This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: 13. Electronic mailing lists of e-mail addresses of people who are interested in a certain topic or area of interest are known as _______________. 14. What are plug-ins and list a few examples. 15. Facebook, MySpace, and Friendster are considered ______________. 16. What are some of the typical indications that a web site is secure? 17. What does the term URL stand for? 18. In the URL http://cis.cuyamaca.edu, the portion labeled http is the ___________. 19. In the URL http://cis.cuyamaca.edu, the portion labeled edu is the ___________. 20. What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser? 21. The adware programs that are more intrusive and transmit information about you without your knowledge are considered ___________. 22. What is a breadcrumb trail? 23. Where does a browser keep the information of the Web sites that you have visited?...
View Full Document
This note was uploaded on 05/20/2010 for the course CIS 110 taught by Professor Raney during the Spring '10 term at Grossmont.
- Spring '10