35px> symbol, cgi, php, or asp are most likely assembled by a server-side script from the information in a database.
سؤال
Explain why cookies are useful in an environment that is based on a stateless protocol, and provide some concrete examples of their use.
سؤال
List the advantages and disadvantages of HTML formatted mail. Explain how MIME works.
سؤال
Web sites that provide a secure connection have URLs that begin with https: instead of http:. True or false
Web sites that provide a secure connection have URLs that begin with https: instead of http:. True or false  <div style=padding-top: 35px>
سؤال
Suppose you're performing a local test of a Web page you created. All the page elements appear to be correctly positioned and formatted. You're also happy to discover that your large graphics files are displayed quite quickly by your browser. Can you expect similar performance after you post the page on a Web site Yes or no
Suppose you're performing a local test of a Web page you created. All the page elements appear to be correctly positioned and formatted. You're also happy to discover that your large graphics files are displayed quite quickly by your browser. Can you expect similar performance after you post the page on a Web site Yes or no  <div style=padding-top: 35px>
سؤال
Make a list of security and privacy concerns discussed in this chapter. Describe each one and then list procedures and technologies available to make your online experience more secure and private.
سؤال
The
The   of an e-mail message contains recipient addresses, the subject line, and the file names of any e-mail attachments.<div style=padding-top: 35px> of an e-mail message contains recipient addresses, the subject line, and the file names of any e-mail attachments.
سؤال
Describe the advantages and disadvantages of each type of Web page development tool discussed in this chapter.
سؤال
Ted Nelson coined the term
Ted Nelson coined the term   to describe a web of linked documents, similar to Web pages.<div style=padding-top: 35px> to describe a web of linked documents, similar to Web pages.
سؤال
For most client-based e-mail systems, a(n)
For most client-based e-mail systems, a(n)   server handles outgoing mail, and a(n) server or an IMAP server handles incoming mail. (Hint: Use the acronyms.)<div style=padding-top: 35px> server handles outgoing mail, and a(n) server or an IMAP server handles incoming mail. (Hint: Use the acronyms.)
سؤال
You'd prefer not to have the search engine you use maintain accumulative records of your searches. You can block
You'd prefer not to have the search engine you use maintain accumulative records of your searches. You can block   from a specific search engine site, and that setting will force the search engine to assign a different ID number to you for each session.<div style=padding-top: 35px> from a specific search engine site, and that setting will force the search engine to assign a different ID number to you for each session.
سؤال
Every Web page has a unique address called a(n)
Every Web page has a unique address called a(n)   . (Hint: Use the acronym.)<div style=padding-top: 35px> . (Hint: Use the acronym.)
سؤال
HTML mail is the same as Webmail. True or false
HTML mail is the same as Webmail. True or false  <div style=padding-top: 35px>
سؤال
Create a short tutorial explaining how to create, test, and post a Web page using a text editor such as Notepad or Text Edit.
سؤال
The main protocol for sending and receiving Web content is
The main protocol for sending and receiving Web content is   . (Hint: Use the acronym.)<div style=padding-top: 35px> . (Hint: Use the acronym.)
سؤال
Attachments to e-mail messages are encoded in
Attachments to e-mail messages are encoded in   format. (Hint: Use the acronym.)<div style=padding-top: 35px> format. (Hint: Use the acronym.)
سؤال
You're getting ready for a week-long trip. You'd rather not take your computer, but you'll have access to public computers. Rather than use Webmail while you're away from home, you decide to use your familiar POP e-mail
You're getting ready for a week-long trip. You'd rather not take your computer, but you'll have access to public computers. Rather than use Webmail while you're away from home, you decide to use your familiar POP e-mail   software by storing it and your e-mail files on a portable USB flash drive.<div style=padding-top: 35px> software by storing it and your e-mail files on a portable USB flash drive.
سؤال
The basic markup language used on the Web is
The basic markup language used on the Web is   . (Hint: Use the acronym.)<div style=padding-top: 35px> . (Hint: Use the acronym.)
سؤال
The rules and suggestions regarding electronic communications such as e-mail are referred to as
The rules and suggestions regarding electronic communications such as e-mail are referred to as   .<div style=padding-top: 35px> .
سؤال
Explain the purpose of JavaScript.
سؤال
  were developed because HTTP is a stateless protocol; so each time you connect to a different page, the Web server regards it as a new connection.<div style=padding-top: 35px> were developed because HTTP is a stateless protocol; so each time you connect to a different page, the Web server regards it as a new connection.
سؤال
A Web
A Web   embedded in an e-mail message or a Web page can be activated when you view an infested page.<div style=padding-top: 35px> embedded in an e-mail message or a Web page can be activated when you view an infested page.
سؤال
One of your relatives wants to try online shopping, but is suspicious that her credit card number might get stolen from a merchant's server by a hacker using a packet sniffer. Is it correct to tell her that she can best avoid these potential rip-offs by using a secure connection, such as HTTPS Yes or no
One of your relatives wants to try online shopping, but is suspicious that her credit card number might get stolen from a merchant's server by a hacker using a packet sniffer. Is it correct to tell her that she can best avoid these potential rip-offs by using a secure connection, such as HTTPS Yes or no  <div style=padding-top: 35px>
سؤال
A search engine's
A search engine's   pulls keywords from a Web page and stores them in a database.<div style=padding-top: 35px> pulls keywords from a Web page and stores them in a database.
سؤال
If you don't want your IP address tracked as you surf the Web, you can use an anonymous
If you don't want your IP address tracked as you surf the Web, you can use an anonymous   service.<div style=padding-top: 35px> service.
سؤال
Create a comic-strip like sequence of diagrams that illustrates how the following technologies interact: Web crawler, search engine database, indexer, query processor.
سؤال
When you enter search terms, the search engine's
When you enter search terms, the search engine's   processor looks for the terms in the search engine's database.<div style=padding-top: 35px> processor looks for the terms in the search engine's database.
سؤال
A spam
A spam   can be configured with rules that block messages containing text such as viagra or v1@gra.<div style=padding-top: 35px> can be configured with rules that block messages containing text such as viagra or v1@gra.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: The Web and E-Mail
1
Suppose that you are about to check out at an online store, but you don't see any indication that your transaction data will be protected by a secure connection. It would be best, under these circumstances, to use PGP software to encrypt your shipping and billing data. True or false
Suppose that you are about to check out at an online store, but you don't see any indication that your transaction data will be protected by a secure connection. It would be best, under these circumstances, to use PGP software to encrypt your shipping and billing data. True or false
PGP software for secure connection
When user want to use online stores and he sees that the transactions are not secure then it might be irritating. User can check whether he is using a secure connection by looking at the Uniform resource locator (URL)
If the URL begins with https:\\ then it will indicates that the connection is secure. A lock icon in the address bar also indicates that the secure connection is active.
PGP software that is pretty good privacy is used for encrypting and decrypting emails for secure transmission.
For securing a transaction during online shopping, S-HTTP (Secure HTTP), TLS (transport layer security), SSL (secure socket layer) are used.
Therefore, the appropriate word to fill in the blank is False.
2
Your Inbox is getting more and more unsolicited messages with "fisd foos" in the header. You decide to generate a new rule for your security software's spam
Your Inbox is getting more and more unsolicited messages with fisd foos in the header. You decide to generate a new rule for your security software's spam   to block those irritating messages. to block those irritating messages.
Spam Filter
SPAMs are the unwanted electronic messages which can be about low cost loans, medical products and fake software upgrade. SPAM is used by hackers as a strong hacking tool and it can contain key logger, worms and viruses.
Users have to be aware about the spam and he must delete the spam message without responding to that message. Spam filter should be installed and configured into the computer for reducing affect of SPAM.
Spam filters help in capturing unsolicited email address before they reach to the inbox. Spam filter checks the email header text and the message by a series of rules.
Standard rules are included into the spam filter which blocks only common spam. But users can create their own rules which are missed by the standard filter. The wording of spam filter rules and the format of spam filter vary from one filter to another.
Therefore, the appropriate word to fill in the blank is Filter.
3
AND , OR , NOT , and.. are examples of search
AND , OR , NOT , and.. are examples of search   . .
Boolean Operator
It is a word which is used to illustrate the relationships between the search words to create a more effective query.
There are three types of Boolean operator: AND, OR and NOT. When a search query contains AND operator between words then resultant will display only those websites which contains both words.
When a search query contains OR operator between words then resultant will display only those websites which contains any of these words.
When a search query contains NOT operator before the words then resultant will display only those websites which does not contain these words.
Therefore, the appropriate word to fill in the blank is Boolean.
4
A(n)
A(n)   exploit redirects users to fake sites by poisoning a Domain Name Server with a false IP address. exploit redirects users to fake sites by poisoning a Domain Name Server with a false IP address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Explain the relationship between an HTML source document and a Web page. List five HTML tags and describe how each is used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Use a search engine and search operators to formulate a search for information about your favorite era in history. Can you make a more targeted search to find out what kind of slang was used during that time period
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Most search engines keep track of users by assigning a unique ID number, which is stored in a(n)
Most search engines keep track of users by assigning a unique ID number, which is stored in a(n)   on the hard disk of the user's computer. on the hard disk of the user's computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
The Adobe site provides a Settings Manager that can be used to control
The Adobe site provides a Settings Manager that can be used to control   cookies and prevent your computer's camera from being activated without your knowledge. cookies and prevent your computer's camera from being activated without your knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Your friend, who is a little computer phobic, is going to be creating his first Web page and asks you to recommend some software for the task. Which one requires the least knowledge of HTML tags: Notepad or Libre Office Writer
Your friend, who is a little computer phobic, is going to be creating his first Web page and asks you to recommend some software for the task. Which one requires the least knowledge of HTML tags: Notepad or Libre Office Writer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
You're conducting a research project that requires you to visit sites with lots of pop-up ads and other junk that you don't want accumulating in your Temporary Internet Files folder. You remember that you can turn on
You're conducting a research project that requires you to visit sites with lots of pop-up ads and other junk that you don't want accumulating in your Temporary Internet Files folder. You remember that you can turn on   browsing to delete all that junk when you end your session. browsing to delete all that junk when you end your session.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
To keep track of the Web pages where you obtained information or images, you can highlight the Web page's
To keep track of the Web pages where you obtained information or images, you can highlight the Web page's   , copy it, and then paste it into a list of sources. (Hint: Use the acronym.) , copy it, and then paste it into a list of sources. (Hint: Use the acronym.)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Draw a multi-panel cartoon that shows how a Web server and a browser interact. Include the following terms: Web server, browser, HTTP, HTML, port, socket, HTML document, graphic file, and URL.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
List the three most commonly used styles of citation and demonstrate how to correctly format a citation to a Web page using each style.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Online auction sites such as eBay are examples of B2G e commerce. True or false
Online auction sites such as eBay are examples of B2G e commerce. True or false
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Suppose you visit a Web site that has eye-catching pages. You want to know how these pages were formatted, so you use one of the options on your browser's menu to take a look at the HTML
Suppose you visit a Web site that has eye-catching pages. You want to know how these pages were formatted, so you use one of the options on your browser's menu to take a look at the HTML   document. document.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Explain two ways that shopping carts can work with cookies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
One factor in the e-commerce economic model is ad revenue based on
One factor in the e-commerce economic model is ad revenue based on   rates, the number of times that site visitors click an ad to connect to the advertiser's Web site. rates, the number of times that site visitors click an ad to connect to the advertiser's Web site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Briefly sketch the evolution of Web browsers. Describe how browsers use plug-ins.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
List three threats to the security of credit card numbers and other sensitive data during e-commerce transactions. Describe how the following e-commerce technologies work: SSL\TLS, HTTPS, and person-to-person payment systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Most online shopping carts work because they use
Most online shopping carts work because they use   to store information about your activities at a Web site. to store information about your activities at a Web site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Suppose you click a link at a Web site and get a message that the file cannot be displayed because it is in PDF format. To view the file, you need an updated version of your browser. True or false
Suppose you click a link at a Web site and get a message that the file cannot be displayed because it is in PDF format. To view the file, you need an updated version of your browser. True or false
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Create a table that compares and contrasts local mail with Webmail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Product pages at e-commerce sites with URLs that contain a(n)
Product pages at e-commerce sites with URLs that contain a(n)   symbol, cgi, php, or asp are most likely assembled by a server-side script from the information in a database. symbol, cgi, php, or asp are most likely assembled by a server-side script from the information in a database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Explain why cookies are useful in an environment that is based on a stateless protocol, and provide some concrete examples of their use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
List the advantages and disadvantages of HTML formatted mail. Explain how MIME works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Web sites that provide a secure connection have URLs that begin with https: instead of http:. True or false
Web sites that provide a secure connection have URLs that begin with https: instead of http:. True or false
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Suppose you're performing a local test of a Web page you created. All the page elements appear to be correctly positioned and formatted. You're also happy to discover that your large graphics files are displayed quite quickly by your browser. Can you expect similar performance after you post the page on a Web site Yes or no
Suppose you're performing a local test of a Web page you created. All the page elements appear to be correctly positioned and formatted. You're also happy to discover that your large graphics files are displayed quite quickly by your browser. Can you expect similar performance after you post the page on a Web site Yes or no
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Make a list of security and privacy concerns discussed in this chapter. Describe each one and then list procedures and technologies available to make your online experience more secure and private.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
The
The   of an e-mail message contains recipient addresses, the subject line, and the file names of any e-mail attachments. of an e-mail message contains recipient addresses, the subject line, and the file names of any e-mail attachments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Describe the advantages and disadvantages of each type of Web page development tool discussed in this chapter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Ted Nelson coined the term
Ted Nelson coined the term   to describe a web of linked documents, similar to Web pages. to describe a web of linked documents, similar to Web pages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
For most client-based e-mail systems, a(n)
For most client-based e-mail systems, a(n)   server handles outgoing mail, and a(n) server or an IMAP server handles incoming mail. (Hint: Use the acronyms.) server handles outgoing mail, and a(n) server or an IMAP server handles incoming mail. (Hint: Use the acronyms.)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
You'd prefer not to have the search engine you use maintain accumulative records of your searches. You can block
You'd prefer not to have the search engine you use maintain accumulative records of your searches. You can block   from a specific search engine site, and that setting will force the search engine to assign a different ID number to you for each session. from a specific search engine site, and that setting will force the search engine to assign a different ID number to you for each session.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Every Web page has a unique address called a(n)
Every Web page has a unique address called a(n)   . (Hint: Use the acronym.) . (Hint: Use the acronym.)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
HTML mail is the same as Webmail. True or false
HTML mail is the same as Webmail. True or false
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Create a short tutorial explaining how to create, test, and post a Web page using a text editor such as Notepad or Text Edit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
The main protocol for sending and receiving Web content is
The main protocol for sending and receiving Web content is   . (Hint: Use the acronym.) . (Hint: Use the acronym.)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Attachments to e-mail messages are encoded in
Attachments to e-mail messages are encoded in   format. (Hint: Use the acronym.) format. (Hint: Use the acronym.)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
You're getting ready for a week-long trip. You'd rather not take your computer, but you'll have access to public computers. Rather than use Webmail while you're away from home, you decide to use your familiar POP e-mail
You're getting ready for a week-long trip. You'd rather not take your computer, but you'll have access to public computers. Rather than use Webmail while you're away from home, you decide to use your familiar POP e-mail   software by storing it and your e-mail files on a portable USB flash drive. software by storing it and your e-mail files on a portable USB flash drive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
The basic markup language used on the Web is
The basic markup language used on the Web is   . (Hint: Use the acronym.) . (Hint: Use the acronym.)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
The rules and suggestions regarding electronic communications such as e-mail are referred to as
The rules and suggestions regarding electronic communications such as e-mail are referred to as   . .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Explain the purpose of JavaScript.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
  were developed because HTTP is a stateless protocol; so each time you connect to a different page, the Web server regards it as a new connection. were developed because HTTP is a stateless protocol; so each time you connect to a different page, the Web server regards it as a new connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
A Web
A Web   embedded in an e-mail message or a Web page can be activated when you view an infested page. embedded in an e-mail message or a Web page can be activated when you view an infested page.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
One of your relatives wants to try online shopping, but is suspicious that her credit card number might get stolen from a merchant's server by a hacker using a packet sniffer. Is it correct to tell her that she can best avoid these potential rip-offs by using a secure connection, such as HTTPS Yes or no
One of your relatives wants to try online shopping, but is suspicious that her credit card number might get stolen from a merchant's server by a hacker using a packet sniffer. Is it correct to tell her that she can best avoid these potential rip-offs by using a secure connection, such as HTTPS Yes or no
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
A search engine's
A search engine's   pulls keywords from a Web page and stores them in a database. pulls keywords from a Web page and stores them in a database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
If you don't want your IP address tracked as you surf the Web, you can use an anonymous
If you don't want your IP address tracked as you surf the Web, you can use an anonymous   service. service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Create a comic-strip like sequence of diagrams that illustrates how the following technologies interact: Web crawler, search engine database, indexer, query processor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
When you enter search terms, the search engine's
When you enter search terms, the search engine's   processor looks for the terms in the search engine's database. processor looks for the terms in the search engine's database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
A spam
A spam   can be configured with rules that block messages containing text such as viagra or v1@gra. can be configured with rules that block messages containing text such as viagra or v1@gra.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.