Networks of computer and the Internet that connects them to each other form the basic technological
structure that underlies virtually all electronic commerce. - Answers True
The USENET was the earliest of the networks that eventually combines to become what we now call the
Internet. - Answers False
E-mail was born in 1972 when a researcher wrote a program that could send a receive messages over
the Defense Department network. - Answers True
The first e-mail mailing lists appeared on military and education research networks. - Answers True
A network of computers that are located in the same building is called a wide area network. - Answers
False
The Internet provides a high degree of security in its basic structure. - Answers False
Extranets were used to save money and increase efficiency by replacing traditional communication tools
such as fax, telephone, and overnight express document carriers. - Answers True
The word "virtual," used as a part of virtual private networks means that the network connection is
permanent. - Answers False
An intranet extends beyond the organization that created it. - Answers False
Virtual private network software must be installed on the computers at both ends of a transmission. -
Answers True
Public networks, private networks, and VPNs are independent of organizational boundaries. - Answers
True
IP addresses appear as five decimal numbers separated by periods. - Answers False
Simple Mail Transfer Protocol (SMTP) is a common protocol used for sending and retrieving e-mail. -
Answers True
Post Office Protocol (POP) allows the user to view only the header and the e-mail sender's name before
deciding to download the entire message. - Answers True
The Post Office Protocol (POP) provides support for Multipurpose Internet Mail Extensions. - Answers
True
At a technological level, the Web is nothing more than software that runs on computers that are
connected to the Internet. - Answers True
The Semantic Web project envisions words on Web pages being tagged with their meanings. - Answers
True
, An HTML document is similar to a word-processing document in that it specifies how a particular text
element will appear. - Answers False
The leftmost part of a domain is called a top-level domain (TLD). - Answers False
The Internet Corporation for Assigned Names and Numbers (ICANN) has the responsibility of managing
domain names and coordinating them with the IP address registrars. - Answers True
The most important parts of a Web page are the graphics, photographs, and small programs that run in
the Web browser. - Answers False
SGML offers a system of marking up documents that is independent of any software application. -
Answers True
The term "cascading" is used in cascading style sheets because designers can apply many style sheets to
the same Web page, one on top of the other. - Answers True
The higher the bandwidth, the faster the transmission of data through a communication medium. -
Answers True
A hierarchical hyperlink structure resembles conventional paper documents in that the reader begins on
the first page and clicks the Next button to move to the next page in a serial fashion. - Answers True
The combination of telephone lines and the closed switches that connect them to each other is called a
____. - Answers Circuit
Files and e-mail message sent over the Internet are broken down into small pieces called ______ -
Answers Packets
The computer that decides how to best forward each packet from on network to another are called
______. - Answers Routers
The programs on gateway computers that determine the best path on which to send each packet
contain rules called _____. - Answers Routing Algorithms
A _____ is a permanent telephone connection between two points. - Answers Leased Line
_____ creates a private passageway through the public Internet that provides secure transmission from
one computer to another. - Answers IP tunneling
_____ is a connection that uses public networks and their protocols to send data using a technology
called IP tunneling - Answers Virtual Private Network
A _____ is a collection of rules for formatting, ordering, and error checking data sent across a network. -
Answers Protocol