logo image

chapter 3 computers

the internet was created to provide
a secure form of communication and a common communications means for all computers
which of the following describes an IP address
it is referred to as a dotted quad, it identifies any computer connecting to the internet, it identifies a wbsite
which of the following is an installed email client
outlook
what web browser feature would be particularly useful when using public computers
privacy browsing
in the URL http://www.whitehouse.gov/blog, which part is considered the par or sudirectory
/blog
search engines that search other search engines are called
metasearch engine
the internet is
a large network of networks
the world wide web was based on a protocol developed by
tim berners lee
the fathers of the internet are vinton cerf and
robert kahn
software that enables you to display and interact with text and other media on the web is a web
browser
the web is based on the ____ protocol
hypertext transfer
a computer connected to the internet that asks for data is a
client
the unique identification number assigned to you computer when you connect to the internet is known as all of the following except
path
a ______ is installed on your computer and when the program is opened your email is downloaded to your computer
web based email
______ is a professional business-oriented social networking site
linkedin
which of the following is not a social networking site
itunes
all of the following are tips for professional email etiquette except
use abbreviations such as u and r and BRB to keep the email message shorter
which of the following is not a proprietary instant messaging (IM)
linkedin messenger
a _____ allows visitors to add, remove or edit its content
wiki
which of the following are personal video jounal entries posted on the web
vlogs
A _______ is a personal journal posted on the web
blog
podcasts enable you to
deliver audio/video files via RSS
a ____ is usually a live broadcast of audio or video content
webcast
silverlight flash player and quicktime player are examples of software programs called
plug ins
____ media are continuously fed to your browser so you do not have to wait for the entire file to completely download before listening to or watching it
streaming
all of the following are types of ecommerce business except
C2B
which of the following is not a precaution to take when shopping online
pay with a debit card not a credit card
the “s” in “https” stands for ___ socket layer
secure

Need essay sample on "chapter 3 computers"? We will write a custom essay sample specifically for you for only .90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register
Signup & Access Essays

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy