browsers
computer programs that display info found on the web
E-commerce
online purchases and financial transactions on the Web
encryption
used when a message is written i n a secret code
hypertext transfer protocol (http)
the Internet protocol used to transfer files over the Web
net neutrality
users not discriminated against due to amount/ nature of data they transfer
portals
web pages that users launch when they first log on to the web
spamming
unsolicited commercial e-mailing
URLs
the addresses of web pages
what is the origin of calling junk email "spam"
because of the Spam skit on the Monty Python Show
a key advantage that internet retailers like Amazon have over "bricks and mortar" retailers is called
the "long tail"
why do some say, "Piracy is not theft"?
b.c the thing "stolen" is not taken away from owner

the recent actions of the FCC in strengthening net neutrality have greatly enhanced the control that companies like Comcast have on our net work infrastructure

IT HAS REDUCED CONTROL

false
the first "killer application" on the internet was
email
to make the internet safer, people should use all of the following EXCEPT
a phishing program
which of the following BEST describes internet portals
user customizable web pages
what law requires libraries and schools to filter out inappropriate content on their computers?
the Childrens Internet Protection Act
____ are a cross b/w a personal web page, diary, and online directory, and a newspaper editorial page
blogs
which country uses standard firewalls and proxy
china
developers of shareware do not claim copyright protection and do not charge mandatory fees for downloading and use
true
what does a DNS do
translates web addresses that people use into addresses the internet uses
it is NOT fair to apply the term convergence to what is happening with the web and conventional media
false
which is NOT owned by google
facebook
cookies
small files that websites leave on their visitor's computers
Local area networks (LANS)
link computers within a department, building, or campus
phishing
online scam
spyware
information the secretly sends info about your online activities
transmission-control protocol/ internet protocol
the basic protocol used by internet
wide area networks (WANS)
computers miles apart
social media are online tools used to communicate with others
false
America Online, the Microsoft Network, and Comcast are ISP's
true

developers of shareware do not claim copyright protection, but do charge fees for downloading and use

THEY DO NOT CHARGE FEES

false
user-manipulated characters in MUDs are called
avatars
____ refers to processing capacity in computer chips doubled about every 18 months
moore's law
jeff bezos designed the 1st graphical Web browser
false
HTML
used to format pages on the web
the first "killer application" on the internet was the web browser
true
according to metcalfe's law, the value of the internet increases rapidly w. the number of users
true
it is fair to say that the Web continues to converge with and compete with conventional media
true

internet2 is synonymous with Web 2.0

IS NOT

false
web 1.0 or the "semantic web" seeks to attach useful indexing labels to online content
false
internet2
a new, faster version of the internet
web 2.o (2 collaborate)
a new way of using the internet for collaboration and sharing of data among individual users
what does a DNS do?
it translates web addresses that people use into addresses the internet uses
the "digital divide" shows that all of the following EXCEPT _____ have been slow to adopt the internet due to socio-eco factors
caucasians
_____ developed Web pages, and _____ offer access to the Internet
content providers// ISP's
a group of students led by Marc Andreessen designed the first graphical Web browser
true
which is NOT a characteristic of the internet?
content on the web is not protected by copyright
all are characteristics of the internet EXCEPT
all info on the internet is free
which of the following is TRUE of ARPANET
it was initially funded by the US governemnt
who are the leaders of the PC market?
lenovo and Hewlett-packard
____ is the "basic" protocol of the internet
TCP/IP
modems
convert digital data to analog signals and vice versa
protocols
technical rules governing data communication
the first ancestor of "the internet" is
ARPANET
about 25 protocols define the internet
false
most common activity on the Internet
checking e-mail
fishing is associated w/ identity theft schemes
false
which of the following is the GREATEST threat to the collaborative free culture of the Internet
corporate abuse @hillaryclinton
ISP's
provide connections to the internet
government intervention in the Internet is problematic because it could
restrain users' civil liberties
Internet Protocol (IP) version 6 vastly increases the number of possible network addresses
true
what is TRUE of ARPANET
it was initially funded by the gvnt
moose's law states that computers double in processing capacity and speed about every 6 months

false

every 8

digital divide
difference in access to computer technologies between the rich and the poor
WE WILL WRITE A CUSTOM ESSAY SAMPLE ON
INTERNET SPECIFICALLY FOR YOU
FOR ONLY $13.90/PAGE