Deck 2: Technology Infrastructure: the Internet and the World Wide Web

ملء الشاشة (f)
exit full mode
سؤال
The USENET was the earliest of the networks that eventually combined to become what we now call the Internet.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
An HTML document is similar to a word-processing document in that it specifies how a particular text element will appear.
سؤال
Simple Mail Transfer Protocol (SMTP) is a common protocol used for sending and retrieving e-mail.
سؤال
The Internet Corporation for Assigned Names and Numbers (ICANN) has the responsibility of managing domain names and coordinating them with the IP address registrars.
سؤال
Virtual private network software must be installed on the computers at both ends of a transmission.
سؤال
Networks of computers and the Internet that connects them to each other form the basic technological structure that underlies virtually all electronic commerce.
سؤال
The Internet provides a high degree of security in its basic structure.
سؤال
IP addresses appear as five decimal numbers separated by periods.
سؤال
A network of computers that are located in the same building is called a wide area network.
سؤال
The Post Office Protocol (POP) provides support for Multipurpose Internet Mail Extensions (MIME).
سؤال
Public networks, private networks, and VPNs are independent of organizational boundaries.
سؤال
The word "virtual," used as part of virtual private networks means that the network connection is permanent.
سؤال
The leftmost part of a domain name is called a top-level domain (TLD).
سؤال
Extranets were used to save money and increase efficiency by replacing traditional communication tools such as fax, telephone, and overnight express document carriers.
سؤال
E-mail was born in 1972 when a researcher wrote a program that could send and receive messages over the Defense Department network.
سؤال
The most important parts of a Web page are the graphics, photographs, and small programs that run in the Web browser.
سؤال
Post Office Protocol (POP) allows the user to view only the header and the e-mail sender's name before deciding to download the entire message.
سؤال
An intranet extends beyond the organization that created it.
سؤال
At a technological level, the Web is nothing more than software that runs on computers that are connected to the Internet.
سؤال
The first e-mail mailing lists appeared on military and education research networks.
سؤال
The 32-bit number used to identify computers connected to the Internet is known as the _____.

A) IP address
B) NSAP address
C) MAC address
D) OUI address
سؤال
Data-type definitions (DTD's) are a form of common standard for XML tags.
سؤال
IPv6 uses a _____ number for addresses.

A) 32-bit
B) 56-bit
C) 128-bit
D) 48-bit
سؤال
A _____ is a collection of rules for formatting, ordering, and error checking data sent across a network.

A) style sheet
B) semantic
C) protocol
D) packet
سؤال
_____ specifies the format of a mail message and describes how mail is to be administered on the e-mail server and transmitted on the Internet.

A) Multipurpose Internet Mail Extensions (MIME)
B) Simple Mail Transfer Protocol (SMTP)
C) Interactive Mail Access Protocol (IMAP)
D) Post Office Protocol (POP)
سؤال
In subnetting, a computer called a _____ device converts private IP addresses into normal IP addresses when it forwards packets from those computers to the Internet.

A) Network Address Translation (NAT)
B) Network Interface Controller (NIC)
C) Generic Routing Encapsulation (GRE)
D) Data Circuit-Terminating (DCE)
سؤال
A hierarchical hyperlink structure resembles conventional paper documents in that the reader begins on the first page and clicks the Next button to move to the next page in a serial fashion.
سؤال
The combination of telephone lines and the closed switches that connect them to each other is called a _____.

A) LAN
B) WAN
C) circuit
D) pathway
سؤال
The computers that decide how best to forward each packet from one network to another are called _____.

A) switches
B) bridges
C) routers
D) repeaters
سؤال
A _____ is a permanent telephone connection between two points.

A) dedicated line
B) party line
C) leased line
D) local line
سؤال
The Semantic Web project envisions words on Web pages being tagged with their meanings.
سؤال
The term "cascading" is used in cascading style sheets because designers can apply many style sheets to the same Web page, one on top of the other.
سؤال
The higher the bandwidth, the faster the transmission of data through a communication medium.
سؤال
_____ creates a private passageway through the public Internet that provides secure transmission from one computer to another.

A) IP tunneling
B) Circuit switching
C) Encapsulation
D) Subnetting
سؤال
_____ determine how a sending device indicates that it has finished sending a message and how the receiving device indicates that it has received the message.

A) Routers
B) Semantics
C) Protocols
D) Switches
سؤال
_____ is a connection that uses public networks and their protocols to send data using a technology called IP tunneling.

A) A personal area network
B) The Internet
C) A virtual private network
D) The World Wide Web
سؤال
The programs on gateway computers that determine the best path on which to send each packet contain rules called _____.

A) program profilers
B) empirical algorithms
C) software profilers
D) routing algorithms
سؤال
In 2014 the number of mobile phones was greater than the planet's population
سؤال
One broadband option is a higher grade of telephone service using a DSL modem
سؤال
Files and e-mail messages sent over the Internet are broken down into small pieces called _____.

A) messages
B) ​switches
C) ​circuits
D) ​packets
سؤال
_____ are sets of words that are assigned to specific IP addresses.

A) Domain names
B) URLs
C) Octets
D) Headers
سؤال
A computer network which uses a specific set of rules and connects networks all over the world to each other is called the _____.
سؤال
_____ was the first Web browser that became widely available for personal computers.

A) Mosaic
B) Netscape
C) Internet Explorer
D) CompuServe
سؤال
A(n) _____ is an e-mail address that forwards any message it receives to any user who has subscribed to the list.
سؤال
A device that transmits network packets between Wi-Fi equipped computers and other devices within range is a __________

A) wireless access point
B) piconet
C) hot spot
D) blue tooth
سؤال
A(n) _____ has a hypertext reference (HREF) property, which specifies the remote or local document's address.

A) closing tag
B) paragraph tag
C) opening tag
D) bold tag
سؤال
A _____ structure resembles an inverted tree in which the root is at the top and the branches are below it.

A) parabolic hyperlink​
B) hierarchical hyperlink​
C) rooted hyperlink​
D) linear hyperlink​
سؤال
Usenet survives on the Internet today, with more than 1000 different topic areas that are called _____.
سؤال
_____ is a set of rules for handling binary files, such as word-processing documents, spreadsheets, photos, or sound clips that are attached to e-mail messages.

A) SMTP
B) TCP/IP
C) MIME
D) POP
سؤال
_____ is a subset of the computers on the Internet that are connected to one another in a specific way that makes them and their contents easily accessible to each other.
سؤال
_____ lets users create and manipulate e-mail folders and individual e-mail messages while the messages are still on the e-mail server.

A) POP
B) SMTP
C) IMAP
D) MIME
سؤال
HTML was developed by _____.

A) Robert Kahn
B) Vinton Cerf
C) Ted Nelson
D) Tim Berners-Lee
سؤال
A newer e-mail protocol that performs the same basic functions as POP, but includes additional features, is known as _____.

A) IMAP
B) SMTP
C) POP3
D) TCP
سؤال
The early versions of _____ let Web page designers create text-based electronic documents with headings, title bar titles, bullets, lines, and ordered lists.

A) HTTP
B) HTML
C) SGML
D) XML
سؤال
A(n) _____ is any technology that allows people to connect computers to each other.
سؤال
The ______ in an HTML document are interpreted by the web browser and used by it to format the display of enclosed text.

A) tags
B) links
C) markups
D) style sheet
سؤال
In 1979, a group of students and programmers at Duke University and the University of North Carolina started _____, which allows anyone who connects to the network to read and post articles on a variety of subjects.
سؤال
In HTML, hyperlinks are created using the HTML _____ tag.

A) head
B) anchor
C) title
D) opening
سؤال
The purpose of a(n) _____ is to respond to requests for Web pages from Web clients.

A) DNS server
B) e-mail server
C) Web server
D) database server
سؤال
The combination of a protocol name and a domain name is called a(n) _____.

A) Uniform Resource Locator (URL)
B) Internationalized Resource Identifier (IRI)
C) Extensible Resource Descriptor Sequence (XRDS)
D) Extensible Resource Identifier (XRI)
سؤال
_____ uses paired start and stop tags in much the same way as database software defines a record structure.
سؤال
The set of rules for delivering Web page files over the Internet is in a protocol called the _____.
سؤال
HTML, XML, and XHTML have descended from the original _____ specification.
سؤال
_____ is the amount of data that can travel through a communication medium per unit of time.
سؤال
A(n) _____ is a language that can be used to define other languages.
سؤال
Internet _____ are computers that are directly connected to the Internet.
سؤال
A(n) _____ is a set of instructions that gives Web developers more control over the format of displayed pages.
سؤال
The _____________ can be difficult or impossible to research because available data that is never requested remains hidden.
سؤال
The subset of the Internet that includes computers and sensors connected to each other for communication and automatic transaction processing is called the _____.
سؤال
A(n) _____ is used when the Internet extends beyond the boundaries of an organization and includes networks of other organizations.
سؤال
_____ is a measure of the amount of information that can travel from a user to the Internet in a given amount of time.
سؤال
In HTML, the text elements that are related to each another are called _____ elements.
سؤال
The _____ controls the disassembly of a message or a file into packets before it is transmitted over the Internet, and it controls the reassembly of those packets into their original formats when they reach their destinations.
سؤال
Companies known as _____ sell Internet access rights directly to larger customers and indirectly to smaller firms and individuals through other companies, called ISPs.
سؤال
_____ tags convey the meaning (the semantics) of the information included within them.
سؤال
A(n) _____ is a set of standards that defines, in detail, the relationships among resource description framework (RDF) standards and specific extensible markup language (XML) tags within a particular knowledge domain.
سؤال
The _____ in TCP/IP specifies the addressing details for each packet, labeling each with the packet's origination and destination addresses.
سؤال
A group of network research scientists from nearly 200 universities and a number of major corporations joined together in 1996 to recapture the original enthusiasm of the ARPANET and created an advanced research network called _____.
سؤال
A(n) _____ hyperlink structure resembles conventional paper documents in that the reader begins on the first page and clicks a Next button to move to the next page in a serial fashion.
سؤال
A(n) _____ is a computer that stores files written in HTML.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/85
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Technology Infrastructure: the Internet and the World Wide Web
1
The USENET was the earliest of the networks that eventually combined to become what we now call the Internet.
False
2
An HTML document is similar to a word-processing document in that it specifies how a particular text element will appear.
False
3
Simple Mail Transfer Protocol (SMTP) is a common protocol used for sending and retrieving e-mail.
True
4
The Internet Corporation for Assigned Names and Numbers (ICANN) has the responsibility of managing domain names and coordinating them with the IP address registrars.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
5
Virtual private network software must be installed on the computers at both ends of a transmission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
6
Networks of computers and the Internet that connects them to each other form the basic technological structure that underlies virtually all electronic commerce.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Internet provides a high degree of security in its basic structure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
8
IP addresses appear as five decimal numbers separated by periods.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
9
A network of computers that are located in the same building is called a wide area network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
10
The Post Office Protocol (POP) provides support for Multipurpose Internet Mail Extensions (MIME).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
11
Public networks, private networks, and VPNs are independent of organizational boundaries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
12
The word "virtual," used as part of virtual private networks means that the network connection is permanent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
13
The leftmost part of a domain name is called a top-level domain (TLD).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
14
Extranets were used to save money and increase efficiency by replacing traditional communication tools such as fax, telephone, and overnight express document carriers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
15
E-mail was born in 1972 when a researcher wrote a program that could send and receive messages over the Defense Department network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
16
The most important parts of a Web page are the graphics, photographs, and small programs that run in the Web browser.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
17
Post Office Protocol (POP) allows the user to view only the header and the e-mail sender's name before deciding to download the entire message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
18
An intranet extends beyond the organization that created it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
19
At a technological level, the Web is nothing more than software that runs on computers that are connected to the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
20
The first e-mail mailing lists appeared on military and education research networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
21
The 32-bit number used to identify computers connected to the Internet is known as the _____.

A) IP address
B) NSAP address
C) MAC address
D) OUI address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
22
Data-type definitions (DTD's) are a form of common standard for XML tags.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
23
IPv6 uses a _____ number for addresses.

A) 32-bit
B) 56-bit
C) 128-bit
D) 48-bit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
24
A _____ is a collection of rules for formatting, ordering, and error checking data sent across a network.

A) style sheet
B) semantic
C) protocol
D) packet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
25
_____ specifies the format of a mail message and describes how mail is to be administered on the e-mail server and transmitted on the Internet.

A) Multipurpose Internet Mail Extensions (MIME)
B) Simple Mail Transfer Protocol (SMTP)
C) Interactive Mail Access Protocol (IMAP)
D) Post Office Protocol (POP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
26
In subnetting, a computer called a _____ device converts private IP addresses into normal IP addresses when it forwards packets from those computers to the Internet.

A) Network Address Translation (NAT)
B) Network Interface Controller (NIC)
C) Generic Routing Encapsulation (GRE)
D) Data Circuit-Terminating (DCE)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
27
A hierarchical hyperlink structure resembles conventional paper documents in that the reader begins on the first page and clicks the Next button to move to the next page in a serial fashion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
28
The combination of telephone lines and the closed switches that connect them to each other is called a _____.

A) LAN
B) WAN
C) circuit
D) pathway
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
29
The computers that decide how best to forward each packet from one network to another are called _____.

A) switches
B) bridges
C) routers
D) repeaters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
30
A _____ is a permanent telephone connection between two points.

A) dedicated line
B) party line
C) leased line
D) local line
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
31
The Semantic Web project envisions words on Web pages being tagged with their meanings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
32
The term "cascading" is used in cascading style sheets because designers can apply many style sheets to the same Web page, one on top of the other.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
33
The higher the bandwidth, the faster the transmission of data through a communication medium.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
34
_____ creates a private passageway through the public Internet that provides secure transmission from one computer to another.

A) IP tunneling
B) Circuit switching
C) Encapsulation
D) Subnetting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
35
_____ determine how a sending device indicates that it has finished sending a message and how the receiving device indicates that it has received the message.

A) Routers
B) Semantics
C) Protocols
D) Switches
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
36
_____ is a connection that uses public networks and their protocols to send data using a technology called IP tunneling.

A) A personal area network
B) The Internet
C) A virtual private network
D) The World Wide Web
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
37
The programs on gateway computers that determine the best path on which to send each packet contain rules called _____.

A) program profilers
B) empirical algorithms
C) software profilers
D) routing algorithms
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
38
In 2014 the number of mobile phones was greater than the planet's population
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
39
One broadband option is a higher grade of telephone service using a DSL modem
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
40
Files and e-mail messages sent over the Internet are broken down into small pieces called _____.

A) messages
B) ​switches
C) ​circuits
D) ​packets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
41
_____ are sets of words that are assigned to specific IP addresses.

A) Domain names
B) URLs
C) Octets
D) Headers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
42
A computer network which uses a specific set of rules and connects networks all over the world to each other is called the _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
43
_____ was the first Web browser that became widely available for personal computers.

A) Mosaic
B) Netscape
C) Internet Explorer
D) CompuServe
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
44
A(n) _____ is an e-mail address that forwards any message it receives to any user who has subscribed to the list.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
45
A device that transmits network packets between Wi-Fi equipped computers and other devices within range is a __________

A) wireless access point
B) piconet
C) hot spot
D) blue tooth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
46
A(n) _____ has a hypertext reference (HREF) property, which specifies the remote or local document's address.

A) closing tag
B) paragraph tag
C) opening tag
D) bold tag
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
47
A _____ structure resembles an inverted tree in which the root is at the top and the branches are below it.

A) parabolic hyperlink​
B) hierarchical hyperlink​
C) rooted hyperlink​
D) linear hyperlink​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
48
Usenet survives on the Internet today, with more than 1000 different topic areas that are called _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
49
_____ is a set of rules for handling binary files, such as word-processing documents, spreadsheets, photos, or sound clips that are attached to e-mail messages.

A) SMTP
B) TCP/IP
C) MIME
D) POP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
50
_____ is a subset of the computers on the Internet that are connected to one another in a specific way that makes them and their contents easily accessible to each other.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
51
_____ lets users create and manipulate e-mail folders and individual e-mail messages while the messages are still on the e-mail server.

A) POP
B) SMTP
C) IMAP
D) MIME
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
52
HTML was developed by _____.

A) Robert Kahn
B) Vinton Cerf
C) Ted Nelson
D) Tim Berners-Lee
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
53
A newer e-mail protocol that performs the same basic functions as POP, but includes additional features, is known as _____.

A) IMAP
B) SMTP
C) POP3
D) TCP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
54
The early versions of _____ let Web page designers create text-based electronic documents with headings, title bar titles, bullets, lines, and ordered lists.

A) HTTP
B) HTML
C) SGML
D) XML
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
55
A(n) _____ is any technology that allows people to connect computers to each other.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
56
The ______ in an HTML document are interpreted by the web browser and used by it to format the display of enclosed text.

A) tags
B) links
C) markups
D) style sheet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
57
In 1979, a group of students and programmers at Duke University and the University of North Carolina started _____, which allows anyone who connects to the network to read and post articles on a variety of subjects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
58
In HTML, hyperlinks are created using the HTML _____ tag.

A) head
B) anchor
C) title
D) opening
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
59
The purpose of a(n) _____ is to respond to requests for Web pages from Web clients.

A) DNS server
B) e-mail server
C) Web server
D) database server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
60
The combination of a protocol name and a domain name is called a(n) _____.

A) Uniform Resource Locator (URL)
B) Internationalized Resource Identifier (IRI)
C) Extensible Resource Descriptor Sequence (XRDS)
D) Extensible Resource Identifier (XRI)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
61
_____ uses paired start and stop tags in much the same way as database software defines a record structure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
62
The set of rules for delivering Web page files over the Internet is in a protocol called the _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
63
HTML, XML, and XHTML have descended from the original _____ specification.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
64
_____ is the amount of data that can travel through a communication medium per unit of time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
65
A(n) _____ is a language that can be used to define other languages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
66
Internet _____ are computers that are directly connected to the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
67
A(n) _____ is a set of instructions that gives Web developers more control over the format of displayed pages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
68
The _____________ can be difficult or impossible to research because available data that is never requested remains hidden.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
69
The subset of the Internet that includes computers and sensors connected to each other for communication and automatic transaction processing is called the _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
70
A(n) _____ is used when the Internet extends beyond the boundaries of an organization and includes networks of other organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
71
_____ is a measure of the amount of information that can travel from a user to the Internet in a given amount of time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
72
In HTML, the text elements that are related to each another are called _____ elements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
73
The _____ controls the disassembly of a message or a file into packets before it is transmitted over the Internet, and it controls the reassembly of those packets into their original formats when they reach their destinations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
74
Companies known as _____ sell Internet access rights directly to larger customers and indirectly to smaller firms and individuals through other companies, called ISPs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
75
_____ tags convey the meaning (the semantics) of the information included within them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
76
A(n) _____ is a set of standards that defines, in detail, the relationships among resource description framework (RDF) standards and specific extensible markup language (XML) tags within a particular knowledge domain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
77
The _____ in TCP/IP specifies the addressing details for each packet, labeling each with the packet's origination and destination addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
78
A group of network research scientists from nearly 200 universities and a number of major corporations joined together in 1996 to recapture the original enthusiasm of the ARPANET and created an advanced research network called _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
79
A(n) _____ hyperlink structure resembles conventional paper documents in that the reader begins on the first page and clicks a Next button to move to the next page in a serial fashion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
80
A(n) _____ is a computer that stores files written in HTML.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.