Which is NOT an event associated with the beginning of the Internet?
Amazon.com was one of the first website on the internet.
What do you need if you want to read, send, and organize email from any computer connected to the Internet?
a web-based email account
Which is NOT an example of Web 2.0 technology?
e-mail**blogging**wiki**social networking
Which of the following is NOT a characteristic of a blog?
blogs are private and require password access**blogs are used to express opinions**blogs are generally written by a single author**blogs are arranged as a listing of entries
Which of the following would be the correct classification for Etsy.com?
C2C (consumer-to-consumer)
What is the navigation aid that shows users the path they have taken to get to a web page located within a website?
breadcrumb trail
Which is NOT a component of a search engine?
indexer program**social bookmarking site**subject directory**live bookmark site
When using the internet for research, you?
should evaluate sites for bias and relevance
Which of the following is not an Internet protocol?
ARPANET**HTTP**FTP**BitTorrent
Country codes are what part of a URL?
Top level domain
The internet was created to provide
Both A and Ba: secure form of communicationb: a common commutations means for all computers.
Which of the following describes an IP address?
all of the above**it is referred to as a dotted quad**it identifies a computer connected to internet**it identifies a website
Which of the following is an installed email client?
outlook
What web browser feature would be particularly useful when using public computers?
privacy browsing
In the URL http://www.whitehouse.gov/blog, which part is considered the path or subdirectory?
/blog
Search engines that search other search engines are called?
metasearch engine
T or F: A search engine that searches other search engines is called a SuperSearch engine.
false
T or F: Webcast are only delivered as prerecorded audio and video content
false
T or F: The "s" in HTTPS stands for secure and indicates that the secure sockets layer protocol has been applied to the website.
true
T or F: IP addresses are used to identify computers connected to the Internet.
true