Chapter 4 Web They Were A library Browsing The Shelves

Document Type
Test Prep
Book Title
Guide to Parallel Operating Systems with Windows 7 and Linux (Networking) 2nd Edition
Authors
Ron Carswell, Shen Jiang, Terrill Freese
Chapter 4: Installing and Configuring Applications
TRUE/FALSE
1. Fedora 13 provides a System Information tool that resembles the one in Windows 7.
2. The Firefox browser in Fedora 13 is very similar to Internet Explorer.
3. A valid digital signature guarantees that the software is without problems.
4. Third-party cookies are stored by a Web server from the same Internet domain.
5. When installing ActiveState Perl in Fedora 13 you use the same installation options as Windows 7.
MULTIPLE CHOICE
1. In Windows 7, the ____ provides summary information for your computer.
a.
System Information tool
c.
Resource Kit
b.
Windows Support
d.
Network Diagnostics
2. When using the Fedora 13 System Information tool, click ____ to review the mounted drives.
a.
Input Devices
c.
Resources
b.
Storage
d.
Operating System
3. ____ sites - pages with links to a variety of information - are useful tools for getting around the
Internet.
a.
Gateway
c.
Portal
b.
Favorite
d.
History
4. In the Firefox Web browser, you can move from one Web page to another by clicking the ____.
a.
toolbars
c.
menus
b.
hyperlinks
d.
scroll bars
5. A(n) ____ is a piece of software that automatically follows hyperlinks from one document to the next
around the Web.
a.
bot
c.
linker
b.
indexer
d.
compiler
6. When using a Web search engine, use the ____ character to include other keywords that you would
expect to find in relevant documents.
a.
*r
c.
-
b.
+
d.
&
7. ____ is a feature in Internet Explorer that helps you avoid malware sites when you browse the Web.
a.
SmartScreen Filter
c.
Scripting
b.
InPrivate Browsing
d.
Content Advisor
8. You can customize Internet Explorer to fit your preferences using settings in the ____ tab of the
Internet Options dialog box.
a.
Privacy
c.
Connections
b.
Content
d.
General
9. You can set up security ____ from the Security tab of the Internet Options dialog box.
a.
regions
c.
protocols
b.
zones
d.
environments
10. When you first install Internet Explorer 8, it corrals all Web sites into the Internet zone and stands
guard with a ____ level of security.
a.
Low
c.
Medium-high
b.
Medium
d.
High
11. You define the location of the security zones relative to the ____.
a.
firewall
c.
local server
b.
proxy server
d.
remote Web server
12. ____ are software components that interact with each other in a networked environment.
a.
ActiveX controls
c.
Crawlers
b.
Cookies
d.
Bots
13. ____ cookies are deleted when you close your browser.
a.
Persistent
c.
Remote
b.
Local
d.
Session
14. By default, all ratings in the Internet Explorer Content Advisor are set to Level ____.
a.
0
c.
2
b.
1
d.
3
15. You exchange certificates with servers using a secure transmission protocol, which provides ____ and
unaltered information.
a.
decrypted
c.
deciphered
b.
encrypted
d.
plain text
16. Use the ____ tab of the Internet Options dialog box to set up an Internet connection and configure
LAN settings.
a.
Programs
c.
Connections
b.
General
d.
Content
17. You can use the ____ menu in Firefox to customize toolbars, the status bar, sidebars, text size, and
other particulars.
a.
Bookmarks
c.
Go
b.
View
d.
Tools
18. In Firefox, cookies usually expire in ____ days if you keep them.
a.
seven
c.
30
b.
10
d.
45
19. The ____ options in Firefox refer to navigation and security features.
a.
Advanced
c.
General
b.
Web Features
d.
Privacy
20. Most applications are ____ to reduce the size of the setup file.
a.
compiled
c.
compressed
b.
compacted
d.
condensed
21. Scripts used in ActiveState Perl have a file extension of ____.
a.
perl
c.
pl
b.
prl
d.
asp
COMPLETION
1. A(n) ____________________ is any program designed to perform a specific function directly for the
user or, in some cases, for another program.
2. Each page on a Web is designated by an Internet address known as a(n) ____________________.
3. A(n) ____________________ acts as a protective boundary between the internal networks and the
outside world.
4. To verify identities on the Web, Internet Explorer uses industry-standard digital
____________________.
5. ____________________ is a Web feed technology introduced in Internet Explorer 8 that allows you to
subscribe to certain portions of a Web page.
MATCHING
Match each item with a statement below.
a.
Web browser
f.
cookies
b.
Certification Authority (CA)
g.
Perl
c.
JavaScript
h.
Platform for Privacy Preferences (P3P)
d.
proxy server
i.
search engine
e.
hyperlink
1. Takes you to a different URL that indicates a different location on the Web.
2. Uses automated software programs to survey the Web and find the information you want.
3. Small files that collect and store personal information about you and your Web-surfing preferences.
4. Acts as intermediaries between computers and the Internet, and filter access to Web sites.
5. Controls how personal information is used by the Web sites you visit.
6. Investigates the identity of organizations and people who obtain certificates.
7. A scripting language that enables interactive functionality in Web pages.
8. A highly capable, feature-rich programming language.
9. A software program that you use to access and navigate the Web.
SHORT ANSWER
1. How is the Help and Support Center used in Windows 7?
2. Compare the activity of reading a book to viewing Web pages in a browser.
3. How do search engines work?
4. Why is preserving the security of your computer when you browse the Web like a balancing act?
5. Describe at least three ways that Internet Explorer can handle cookies after you configure privacy
settings.
6. How does the Internet Content Rating Association (ICRA) system for labeling Web content work?
7. Describe a three-step process for encrypting messages with a public key and decrypted them with a
private key.
8. How is the Programs tab of the Internet Options dialog box used?
9. Why is it important to periodically clear caches used by Firefox to protect your computer?
10. Describe three Web sites behavior rules you can configure using the Content options in Firefox to
protect your computer.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.