This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: 13. Electronic mailing lists of e-mail addresses of people who are interested in a certain topic or area of interest are known as _______________. 14. What are plug-ins and list a few examples. 15. Facebook, MySpace, and Friendster are considered ______________. 16. What are some of the typical indications that a web site is secure? 17. What does the term URL stand for? 18. In the URL http://cis.cuyamaca.edu, the portion labeled http is the ___________. 19. In the URL http://cis.cuyamaca.edu, the portion labeled edu is the ___________. 20. What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser? 21. The adware programs that are more intrusive and transmit information about you without your knowledge are considered ___________. 22. What is a breadcrumb trail? 23. Where does a browser keep the information of the Web sites that you have visited?...
View Full Document
- Spring '10
- World Wide Web, Internet backbone, Internet backbone providers, voice-based Internet communication, recent e-mail scams