Technology in Action: Ch. 3 assessment // quiz

Which is NOT an event associated with the beginning of the Internet? was one of the first website on the internet.
What do you need if you want to read, send, and organize email from any computer connected to the Internet?
a web-based email account
Which is NOT an example of Web 2.0 technology?

**social networking

We Will Write A Custom Essay Sample On

For Only $13.90/page

order now
Which of the following is NOT a characteristic of a blog?
blogs are private and require password access

**blogs are used to express opinions
**blogs are generally written by a single author
**blogs are arranged as a listing of entries

Which of the following would be the correct classification for
C2C (consumer-to-consumer)
What is the navigation aid that shows users the path they have taken to get to a web page located within a website?
breadcrumb trail
Which is NOT a component of a search engine?
indexer program

**social bookmarking site
**subject directory
**live bookmark site

When using the internet for research, you?
should evaluate sites for bias and relevance
Which of the following is not an Internet protocol?


Country codes are what part of a URL?
Top level domain
The internet was created to provide
Both A and B

a: secure form of communication
b: a common commutations means for all computers.

Which of the following describes an IP address?
all of the above

**it is referred to as a dotted quad
**it identifies a computer connected to internet
**it identifies a website

Which of the following is an installed email client?
What web browser feature would be particularly useful when using public computers?
privacy browsing
In the URL, which part is considered the path or subdirectory?
Search engines that search other search engines are called?
metasearch engine
T or F: A search engine that searches other search engines is called a SuperSearch engine.
T or F: Webcast are only delivered as prerecorded audio and video content
T or F: The “s” in HTTPS stands for secure and indicates that the secure sockets layer protocol has been applied to the website.
T or F: IP addresses are used to identify computers connected to the Internet.