Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

EXAM

EXAMS

QuestionAnswer
Address bar to do all of the following click the address book and select a link
Using one browser window for all open pages is called tabbed browsing
Home Page ​The page that opens when you start your browser is called the
A URL is a ____-part addressing scheme Four
​You might customize your Chrome browser using a theme for all of the following EXCEPT: to make searching easier
Web browsers are applications that allow you to navigate and interact with internet content. True
​When computer networks are connected to each other, the system is called a(n) ​internet
​Your browser stores the location of each webpage you visit during a single session in a(n) ​history list
​If you type in the Address bar, your browser will convert it to ____ and load the home page at that URL.
​In Private browsing mode, all of the following are deleted from the computer you are using when you close the file EXCEPT: ​downloads
In the address the domain name is ​www.nytimes.com
​When you do not want information about the websites you visited stored on the hard drive of the computer you are using, you can use the browser’s _____ mode. private browsing
​The address bar in Chrome is called the Omnibox
A cookie is a small text file that a web server saves on the hard drive of the computer that is running the web browser software. True
​Edge includes a _____ feature that allows users to manage their online reading. Reading List
​A text file that contains HTML tags is called a(n HTML document
In Google Chrome, you can use the Bookmark manager to store and organize your saved bookmarks. True
​Edge uses the _____ search engine as its default. ​ Bing
​Firefox is an open-source software, which means that Mozilla has given others the right ​study its code ​distribute its code ​modify its code Correct! ​all of the above
While working in Chrome, if you encounter a webpage in another language, you should ​click the Translate this page icon in the right corner of the omnibox
A ____ usually identifies one person’s email account on a mail server. Username
“Detaching a file” is the phrase often used for saving an email attachment to your computer. True
The ____ protocol specifies how to encode nontext data, such as graphics or sound, so it can travel over the Internet. Mime
An email sender’s local network sends the message to the sender’s mail Server
The CRAM-SPAM law was the first U.S. federal government effort to legislate controls on spam. False
A signature is not optional when sending an email. False
Thanks to improved technology, email attachments no longer contain viruses. False
A group of keyboard characters that, viewed together, represent a human expression is known as a(n) Emoticon
An email user’s account name is also known as his/her domain name False
When forwarding a message, Gmail includes the original message in the message display area and adds a blank line ____ so you can add an optional message to provide context for the recipient. above the original message
“Email” is short for electronic mail
When you click Contacts on the Gmail menu, Google Contacts ​opens in a new tab
In January 2004, the U.S. ____ law went into effect. CAN-SPAM
A ____ might appear at the bottom of an email message and contain standard information about the sender Signature
Spam consumes large amounts of network capacity ​distracts employees and wastes their time ​may include content that is offensive or misleading Correct! ​all of the above
Some search engines can search for images that resemble an image uploaded by the user. True
Link rot refers to webpages that contain an excessive number of hyperlinks False
It is possible for a legitimate not-for-profit company to be using a .com domain rather than .org. True
A _____, or spider, is a search engine program that automatically searches the web to find new websites and update information about old websites. Web robot
​A spider is a program that automatically searches the web to find new websites. True
The term “web” is an abbreviation for _ World wide web
In terms of using search engines, another word for “query” is ​search expressions
The procedure of converting a natural language question into a search expression is called Parsing
Regarding search engines, the term “search expression” means something different from the term “query.” False
A not-for-profit organization will usually -- though not necessarily -- use the _____ domain. Org
A webpage indexed in a search engine’s database containing text matching a query is called a(n) Hit
​Search engines usually label paid placement links as “paid.” False
​the number of high-quality back links that the webpage provides Page rank is determined by
To develop an opinion about the quality of a resource, you can evaluate four elements of any webpage: the webpage’s authorship, ownership, content, and appearance. True
In the United States, intellectual property is protected through patents ​trademarks ​trade secrets Correct! ​all of the above
Due to their large size, digital audio books have been slow to gain popularity. False
​In the U.S., a work that was created in 2000 by an individual author who died in 2005 will be protected by copyright until 2075
Employment websites such as careerbuilders.com make money by ​charging employers who post a job listing a fee
Fair use of copyrighted work includes using it for ___ ​criticism
is a general term that includes all products of the human mind, including original ideas. ​Intellectual property
Which of the following focuses on information related to disease identification, control, and prevention? ​cdc.gov
One website that offers full-text copies of works no longer protected by copyright is ​Project Gutenberg
In the U.S., ____ laws allow people to use copyrighted works under some conditions. Fair Use
____ is a combination of online research tools that provides online-based information services in subject areas such as business, science, engineering, finance, and law and in a format to meet the needs of a wide range of users. ​ProQuest Dialog
When a copyright for a work has expired, the work is then said to be in the ​public domain
E-commerce stands for ​electronic commerce
All DOI numbers begin with ____ followed by a prefix of a unique combination of four or more digits, then a slash, and finally a suffix that is any alphanumeric combination that identifies the publisher. 10
If you own a stationery store and you buy your supplies from a large distribution company, you are participating in _____ e-commerce. B2B
Sometimes the link to subscribe to feeds is a text link with the letters “____” to indicate the file format of the syndicated content. ​RSA RSS
When the Usenet News Service began operating, the only way to read or post articles to newsgroups was to install and run a software program called a ​newsreader
was the first to make APIs available to other developers Amazon
The addition of a Web camera (also called a ____) enables users to participate in a video chat, in which participants can see and speak to each other. Webcam
VoIP is an acronym for Voice over Internet Protocol
Facebook has a large number of active users, and more than ____ of its users check their Facebook pages daily.​ 65%
Unlike ______, which is a social network open to business professionals, _____ is a social networking site restricted to credentialed physicians. ​LinkedIn/Sermo
encryption uses a single key that both the sender and receiver know ​Private-key
A web bug is an example of spyware because _ ​the clear GIF and its actions are hidden from the user
A digital ID is purchased from ​a certificate authority
The Ad-Aware Free ad blocker detects adware and eliminates ​malware threats
Webpages secured by SSL have URLs that begin with _ ​​​
provides wireless broadband connections at very fast speeds LTE
​how compatible Bluetooth devices establish their connection with each other Pairing
​a program used to illegally monitor activity on a wireless network in order to obtain personal information Sniffer
​a device that permits communication between wired and wireless networks so wireless clients and receive and send data ​access point
​when a hacker with special software gains access to a Bluetooth-enabled device without the victim’s knowledge BlueSnarfing
​If you have both WPA and WEP available to you, your system will be most secure if you use ____. ​WPA only
A wireless device’s ____ refers to the physical distance between the access point and the wireless device. ​range
​An SSID may contain up to ____ alphanumeric characters. 32
The Internet of Things (IoT) uses _____ to collect and transmit data using wireless connections so that data can be acted upon by a person or another machine. ​sensors
​The following is an example of hacking: ​Unauthorized access to information being sent over a wireless network
3.5G wireless networks are also called mobile broadband
​In a(n) ____ attack, a hacker sets up a computer to act as a legitimate access point, and then steals personal information from users trying to connect to it. ​evil twin
the term for driving through a neighborhood with a wireless-enabled notebook looking for unsecured wireless networks. ​Wardriving
​By default, most wireless networks are ​left unsecured
​A bulleted list is also known as a(n) ____ list. unordered
​A commonly used option for making filenames easier to read is to separate words with the ____ character. ​_
Tags that are included within other tags are called ____ tags. ​nested
​The “center” value of the align attribute is ____ in XHTML. ​deprecated
The text editor installed with Windows is called NotePad
A ____ language is a general term that indicates the separation of the formatting of a document and the content of a document. ​markup
​Companies that sell only on the web are sometimes called ____ companies. ​dot-com
​Online travel sites such as Expedia and Travelocity also earn commissions from transportation and lodging providers in the form of fees for each ____ their website. reservation made through
​A user’s ____ is a record of the links clicked by a user while visiting a website. ​clickstream
Created by: haileylynn
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards