Student Center
|
Instructor Center
|
Information Center
|
Home
Making IT Work Videos
Tips
On the Web Explorations
The Buzz in IT
Interactive Companion
Choose a Chapter
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Competencies
Multiple Choice Quiz
True or False
Puzzlers
Flashcards
Using Technology
Feedback
Help Center
Computing Essentials 2002-2003 Intro, 14/e
Timothy J. O'Leary
Linda I. O'Leary
The Internet, the Web, and Electronic Commerce
Multiple Choice
Click on the correct response for each question below.
1
The Internet has its beginnings in a project launched in 1969 called:
A)
Advanced Research Project Agency Network (ARPANET).
B)
World Wide Web (WWW).
C)
Connection Research Network (CERNet).
D)
International Network Project.
2
One of the following is not a type of Internet service provider.
A)
National service provider
B)
Regional service provider
C)
World wide service provider
D)
Wireless service provider
3
The browser uses this to connect to the location or address of Internet resources.
A)
Web protocol
B)
Website pointer
C)
Domain code
D)
Uniform resource locator
4
Specialized programs that assist users in locating information on the Web are called:
A)
information engines.
B)
web browsers.
C)
resource locators.
D)
search engines.
5
The buying and selling of goods over the Internet is known as:
A)
e-buying.
B)
e-commerce.
C)
e-selling.
D)
e-business.
6
Online versions of auctions and classified ads are examples of this type of electronic commerce.
A)
Consumer-to-consumer (C2C)
B)
Business-to-consumer (B2C)
C)
Business-to-business (B2B)
D)
Web storefronts
7
_________ is the Internet’s version of secure cash that can be used for purchases.
A)
Web money
B)
Cybercash
C)
Cybercredit
D)
Online cash
8
The web utility that allows a user to log on to another computer across the Internet is called:
A)
plug-in.
B)
telnet.
C)
connecter.
D)
push product.
9
Programs that block access to selected websites are called:
A)
browsers.
B)
channels.
C)
filters.
D)
add-ons.
10
Typical firewalls make use of a special computer called a ________ that evaluates the source and content of all communications or files passing through it and decides if the data is safe.
A)
off-line server
B)
extranet server
C)
false server
D)
proxy server
2002 McGraw-Hill Higher Education
Any use is subject to the
Terms of Use
and
Privacy Policy
.
McGraw-Hill Higher Education
is one of the many fine businesses of
The McGraw-Hill Companies
.