8/10/2019 e Commerce Russ
1/32
Chapter 2The Internet, the Web, and Electronic Commerce
Multiple Choice
1. The Internet was launched in 1969 and was originally called
a) AARPNET
b) CERNETc) CERN
d) ARPANET
Answer: D
Difficulty level: HardPage: 30Response: The Internet was originally called Advanced Research Project
Agency Network (ARPANET).
2. The actual physical network made up of wires, cables, and satellites thatconnects computers and resources throughout the world is the
a) Web
b) Internet
c) e-commerced) spiders
Answer: BDifficulty level: MediumPage: 30
Response: The Internet is the actual physical network. It is made up of
wires, cables, and satellites.
3. The most popular Internet activity isa) going shopping
b) conducting research
c) playing games, reading, listening to musicd) communicating with others
Answer: D
Difficulty level: Easy
Page: 30
Response: Communicating is by far the most popular Internet activity.
8/10/2019 e Commerce Russ
2/32
4. The fastest-growing application for the Internet is
a) going shoppingb) conducting research
c) playing games, reading, and listening to musicd) using e-mailAnswer: A
Difficulty level: MediumPage: 30
Response: Shopping is one of the fastest-growing Internet applications.
5. Most common uses of the Internet and the Web include communicating,
shopping,a) searching, entertainment, and education
b) e-commerce, e-mail, and searchingc) e-mail, entertainment, and education
d) e-commerce, e-mail, and educationAnswer: A
Difficulty level: Medium
Page: 30Response: The most common uses of the Internet include communicating,shopping, searching, entertainment, and education or e-learning.
6. The __________ is the multimedia interface to resources available on the
Internet.
a) Web
b) ISPc) browserd) URL
Answer: A
Difficulty level: MediumPage: 30
Response: The Web provides a multimedia interface to resources availableon the Internet.
7. The multimedia interface to the resources available on the Net is called thea) World Wide Web
b) Internet
c) GUI interface
8/10/2019 e Commerce Russ
3/32
d) server
Answer: A
Difficulty level: EasyPage: 30
Response: The Web provides a multimedia interface to resources availableon the Internet.
8. The most common method for gaining access to the Internet is through a
__________.a) dumb terminal
b) virtual provider or computer
c) point-to-point computer
d) provider or host computerAnswer: D
Difficulty level: MediumPage: 31
Response: The most common way to access the Internet is through aprovider or host computer.
9. The term ISP refers to
a) internal software protocol
b) international shareware poolc) Internet service provider
d) interface standard protocol
Answer: C
Difficulty level: MediumPage: 32Response: ISP is an acronym for Internet service providers.
10. A __________ program provides access to Web resources.a) Web
b) ISP
c) browserd) URL
Answer: CDifficulty level: EasyPage: 32
Response: Browsers are programs that provide access to Web resources.
8/10/2019 e Commerce Russ
4/32
8/10/2019 e Commerce Russ
5/32
b) destination and device
c) the protocol and the domain name
d) TCP and IPAnswer: C
Difficulty level: HardPage: 32Response: URLs have two basic partsthe protocol and the domain name
or the name of the server where the resource is located.
15. Rules for exchanging data between computers are calleda) programs
b) procedures
c) protocols
d) hyperlinksAnswer: C
Difficulty level: MediumPage: 32
Response: Protocols are rules for exchanging data between computers.
16. The most widely used Web protocol isa) http://
b) URL
c) HTMLd) ISP
Answer: A
Difficulty level: Hard
Page: 32Response: The most widely used Web protocol is http://.
17. Moving from one Web site to another is called
a) jumpingb) moving
c) surfing
d) applyingAnswer: C
Difficulty level: EasyPage: 32Response: Browsers allow you to explore, or surf the Web by moving from
one Web site to another.
8/10/2019 e Commerce Russ
6/32
8/10/2019 e Commerce Russ
7/32
c) Web page
d) domain page
Answer: CDifficulty level: Medium
Page: 33Response: The browser interprets the HTML commands and displays thedocument as a Web page.
22. HTML is an acronym for __________.a) Hyperlink Markup Language
b) Hypertext Markup Language
c) Hypertext Markup Link
d) Hypertext Modern LanguageAnswer: B
Difficulty level: MediumPage: 33
Response: HTML is an acronym for Hypertext Markup Language.
23. Connections to other documents or to other locations within a Web site area) filters
b) hyperlinks
c) plug-insd) bots
Answer: B
Difficulty level: Medium
Page: 33Response: Hyperlinks or links connect to other documents containingrelated information.
24. Hyperlinks in a Web document typically appear as
a) bolded and underlinedb) italicized and underlined
c) underlined and colored
d) bolded and italicizedAnswer: C
Difficulty level: MediumPage: 33Response: Hyperlinks appear as underlined and colored on the Web page.
8/10/2019 e Commerce Russ
8/32
25. __________ are widely used to add interest and activity to a Web site bypresenting animation, displaying graphics, providing interactive games, and
more.a) Appletsb) Bots
c) Plug-insd) Spiders
Answer: A
Difficulty level: MediumPage: 33Response: Applets are widely used to add interest and activity to a Web site
by presenting animation, displaying graphics, providing interactive games,
and more.
26. Applets are typically written in a programming language called
a) XMLb) Basic
c) Pascal
d) JavaAnswer: DDifficulty level: Hard
Page: 33
Response: Applets are typically written in Java.
27. Which of the following are not required in order to send and receive e-
mail?a) e-mail account
b) Web page
c) access to the Internet
d) e-mail programAnswer: B
Difficulty level: EasyPage: 34
Response: You do not require a Web page in order to send and receive e-
mail.
28. Which of the following is not one of the basic elements of an e-mailmessage?
a) header
8/10/2019 e Commerce Russ
9/32
b) footer
c) message
d) signatureAnswer: B
Difficulty level: HardPage: 34Response: A footer is not one of the basic elements of an e-mail message.
29. A one-line description, used to present the topic of an e-mail message, isreferred to as thea) header
b) address
c) subjectd) signature
Answer: CDifficulty level: Easy
Page: 34Response: A one-line description used to present the topic of the message is
the subject.
30. Unwanted and unsolicited e-mails are called
a) spamb) junk
c) flame
d) lurk
Answer: ADifficulty level: EasyPage: 34
Response: Unwanted and unsolicited e-mails are called spam.
31. Newsgroups use a special network of computers called thea) UseNet
b) MailNet
c) AddressNetd) ChannelNet
Answer: ADifficulty level: MediumPage: 36
8/10/2019 e Commerce Russ
10/32
Response: Newsgroups use a special network of computers called the
UseNet.
32. A popular chat service is calleda) IM-Chatb) UseNet Chat
c) Internet Protocol Chatd) Internet Relay Chat
Answer: D
Difficulty level: MediumPage: 36Response: Internet Relay Chat (IRC) is a popular chat service.
33. Before you submit a contribution to a discussion group, you should first
a) lurkb) signal
c) queued) ping
Answer: A
Difficulty level: MediumPage: 37Response: Before you submit a contribution to a discussion group, you
should first lurk (observe or read the communications from others).
34. Specialized programs that assist you in locating information on the Web
and the Internet are called
a) browsersb) Gophersc) search engines
d) applets
Answer: CDifficulty level: Medium
Page: 40Response: Search engines are specialized programs that assist you in
locating information on the Web and the Internet.
35. These search engines receive the results, eliminate duplicates, order thehits, and then provide the edited list to you
a) megasearch engines
8/10/2019 e Commerce Russ
11/32
b) metasearch engines
c) keyword search engines
d) directory search enginesAnswer: B
Difficulty level: HardPage: 41Response: Metasearch engines are designed to perform all of these tasks.
36. Buying and selling goods over the Internet is called __________a) hyper-marketing
b) cyber-selling
c) e-commerce
d) euro-conversionAnswer: C
Difficulty level: MediumPage: 42
Response: Electronic commerce (e-commerce) is the buying and selling ofgoods over the Internet.
37. This type of electronic commerce involves the sale of a product or serviceto the general public.
a) B2C
b) B2Pc) C2C
d) B2B
Answer: A
Difficulty level: MediumPage: 43Response: B2C involves the sale of a product or service to the general
public.
38. This type of e-commerce often takes the form of an electronic version ofthe classified ads or an auction.
a) B2C
b) C2Cc) G2C
d) B2BAnswer: BDifficulty level: Medium
Page: 43
8/10/2019 e Commerce Russ
12/32
Response: C2C often takes the form of an electronic version of the classified
ads or an auction.
39. Virtual stores for B2C electronic commerce are also known asa) auctionsb) houses
c) Web storefrontsd) Internet buyers
Answer: C
Difficulty level: MediumPage: 43Response: Web storefronts are virtual stores for B2C electronic commerce.
40. Another name for electronic cash or e-cash, the Internet equivalent totraditional cash, is
a) cybercash and analog cashb) digital cash and cybercom
c) carders and cybercom
d) cybercash and digital cashAnswer: DDifficulty level: Medium
Page: 44
Response: Electronic cash is also known as cybercash and digital cash.
41. __________ are specialized utility programs that make using the Internetand the Web easier and safer.a) Telecom
b) Web utilities
c) Norton Utilitiesd) Web firewalls
Answer: BDifficulty level: Medium
Page: 45
Response: Web utilities are specialized utility programs that make using theInternet and the Web easier and safer.
8/10/2019 e Commerce Russ
13/32
42. An Internet standard that allows you to connect to another computer (host)
on the Internet and to log on to that computer as if you were on a terminal in
the next room isa) FTP
b) AOLc) Listervd) Telnet
Answer: DDifficulty level: Medium
Page: 46
Response: Telnet is the Internet standard that accomplishes this task.
43. Programs that are automatically loaded and operate as a part of your
browser are referred to as __________.a) FTP
b) plug-insc) add-ons
d) TelnetAnswer: B
Difficulty level: Medium
Page: 46Response: Plug-ins are programs that are automatically loaded and operateas part of your browser.
44. An Internet standard for transferring files is known as
a) IRC
b) Telnetc) FTPd) WAIS
Answer: C
Difficulty level: MediumPage: 46
Response: File transfer protocol (FTP) is an Internet standard fortransferring files.
45. A(n) __________ can be used to block access to specific sites.a) filter
b) hardware block
c) censor
8/10/2019 e Commerce Russ
14/32
d) Rubicon
Answer: A
Difficulty level: EasyPage: 47
Response: Filters block access to selected sites.
True/False
46. The Internet was introduced in 1969 at the Center for European Nuclear
Research.
Answer: FalseDifficulty level: HardPage: 30
Response: The Web was introduced in 1992 at the Center for European
Nuclear Research (CERN) in Switzerland.
47. The most popular Internet activity is shopping.
Answer: False
Difficulty level: MediumPage: 30
Response: Communicating is the most popular Internet activity.
48. The Web is another name for the Internet.
Answer: FalseDifficulty level: Medium
Page: 30Response: The Web is another name for the WWW or the World WideWeb.
49. The actual, physical network used for international communication is called
the Internet.
Answer: True
Difficulty level: Medium
Page: 30
8/10/2019 e Commerce Russ
15/32
Response: The Internet is the actual physical network.
50. The most common way to access the Internet is through a provider or hostcomputer.Answer: True
Difficulty level: MediumPage: 31
Response: The most common way to access the Internet is through a
provider or host computer.
51. Some Internet providers offer free Internet access.Answer: True
Difficulty level: MediumPage: 31
Response: There are some companies that offer free Internet access.
52. Regional service providers offer access through standard telephoneconnections. Users can access the Internet from almost anywhere within the
country without incurring long-distance telephone charges.
Answer: FalseDifficulty level: Medium
Page: 32
Response: Access to the Internet from outside the regional area will incur
long-distance connection charges.
53. Commercial Internet service providers include national, regional, and
wireless service providers.Answer: True
Difficulty level: MediumPage: 32
Response: Commercial Internet service providers include all of these.
54. Browsers are programs that provide access to Web resources.Answer: True
Difficulty level: Easy
8/10/2019 e Commerce Russ
16/32
Page: 32
Response: Browsers are programs that provide access to Web resources.
55. Users of the Internet are part of a large client/server network.Answer: True
Difficulty level: MediumPage: 32
Response: The users computer acts as the client that requests services from
the providers computer or server.
56. In the Internet address "[email protected], the domain name ismaryellen.
Answer: FalseDifficulty level: Hard
Page: 32Response: The domain name is userfriendly.org.
57. The connections from one page of information on the World Wide Web to
another are called hyperlinks.
Answer: TrueDifficulty level: Medium
Page: 33
Response: Hyperlinks or links connect documents on the WWW to other
documents containing related information.
58. A programming language used to write animation for the World Wide Webis called applet.
Answer: FalseDifficulty level: Medium
Page: 33
Response: Java is the programming language that is used to write animationfor the WWW.
8/10/2019 e Commerce Russ
17/32
59. A programming language used to write animation for the World Wide Web
is called Java.
Answer: TrueDifficulty level: Medium
Page: 33Response: Java is the programming language that is used to write animationfor the World Wide Web.
60. An applet defines the rules for passing information between two or more
computers.Answer: FalseDifficulty level: Medium
Page: 33
Response: Protocols are rules for exchanging data between computers.
61. You can use e-mail to send messages but not files across the Internet.Answer: False
Difficulty level: Medium
Page: 34Response: E-mail can contain many different types of file attachments.
62. The three parts of an e-mail message are the header, message, and
signature.
Answer: True
Difficulty level: MediumPage: 34Response: A typical e-mail address has three basic elementsheader,
message, and signature.
63. Two of the most widely used e-mail programs are Netscape's Navigator and
Internet Express.
Answer: FalseDifficulty level: Medium
Page: 34Response: Two of the most widely used e-mail programs are MicrosoftsOutlook Express and Netscapes Mail.
8/10/2019 e Commerce Russ
18/32
8/10/2019 e Commerce Russ
19/32
69. Newsgroups, unlike mailing lists, use a special network of computers called
the UseNet.Answer: TrueDifficulty level: Medium
Page: 36Response: Newsgroups use a special network of computers called the
UseNet.
70. Eavesdropping describes the process of reading posts to a discussion group
before you post one of your own.Answer: False
Difficulty level: MediumPage: 37
Response: This observation process is called lurking.
71. Special programs called agents, spiders, or bots continually look for newinformation and update search services databases.
Answer: True
Difficulty level: MediumPage: 40
Response: Special programs called agents, spiders, or bots continually look
for new information and update the search services databases.
72. An index search organizes information into categories like art, science,
sports, etc.Answer: True
Difficulty level: HardPage: 40
Response: An index search allows users to select a category or topic that fits
the information that they want.
73. Metasearch engines are programs that automatically submit your search
request to a single search engine.
8/10/2019 e Commerce Russ
20/32
Answer: False
Difficulty level: Medium
Page: 41Response: Metasearch engines are programs that automatically submit your
search request to several search engines simultaneously.
74. The use of electronic commerce is growing rapidly.
Answer: True
Difficulty level: EasyPage: 42Response: Shopping on the Internet is growing rapidly and there seems to be
no end in sight.
75. C2C involves the sale of a product or service to the general public.Answer: False
Difficulty level: EasyPage: 43
Response: B2C involves the sale of a product or service to the general
public.
76. B2B involves the sale of a product or service from one business to another.
Answer: TrueDifficulty level: Easy
Page: 43
Response: B2B involves the sale of a product or service from one business
to another.
77. Web storefronts are virtual stores for B2C electronic commerce.
Answer: TrueDifficulty level: Easy
Page: 43Response: Web storefronts are virtual stores for B2C electronic commerce.
78. Web auctions are identical to traditional auctions in that the buyers and
sellers eventually meet face-to-face.Answer: FalseDifficulty level: Medium
Page: 43
8/10/2019 e Commerce Russ
21/32
Response: Web auctions are similar to traditional auctions except that
buyers and sellers seldom, if ever, meet face-to-face.
79. Cybercash is a medium of exchange on the Internet.Answer: TrueDifficulty level: Medium
Page: 44Response: Cybercash and digital cash are the Internets equivalent to
traditional cash.
80. A plug-in is an independent program that can be executed by the browser to
add capabilities.Answer: True
Difficulty level: MediumPage: 46
Response: Plug-ins are programs that are automatically loaded and operateas a part of your browser.
81. FTP allows you to connect to another computer and run programs there.
Answer: False
Difficulty level: MediumPage: 46
Response: FTP is an Internet standard for transferring files.
82. Telnet is the Internet standard for transferring files across the Internet.
Answer: False
Difficulty level: MediumPage: 46
Response: Telnet is an Internet standard that allows you to connect toanother computer (host) on the Internet and to log on to that computer as if
you were on a terminal in the next room.
83. Copying files from your computer to another computer on the Internet iscalled uploading.
Answer: True
8/10/2019 e Commerce Russ
22/32
Difficulty level: Medium
Page: 46
Response: Uploading is the process of copying files from your computer toanother computer on the Internet.
84. Filter programs can monitor use and generate reports about Internet usageon your computer.
Answer: True
Difficulty level: MediumPage: 47Response: Filters can monitor use and generate reports detailing the total
time spent on the Internet and the time spent at individual Web sites, chat
groups, and newsgroups.
85. Filter programs allow only pre-selected words or images to appear on your
browser screen.Answer: False
Difficulty level: Medium
Page: 47Response: Filters can also block out selected sites and set time limits.
Fill-In-The-Blank
86. The __________ is the actual physical network made up of wires, cables,and satellites.Answer: Internet
Difficulty level: Medium
Page: 30Response: The Internet is the actual physical network made up of wires,
cables, and satellites.
87. The __________ is a multimedia interface to resources available on the
Internet.Answer: WebDifficulty level: Medium
Page: 30
8/10/2019 e Commerce Russ
23/32
Response: The Web is a multimedia interface to resources available on the
Internet.
88. The most common way for individuals to access the Internet is through aprovider or a __________ computer.Answer: host
Difficulty level: MediumPage: 31
Response: The most common way to access the Internet is through a
provider or host computer.
89. While connected to the Internet, the users computer is the __________ that
requests services from theproviders computer or server.Answer: client
Difficulty level: MediumPage: 33
Response: The users computer is the client computer.
90. In the e-mail address [email protected], what is thedomain name?
Answer: macaroon.org
Difficulty level: MediumPage: 32
Response: The second part presents the domain name or the name of the
server where the resource is located.
91. __________ are programs that provide access to Web resources.
Answer: BrowsersDifficulty level: Easy
Page: 32Response: Browsers are programs that provide access to Web resources.
92. __________ are rules for exchanging data between computers.Answer: ProtocolsDifficulty level: Hard
Page: 32
8/10/2019 e Commerce Russ
24/32
Response: Protocols are rules for exchanging data between computers.
93. The second part of a URL is referred to as the __________ name. Itidentifies the server where the resource is located.Answer: domain
Difficulty level: HardPage: 32
Response: The domain name is the second part of the URL.
94. __________ are connections to other documents that contain related
information on the World Wide Web.Answer: Hyperlinks (links)
Difficulty level: MediumPage: 33
Response: Hyperlinks or links connect documents that contain relatedinformation on the Web.
95. A programming language used to write animation for the World Wide Web
is called __________.
Answer: JavaDifficulty level: Medium
Page: 33
Response: Java is a programming language that is used to write animation
for the WWW.
96. __________ are special programs that are typically written in a
programming language called Java.Answer: Applets
Difficulty level: MediumPage: 33
Response: Applets are typically written in Java.
97. In an e-mail message, the __________ element is a one-line description,used to present the topic of the message.Answer: subject
Difficulty level: Medium
8/10/2019 e Commerce Russ
25/32
Page: 34
Response: The subject is a one-line description, used to present the topic of
the message.
98. Unwanted and unsolicited e-mail is referred to as __________.Answer: spam
Difficulty level: EasyPage: 34
Response: Spam is unwanted and unsolicited e-mail.
99. Destructive programs that are often attached to unsolicited e-mail are called
computer __________.
Answer: virusesDifficulty level: Easy
Page: 34Response: Computer viruses are destructive programs that are often
attached to unsolicited e-mail.
100. __________ lists allow members to communicate by sending messages to alist address.Answer: Mailing
Difficulty level: Easy
Page: 36Response: Mailing lists allow members of a mailing list to communicate by
sending messages to a list address.
101. __________ groups allow direct live communication. They are typically
composed of individuals who have never met face-to-face.
Answer: ChatDifficulty level: Medium
Page: 36Response: Chat groups allow direct live communication and are typically
composed of individuals who have never met face-to-face.
102. To use instant messaging (IM), you specify a list of friends (also known as__________ or contacts) and register with an instant message server.Answer: buddies
Difficulty level: Medium
8/10/2019 e Commerce Russ
26/32
Page: 36
Response: List of friends is also known as buddies or contacts.
103. Reading the communications of others before you join a discussion group iscalled __________.Answer: lurking
Difficulty level: MediumPage: 37
Response: Observing or reading the communications from others before you
submit a contribution to a discussion group is referred to as lurking.
104. A __________ engine is a specialized program that can assist you inlocating information on the Web and the Internet.
Answer: searchDifficulty level: Easy
Page: 40Response: Search engines are specialized programs that assist you in
locating information on the Web and the Internet.
105. In a __________ search, you enter a phrase reflecting the information you
want.
Answer: keywordDifficulty level: Medium
Page: 40
Response: In a keyword search, you enter a keyword or phrase reflecting the
information you want.
106. In a directory search, also known as an __________ search, you select a
category or topic that fits the information you want.Answer: index
Difficulty level: MediumPage: 40
Response: A directory search is also known as an index search.
107. __________ engines submit search requests to several search enginessimultaneously.Answer: Metasearch
Difficulty level: Hard
8/10/2019 e Commerce Russ
27/32
Page: 41
Response: Metasearch engines are programs that automatically submit your
search request to several search engines simultaneously.
108. __________ search engines such aswww.medsite.comfocus on subject-specific Web sites.
Answer: SpecializedDifficulty level: Hard
Page: 42
Response:www.medsite.comis just one example of a specialized searchengine.
109. __________ is the term used to describe the buying and selling of goodsover the Internet.
Answer: E-commerceDifficulty level: Easy
Page: 42Response: Electronic commerce is the buying and selling of goods over the
Internet.
110. Criminals known as __________ specialize in stealing, trading, and using
stolen credit cards over the Web.Answer: carders
Difficulty level: Hard
Page: 44
Response: Criminals known as carders specialize in stealing, trading, andusing stolen credit cards over the Internet.
111. This basic type of e-commerce (__________) involves the sale of a productor service to the general public or endusers.
Answer: B2CDifficulty level: Medium
Page: 43
Response: B2C involves the sale of a product or service to the generalpublic or end- users.
112. This basic type of e-commerce (__________) involves individuals selling
to individuals.
http://www.medsite.com/http://www.medsite.com/http://www.medsite.com/http://www.medsite.com/http://www.medsite.com/http://www.medsite.com/http://www.medsite.com/http://www.medsite.com/8/10/2019 e Commerce Russ
28/32
Answer: C2C
Difficulty level: Medium
Page: 43Response: C2C involves individuals selling to individuals.
113. This basic type of e-commerce (__________) involves the sale of a product
or service from one business to another.Answer: B2B
Difficulty level: Medium
Page: 43Response: B2B involves the sale of a product or service from one businessto another.
114. Web __________ are virtual stores for B2C electronic commerce.
Answer: storefrontsDifficulty level: Medium
Page: 43Response: Web storefronts are virtual stores for B2C electronic commerce.
115. In a Web __________, sellers post descriptions of products at a Web siteand buyers submit bids electronically.
Answer: auction
Difficulty level: MediumPage: 43
Response: In Web auctions, sellers post descriptions of products at a Web
site and buyers submit bids electronically.
116. Auction __________ sites sell a wide range of merchandise directly to
bidders. These sites operate like a traditional auction.
Answer: houseDifficulty level: Medium
Page: 44Response: Auction house sites sell a wide range of merchandise directly to
bidders.
117. __________ cash is the Internets equivalent to traditional cash.Answer: ElectronicDifficulty level: Medium
Page: 43
8/10/2019 e Commerce Russ
29/32
Response: E-cash is also known as cybercash and digital cash.
118. Web __________ are specialized programs that make using the Internet
and the Web easier and safer.Answer: utilitiesDifficulty level: Medium
Page: 45Response: Web utilities are programs that make working with the Web and
the Internet easier and safer.
119. __________ is an Internet standard that allows you to connect to another
computer (host) on the Internet and to log on to that computer as if you were
on a terminal in the next room.Answer: Telnet
Difficulty level: MediumPage: 46
Response: Telnet is the Internet standard that supports this task.
120. __________ is an Internet standard for transferring files.Answer: FTPDifficulty level: Medium
Page: 46
Response: FTP is an Internet standard for transferring files.
121. __________ is the ability to copy files to your computer from the Internet.
Answer: DownloadingDifficulty level: MediumPage: 46
Response: Downloading is the process of copying files to your computer
from the Internet.
122. A(n) __________ is a program that is automatically loaded with a Web
browser and provides additional capabilities to see multimedia content.
Answer: plug-inDifficulty level: Medium
Page: 46Response: Plug-ins are programs that are automatically loaded and operateas a part of your browser.
8/10/2019 e Commerce Russ
30/32
123. A __________ allows an individual to block selected sites that cannot be
browsed.Answer: filterDifficulty level: Medium
Page: 47Response: Filters are used to block access to selected sites.
Essay
124. List three commercial Internet service providers.
Answer: Three Internet service providers are national service providers
(AOL), regional service providers, and wireless service providers.Difficulty level: Hard
Page: 32
125. Label and define the elements of a typical e-mail message.Answer: A typical e-mail message has three basic elements: header,
message, and signature. The header appears first and typically includes theaddress, subject and any attachments. The letter or message comes next andis typically short and to the point. The signature line provides additional
information about the sender. Typically, this information includes the
sender's name, address, and telephone number.
Difficulty level: MediumPage: 32
126. Explain the parts of a URL.Answer: URLs are addresses of Web resources. The first part is the
protocol. The protocol http:// is by far the most common. The second partpresents the domain name or the name of the server where the resource islocated, and the type of domain (org, net, gov, edu).
Difficulty level: Medium
Page: 32
8/10/2019 e Commerce Russ
31/32
127. Differentiate between a mailing list and a newsgroup.
Answer: Newsgroups use a special network of computers called the
UseNet. Members of a mailing list communicate by sending e-mail to a listaddress.
Difficulty level: HardPage: 36
128. Explain how a chat group differs from instant messaging.
Answer: Chat groups allow direct live communications. To participate,
the user joins a chat group, selects a channel (topic) and communicates livewith others. Others see the typed message and respond in the samemanner. Instant messaging also allows one or more people to communicate
via direct, live communications. The user has greater flexibility and
control, however. The user specifies a list of friends with an instantmessaging service. When the user connects to the Internet, the software
notifies the contacts that this user is online and in turn notifies this user as towho else is online. Messages can then be sent back and forth.
Difficulty level: HardPage: 36
129. Describe what is meant by lurking on the Internet.Answer: Lurking describes the process of reading posts to a discussion
group before you post one of your own.
Difficulty level: MediumPage: 37
130. Describe what electronic commerce is, and explain the three basic types.Answer: E-commerce is the buying and selling of goods over theInternet. There are three basic types of electronic commerce: business-to-
consumer, consumer-to-consumer, and business-to-business. Web
storefronts are virtual stores for business-to-consumer (B2C) electroniccommerce. Shoppers visit the stores on the Web to inspect merchandise and
make purchases. Web storefront creation packages or commerce servers areevolving to help businesses create virtual stores. These packages create Web
sites that allow visitors to register, browse, place products into virtual
shopping carts, and purchase goods and services. Web auctions are similarto traditional auctions except that buyers and sellers seldom, if ever, meet
face-to-face. Electronic payment options include credit card, check, andelectronic cash or e-cash.Difficulty level: Medium
8/10/2019 e Commerce Russ
32/32
Page: 42
131. Telnet and FTP are Internet standards. Describe each of these concepts.Answer: Telnet is the Internet service that helps you to connect to anothercomputer on the Internet and log on to that computer as if you were on a
terminal in the next room. FTP is an Internet service for transferringfiles. Many computers on the Internet allow you to copy files to your
computer, called downloading. You can also use FTP to copy files from
your computer to another computer on the Internetcalled uploading.Difficulty level: MediumPage: 46
132. What is a "plug-in?"
Answer: A plug-in is a program that automatically loads with your browserand gives your browser additional capabilities.
Difficulty level: MediumPage: 46
133. Explain the function and necessity for filters on the Internet.
Answer: Filter programs allow individuals to block out access to selected
Internet sites. Filters allow parents as well as organizations to block outsites and set time limits. Filters can prevent children from roaming freely on
the Internet.
Difficulty level: Medium
Page: 47
Top Related