McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Center | Instructor Center | Information Center | Home
Making IT Work Videos
Tips
On the Web Explorations
The Buzz in IT
Interactive Companion
Competencies
Multiple Choice Quiz
True or False
Puzzlers
Flashcards
Using Technology
Feedback
Help Center


Computing Essentials 2002-2003 Intro, 14/e
Timothy J. O'Leary
Linda I. O'Leary

The Internet, the Web, and Electronic Commerce

Multiple Choice

Click on the correct response for each question below.



1

The Internet has its beginnings in a project launched in 1969 called:
A)Advanced Research Project Agency Network (ARPANET).
B)World Wide Web (WWW).
C)Connection Research Network (CERNet).
D)International Network Project.
2

One of the following is not a type of Internet service provider.
A)National service provider
B)Regional service provider
C)World wide service provider
D)Wireless service provider
3

The browser uses this to connect to the location or address of Internet resources.
A)Web protocol
B)Website pointer
C)Domain code
D)Uniform resource locator
4

Specialized programs that assist users in locating information on the Web are called:
A)information engines.
B)web browsers.
C)resource locators.
D)search engines.
5

The buying and selling of goods over the Internet is known as:
A)e-buying.
B)e-commerce.
C)e-selling.
D)e-business.
6

Online versions of auctions and classified ads are examples of this type of electronic commerce.
A)Consumer-to-consumer (C2C)
B)Business-to-consumer (B2C)
C)Business-to-business (B2B)
D)Web storefronts
7

_________ is the Internet’s version of secure cash that can be used for purchases.
A)Web money
B)Cybercash
C)Cybercredit
D)Online cash
8

The web utility that allows a user to log on to another computer across the Internet is called:
A)plug-in.
B)telnet.
C)connecter.
D)push product.
9

Programs that block access to selected websites are called:
A)browsers.
B)channels.
C)filters.
D)add-ons.
10

Typical firewalls make use of a special computer called a ________ that evaluates the source and content of all communications or files passing through it and decides if the data is safe.
A)off-line server
B)extranet server
C)false server
D)proxy server




McGraw-Hill/Irwin