A ____ network is used when a user wants to make his or her computer and others’ computers available for access.
What is peer-to-peer?
100
A spider is also called a ___.
What is a Bot?
100
___ is also called the “read-only web."
What is Web 1.0?
100
____ refers to online services that support social interaction and publishing.
What is Social media?
100
Don’t open ___ from untrusted sources.
What are email attachments?
200
___ acts as a Web page address, incorporating the domain name of the Web server and the location of the Web page file on the server.
What is a URL?
200
Information is retrieved by search engine spiders and used to create the search engine’s indexed ___.
What is database?
200
___ is an online encyclopedia resource that encourages contributors to include links that support research on any topic.
What is Wikipedia?
200
A corporate dashboard is an example of a ___.
What is a vertical portal?
200
A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.
What is a Zombie?
300
___ delivers a variety of computing resources from the Internet as a service for free or for a fee, to relieve users from the burden of installing, maintaining, and securing those resources themselves.
What is Cloud Computing?
300
___ is an online community taking journalism into its own hands.
What is social or citizen journalism?
300
Interactive websites are an example of ___.
What is Web 2.0?
300
If you know ____, you can even add custom code to your Weebly Web site.
What is HTML?
300
A ____ may be used to filter data that may be undesirable.
What is a firewall?
400
Data ____ travel over the Internet from router to router until reaching their destinations.
What are Packets?
400
When using the Google search engine, ____ determines the order in which your results appear.
What is the PageRank algorithm?
400
Legitimacy of information and privacy are some of the challenges of ___.
What is Web 2.0?
400
A single entry in your blog is known as a(n) ____.
What is a Post?
400
When using a public Wi-Fi network, when is it safe to send private information over the network?
What is Never?
500
The ____ bill demonstrated the conflict between Internet snooping and Internet user privacy.
What is SOPA?
500
A(n) ____ is useful when you need to get more specific results from your Web search.
What is advanced search?
500
Web 3.0 will be a “read-write-execute” web that will include ___.
What is Semantic Markup?
500
___ is an application in which all or some parts of the software are downloaded from the Web each time it is run.
What is a Web Application?
500
To protect your wireless devices and the information they hold, you should set up encryption such as ____.