E-Commerce Chapter 2 Test Bank Solution Manual (Graded A+)
2 views 0 purchase
Course
E-Commerce Chapter 2
Institution
E-Commerce Chapter 2
E-Commerce Chapter 2 Test Bank Solution Manual (Graded A+)
Networks of computer and the Internet that connects them to each other form the basic technological structure that underlies virtually all electronic commerce. - Answers True
The USENET was the earliest of the networks that eventually com...
E-Commerce Chapter 2 Test Bank Solution Manual (Graded A+)
Networks of computer and the Internet that connects them to each other form the basic technological
structure that underlies virtually all electronic commerce. - Answers True
The USENET was the earliest of the networks that eventually combines to become what we now call the
Internet. - Answers False
E-mail was born in 1972 when a researcher wrote a program that could send a receive messages over
the Defense Department network. - Answers True
The first e-mail mailing lists appeared on military and education research networks. - Answers True
A network of computers that are located in the same building is called a wide area network. - Answers
False
The Internet provides a high degree of security in its basic structure. - Answers False
Extranets were used to save money and increase efficiency by replacing traditional communication tools
such as fax, telephone, and overnight express document carriers. - Answers True
The word "virtual," used as a part of virtual private networks means that the network connection is
permanent. - Answers False
An intranet extends beyond the organization that created it. - Answers False
Virtual private network software must be installed on the computers at both ends of a transmission. -
Answers True
Public networks, private networks, and VPNs are independent of organizational boundaries. - Answers
True
IP addresses appear as five decimal numbers separated by periods. - Answers False
Simple Mail Transfer Protocol (SMTP) is a common protocol used for sending and retrieving e-mail. -
Answers True
Post Office Protocol (POP) allows the user to view only the header and the e-mail sender's name before
deciding to download the entire message. - Answers True
The Post Office Protocol (POP) provides support for Multipurpose Internet Mail Extensions. - Answers
True
At a technological level, the Web is nothing more than software that runs on computers that are
connected to the Internet. - Answers True
The Semantic Web project envisions words on Web pages being tagged with their meanings. - Answers
True
, An HTML document is similar to a word-processing document in that it specifies how a particular text
element will appear. - Answers False
The leftmost part of a domain is called a top-level domain (TLD). - Answers False
The Internet Corporation for Assigned Names and Numbers (ICANN) has the responsibility of managing
domain names and coordinating them with the IP address registrars. - Answers True
The most important parts of a Web page are the graphics, photographs, and small programs that run in
the Web browser. - Answers False
SGML offers a system of marking up documents that is independent of any software application. -
Answers True
The term "cascading" is used in cascading style sheets because designers can apply many style sheets to
the same Web page, one on top of the other. - Answers True
The higher the bandwidth, the faster the transmission of data through a communication medium. -
Answers True
A hierarchical hyperlink structure resembles conventional paper documents in that the reader begins on
the first page and clicks the Next button to move to the next page in a serial fashion. - Answers True
The combination of telephone lines and the closed switches that connect them to each other is called a
____. - Answers Circuit
Files and e-mail message sent over the Internet are broken down into small pieces called ______ -
Answers Packets
The computer that decides how to best forward each packet from on network to another are called
______. - Answers Routers
The programs on gateway computers that determine the best path on which to send each packet
contain rules called _____. - Answers Routing Algorithms
A _____ is a permanent telephone connection between two points. - Answers Leased Line
_____ creates a private passageway through the public Internet that provides secure transmission from
one computer to another. - Answers IP tunneling
_____ is a connection that uses public networks and their protocols to send data using a technology
called IP tunneling - Answers Virtual Private Network
A _____ is a collection of rules for formatting, ordering, and error checking data sent across a network. -
Answers Protocol
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TutorJosh. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $4.99. You're not tied to anything after your purchase.