Question

Question 1 ​ A URL is a ____-part addressing scheme a. ​two b. ​four c. ​three...

Question 1

  1. ​ A URL is a ____-part addressing scheme

    a.

    ​two

    b.

    ​four

    c.

    ​three

    d.

    ​one

Question 2

  1. ​ A text file that contains HTML tags is called a(n) ____.

    a.

    ​server

    b.

    ​HTML document

    c.

    ​browser

    d.

    ​IP address

Question 3

  1. ​ A(n) ____ comes into existence as soon as a work is placed into a tangible form.

    a.

    ​open-source project

    b.

    ​copyright

    c.

    ​reproduction notice

    d.

    ​lien

Question 4

  1. ​ A(n) ____ is a small file that a web server writes to the disk drive of the client computer, containing information about the user.

    a.

    ​wafer

    b.

    ​biscuit

    c.

    ​cookie

    d.

    ​triffle

Question 5

  1. According the Radicati Group, approximately ____% of all email messages sent every day are spam.

    a.

    ​50

    b.

    ​40

    c.

    ​75

    d.

    ​90

Question 6

  1. ​ All of the following are popular choices for virus protection EXCEPT _____.

    a.

    ​ZoneAlarm

    b.

    ​McAfee Intel Security

    c.

    ​SpamBeGone

    d.

    ​Symantec

Question 7

  1. ​ All of the following are ways to use Chrome efficiently EXCEPT:

    a.

    ​use the shift key and the spacebar to scroll up one page

    b.

    ​use the control key and the + key to zoom in

    c.

    ​use the space bar to scroll down one page

    d.

    ​use the control key and the = key to zoom to the original page view

Question 8

  1. ​ Copying and pasting contents of a received message into a new message allows you to ____.

    a.

    ​remove viruses embedded in the text

    b.

    ​see who received a Bcc of the original message

    c.

    ​forward a message while maintaining the privacy of the original sender

    d.

    ​all of the above

Question 9

  1. ​ Ctrl + S in most browsers allows you to save a webpage in all of the following formats EXCEPT:

    a.

    ​webpage complete

    b.

    ​webpage HTML only

    c.

    ​text file

    d.

    ​webpage, no ads

Question 10

  1. ​ Edge includes a _____ feature that allows users to manage their online reading.

    a.

    ​Library

    b.

    ​Reading List

    c.

    ​Bookshelf

    d.

    ​Read Now

Question 11

  1. ​ Edge includes a _____, which is a streamlined and less cluttered view that allows readers to focus on the selected material

    a.

    ​Reading View

    b.

    ​NewsPrint View

    c.

    ​Reduced View

    d.

    ​Book View

Question 12

  1. ​ Edge uses the _____ search engine as its default.

    a.

    ​Google

    b.

    ​Bing

    c.

    ​Ask.com

    d.

    ​Yahoo

Question 13

  1. ​ Even though U.S. law has a(n) ____ provision that allows students to use limited amounts of copyrighted information in term papers, you should always cite your sources.

    a.

    ​lien

    b.

    ​escape clause

    c.

    ​Freedom of Information Act

    d.

    ​fair use

Question 14

  1. ​ Firefox allows for easy drag-and-drop modifications to its _____.

    a.

    ​history list

    b.

    ​navigation list

    c.

    ​menu

    d.

    ​address bar

Question 15

  1. ​ Firefox is an open-source software, which means that Mozilla has given others the right _____.

    a.

    ​study its code

    b.

    ​modify its code

    c.

    ​all of the above

    d.

    ​distribute its code

Question 16

  1. ​ Firefox uses _____ to enhance and extend its functionality.

    a.

    ​add-ons

    b.

    ​apps

    c.

    ​web enhancers

    d.

    ​extensions

Question 17

  1. ​ Google’s browser is called ____.

    a.

    ​Chrome

    b.

    ​Safari

    c.

    ​Firefox

    d.

    ​Opera

Question 18

  1. ​ HTML stands for ____.

    a.

    ​HotMail

    b.

    ​Hypertext Media Language

    c.

    ​Hypertext Markup Language

    d.

    ​Hex Traffic Media Link

Question 19

  1. ​ If you receive an email message from a sender that you don’t recognize and the message contains an attached file, you should ____.

    a.

    ​only open the file in the evenings, when malicious code is less virulent

    b.

    ​contact the local police so they can run a trace on the email

    c.

    ​immediately delete the email and reboot the computer

    d.

    ​avoid opening the file until you are sure that it doesn’t contain a virus

Question 20

  1. ​ If you type nbc.com in the Address bar, your browser will convert it to ____ and load the home page at that URL.

    a.

    ​ftp://nbc.com

    b.

    ​http://www.nbc.com

    c.

    ​ftp://nbc.net

    d.

    ​http://www.nbc.com.home

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer:

1)  four
2)  HTML document
3)  copyright
4)  cookie

As per the guidelines we are only allowed to answer first 4 questions per post Please post remaining questions in a new post

Add a comment
Know the answer?
Add Answer to:
Question 1 ​ A URL is a ____-part addressing scheme a. ​two b. ​four c. ​three...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Hi, i was testing the first part of the question with this code and failed to download the web pa...

    Hi, i was testing the first part of the question with this code and failed to download the web page, may i know the mistakes? While you're at it, could you display the full answer to the questions as well. I have just started taking this course and this question is from my second assignment. Thanks :) The W3Schools Tag Reference Task 1.1 (1 point) Recreate this webpage A sweet download page mocku This link to task1-1.html (this file) will...

  • Perform all of the following steps using Notepad to complete this assignment: 1) Begin by creating...

    Perform all of the following steps using Notepad to complete this assignment: 1) Begin by creating a new file in your text editor and include all of the basic HTML code like you did in your previous assignments. Or you can simply make a copy of your HTML file from last week and name the new copy LastFirstAssignment7.html (where “Last” is your last name and “First” is your first name), but be careful not to overwrite your file from last...

  • JUDY'S HTML TUTORIAL MENU CREATING YOUR FIRST WEB PAGE The best way to make a web...

    JUDY'S HTML TUTORIAL MENU CREATING YOUR FIRST WEB PAGE The best way to make a web page is to just dive right in. Open Notepad. To open notepad in Windows, click the windows icon in the lower left corner of the screen and then type "notepad." Notepad is a text editor. Other text editors you may consider are TextPad, Sublime Text, or NotePad++. Do not use Word or WordPad; they are word processors. If you are using an Apple computer...

  • Part - Web Server Setup and Demonstration (AJ Objective The objective of this assignment is to...

    Part - Web Server Setup and Demonstration (AJ Objective The objective of this assignment is to some HTTP as application layer protocol and TCP as reliable transport layer protocol HTTP is carried by TCP. Also, in the assignment you will investigate the working of client-server mechanism from both application and networking perspective There are several different ways to setup an HTTP server, including through Apache Tomcat, Apache Glassfish that integrales in an IDE such as Eclipse/NetBeans or even a browser...

  • QUESTION 2 Ensuring that data is genuine, meaning that the sender of the data is who...

    QUESTION 2 Ensuring that data is genuine, meaning that the sender of the data is who they say they are, that the data received is the data that the sender meant to send, and that the receiver is who they say they are a. confidentiality b. authentication c. non-repudiation d. integrity 2 points    QUESTION 3 Cryptography method that uses a single key for both encryption and decryption a. prime factorization b. asymmetric c. symmetric d. message authentication code 2...

  • Question 1 To remove the underlining from an <a> element, you can use CSS to set...

    Question 1 To remove the underlining from an <a> element, you can use CSS to set its A. text-decoration property to none B. text-decoration property to off C. underline property to none D underline property to off Question 2 You can use the CSS list-style-type property to change A. the bullet style in an unordered list B the number style in an ordered list C the terms style in a description list Dthe bullet or number style in an unordered...

  • Question 1 To remove the underlining from an <a> element, you can use CSS to set...

    Question 1 To remove the underlining from an <a> element, you can use CSS to set its A. text-decoration property to none B. text-decoration property to off C. underline property to none D underline property to off Question 2 You can use the CSS list-style-type property to change A. the bullet style in an unordered list B the number style in an ordered list C the terms style in a description list Dthe bullet or number style in an unordered...

  • QUESTION 6 When you use URL encoding for session tracking, you must 1. a and b...

    QUESTION 6 When you use URL encoding for session tracking, you must 1. a and b above 2. a, b, and c above 3. convert all HTML pages in the application to JSPs 4. use the encodeURL method to encode all URLs in the servlets 5. use the encodeURL method to encode all URLs in the JSPs QUESTION 7 The best way to develop Java web applications is to use an Integrated Development Environment such as: 1. Foxfire or Netscape...

  • Question 1: Given the following HTML code segment <p>While this is a <b> very basic HTML...

    Question 1: Given the following HTML code segment <p>While this is a <b> very basic HTML document </b>, it actually serves as a detailed example of the document object model. </p> How many text nodes will be added to the DOM tree to represent the structure of text content in this HTML code segment A. 1 B. 2 C. 3 D. 4 Question 2: Assume in an HTML document named “index.html”, the following <script> element is added <script src="grocery.js"></script> This...

  • Which of the following codes is used to provide positioning relative to the nearest container? 1. a) position: fixed b) position: static; c) position: absolute d) position: relative; e) position:...

    Which of the following codes is used to provide positioning relative to the nearest container? 1. a) position: fixed b) position: static; c) position: absolute d) position: relative; e) position: none; 2. What is called a, b and c in a style as "a (b: c; d: e:]"? a) a:selector, b:property, c:value b) a:property, b:selector, cvalue c) avalue, b:selector, c:property d) a:selector, b:value, c:property e) a:property, b:value, c:selector What is the style of command when the CSS code is written...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT