This Study Guide is organized with questions
grouped as follows: MC and Matching. The questions are drawn from questions at the end of each
chapter, the author’s Test Bank, and lecture. This constitutes the “test
bank” for Quiz 4.
Select answers using the pull-down windows in the boxes to left of
each question (do not use roller-wheel on mouse as it will shift answers). All questions
have equal weight. When completed, select the "Check Answers" button at the
bottom of the Webpage. Results are returned only to you. You may change selections
anytime prior to completing Study Guide and you may take as often as desired. Multiple Choice Identify the letter of the choice that best
completes the statement or answers the question.
|
|
1.
|
Chapter 11 Multiple Choice Questions Java can be described as:
a. | a more sophisticated form of JavaScript | b. | an object-oriented
programming language | c. | a language created by
Netscape | d. | none of the above |
|
|
2.
|
JavaScript can be described as:
a. | an object-based scripting language | b. | an easy form of Java | c. | a language created
by Microsoft | d. | none of the above |
|
|
3.
|
Select the true statement from those listed below.
a. | Java applets may be contained in files with the .class extension | b. | Java applets are not
copyrighted | c. | Java applets must be saved in a different folder than web pages | d. | All of the
statements above are true |
|
|
4.
|
The file extensions .avi, .m4v, and .ogv are used for:
a. | audio files | b. | video files | c. | Flash media
files | d. | none of the above |
|
|
5.
|
_______ is a JavaScript library intended to simplify client-side
scripting:
a. | Ajax | b. | jQuery | c. | Flash | d. | Java |
|
|
6.
|
Use the _______ attribute on a <video> tag to display user controls for
the video player.
a. | poster | b. | player | c. | controls | d. | image |
|
|
7.
|
Select the void element that can configure a Flash .swf on a web page:
a. | <script> | b. | <embed> | c. | <object> | d. | <img> |
|
|
8.
|
When displaying a Java applet, the browser invokes the _______ to interpret the
bytecode into the appropriate machine language.
a. | Java Virtual Machine (JVM) | b. | JavaScript interpreter | c. | Windows operating
system | d. | Java Compiler |
|
|
9.
|
The _______ defines every object and element on a web page.
a. | Document Object Model | b. | Browser | c. | Operating
System | d. | None of the above |
|
|
10.
|
Select the technology that was developed by a joint effort between Netscape and
Sun Microsystems.
a. | Java | b. | JavaScript | c. | Flash | d. | Ajax |
|
|
11.
|
Select the term below which is a protocol that provides a method for software
components to communicate, interact, and share data.
a. | JavaScript | b. | Application Programming
Interface | c. | Java | d. | Canvas |
|
|
12.
|
Use the _______ attribute on a <video> tag to display an image that
represents the movie.
a. | poster | b. | player | c. | controls | d. | image |
|
|
13.
|
Select the term below which names an HTML5 API that allows web page visitors to
share their geographic location.
a. | data | b. | web storage | c. | canvas | d. | geolocation |
|
|
14.
|
The term Ajax stands for____.
a. | Asynchronous Java and ActionScript | b. | Asynchronous JavaScript and
XML | c. | Asynchronous JavaScript and XHTML | d. | none of the
above |
|
|
15.
|
Select recommended usability and accessibility practices.
a. | use video and sound whenever possible | b. | supply text descriptions of audio and video
files that appear in your web pages | c. | never use audio and video
files | d. | none of the above |
|
|
16.
|
Select the true statement from those listed below.
a. | There is no copyright on the Web | b. | It is OK to use files created by others if you
give them credit. | c. | You should obtain permission before using files
created by others. | d. | None of the statements above are true.
|
|
|
17.
|
Use _______ resolution when recording human speech in an audio
file.
a. | 8-bit | b. | 16-bit | c. | 212-bit | d. | 2 million bit |
|
|
18.
|
In terms of copyright, Fair Use is determined to be
a. | The use of a copyrighted work for purposes such as criticism, reporting, teaching,
scholarship, or research. | b. | The use of anything you find on the
web. | c. | Copying other’s music and fairly distributing it to your
friends. | d. | None of the above |
|
|
19.
|
The CSS3 _____________ property allows you to rotate, scale, skew, or move an
element.
a. | display | b. | transform | c. | transition | d. | hover |
|
|
20.
|
The _______________ element configures dynamic graphics.
a. | object | b. | script | c. | embed | d. | canvas |
|
|
21.
|
The CSS3 _____________ property provides for changes in property values to
display in a smoother manner over a specified time.
a. | display | b. | transform | c. | transition | d. | hover |
|
|
22.
|
Use the ________ element to associate JavaScript with a web page.
a. | object | b. | script | c. | embed | d. | canvas |
|
|
23.
|
When coding an audio element, the code placed before the closing audio tag is
considered to be ______.
a. | invalid | b. | fallback content | c. | only available to
browsers that support HTML5 | d. | none of the
above |
|
|
24.
|
Scenario: The Firefox browser is being used to display a web page with a video
but no video controls display —only the poster image is shown. Read the following code snippet
and select the reason for the incorrect display from the choices below. <video
controls="controls" poster="sparky.jpg"
width="160" height="150"> <source
src="sparky.m4v" type="video/mv4">
<source src="sparky.ogg" type="video/ogg"> <a
href="sparky.mov">Sparky the Dog</a> (.mov) </video>
a. | The controls attribute should be controls=”yes”
| b. | There are too many
source elements. | c. | The file extension .ogg is incorrect. | d. | The MIME type values are
incorrect. |
|
|
25.
|
Select the term below which names an HTML5 API that allows web page visitors to
share their geographic location.
a. | geodata | b. | web storage | c. | canvas | d. | geolocation |
|
|
26.
|
Scenario: The Internet Explorer 8 browser is being used to display a web page
with an audio player but the audio element displays nothing on the page. Read the following code
snippet and select the reason for the incorrect display from the choices below. <audio
controls="controls"> <source
src="podcast.mp3" type="audio/mpeg">
<source src="podcast.ogg" type="audio/ogg"> </audio>
a. | The controls attribute should be controls=”yes” | b. | There are too many
source elements. | c. | There is no fallback content to display for browsers that do not support the audio
element. | d. | The MIME type values are incorrect. |
|
|
27.
|
The _________ element is used with an object element to provide additional
information.
a. | object | b. | source | c. | param | d. | iframe |
|
|
28.
|
Chapter 11 Text Questions Which property provides a way for you to
rotate, scale, skew, or move an element?
a. | display | b. | transition | c. | transform | d. | relative |
|
|
29.
|
Which code provides a hyperlink to an audio file called hello.mp3?
a. | <object data="hello.mp3"> </object> | b. | <a
href="hello.mp3">Hello (Audio File)</a> | c. | <object
data="hello.mp3"></object> | d. | <link
src="hello.mp3"> |
|
|
30.
|
What type of files are .wav, .aiff, .mid, and .au?
a. | audio files | b. | video files | c. | both audio and video
files | d. | image files |
|
|
31.
|
Which of the following should you do to provide for usability and
accessibility?
a. | Use video and sound whenever possible. | b. | Supply text descriptions of audio and video
files that appear on your web pages. | c. | Never use audio and video
files. | d. | none of the above |
|
|
32.
|
What happens when a browser does not support the video or audio element?
a. | The computer crashes. | b. | The web page does not
display. | c. | The fallback content, if it exists, will display. | d. | The browser
closes. |
|
|
33.
|
Which of the following is an open-source video codec?
a. | Theora | b. | Vorbis | c. | MP3 | d. | Flash |
|
|
34.
|
A file that contains a Flash animation uses the ____________________ file
extension.
a. | .class | b. | .swf | c. | .mp3 | d. | .flash |
|
|
35.
|
Which of the following can describe Ajax?
a. | It is an object-based scripting language. | b. | It is the same as
Web 2.0. | c. | It is a web development technique for creating interactive web
applications. | d. | It is an obsolete technology. |
|
|
36.
|
Chapter 12 Multiple Choice Questions Select a major function of
E-Commerce.
a. | using SSL to encrypt orders | b. | adding items to a shopping
cart | c. | the buying and selling of goods | d. | none of the
above |
|
|
37.
|
Select a reason why a business would use E-Commerce.
a. | reduced costs | b. | ability to comparison shop | c. | using shopping
carts | d. | none of the above |
|
|
38.
|
Identify a potential risk for businesses using E-Commerce.
a. | increased customer satisfaction | b. | the possibility of fraudulent
transactions | c. | inconvenience of returns | d. | none of the
above |
|
|
39.
|
According to a recent U.S. Census report, the type of product that sells best
online is ____.
a. | clothing, accessories, and footwear | b. | food and candy | c. | books, music, and
videos | d. | home appliances and electronics |
|
|
40.
|
International Issues uniquely related to E-Commerce include:
a. | currency conversion | b. | browser version, screen
resolution | c. | culture | d. | none of the
above |
|
|
41.
|
Identify a disadvantage of an instant online storefront.
a. | the store is based on a template and may look very similar to other online
stores | b. | the store can be ready in minutes | c. | the store cannot accept credit
cards | d. | none of the above |
|
|
42.
|
Most commercial _________________ include(s) an online catalog, a shopping cart,
and a secure order form.
a. | web host providers | b. | shopping cart software | c. | web server
software | d. | e-commerce hosting packages |
|
|
43.
|
Select an encryption method that uses a single shared, private key.
a. | Symmetric Encryption | b. | Asymmetric Encryption | c. | Hash
Algorithm | d. | Security Lock Encryption |
|
|
44.
|
The transfer of business data between different companies using networks is
called ____.
a. | FTP | b. | EDI | c. | e-mail | d. | None of the
above |
|
|
45.
|
A _______ is a form of an asymmetric key that also contains additional
information about the entity holding the certificate.
a. | SSL | b. | SET | c. | Digital
Certificate | d. | None of the above |
|
|
46.
|
Identify a protocol that allows data to be privately exchanged over public
networks.
a. | SSL | b. | TCP | c. | IP | d. | None of the
above |
|
|
47.
|
Select the term below that describes a virtual wallet that can be used for
mobile or online payments.
a. | symmetric encryption | b. | e-wallet | c. | digital
wallet | d. | merchant account |
|
|
48.
|
Select the term below that describes communication that uses a radio frequency
to share information between electronic devices in close proximity.
a. | cybersquatting | b. | digital certificate | c. | shopping
cart | d. | Near Field Communication (NFC) |
|
|
49.
|
Select the term below that describes communication that uses a radio frequency
to share information between electronic devices in close proximity.
a. | ciphertext | b. | cybersquatting | c. | symmetric-key | d. | shopping cart |
|
|
50.
|
Chapter 12 Text Questions Which of the following acronyms refer to the
business-to-consumer e-commerce business model?
|
|
51.
|
What is a short-range wireless communication that uses a radio frequency to
share information between electronic devices?
|
|
52.
|
For businesses, which is a potential risk of using e-commerce?
a. | increased customer satisfaction | b. | the possibility of fraudulent
transactions | c. | lower overhead costs | d. | none of the
above |
|
|
53.
|
For businesses, which is an advantage of using e-commerce?
a. | the potential for fraudulent transactions | b. | reduced
costs | c. | using shopping carts | d. | increased costs |
|
|
54.
|
Which of the following options best describes how a website owner can obtain a
digital certificate?
a. | Digital certificates are automatically created when you register for a domain name.
| b. | Contact a certificate authority and apply for a digital certificate.
| c. | Digital certificates are automatically created when you are listed in a search
engine. | d. | none of the above |
|
|
55.
|
Which of the following issues are uniquely related to international
e-commerce?
a. | language and currency conversion | b. | browser version and screen resolutionContact a
certificate authority and apply for a digital certificate. | c. | bandwidth and
Internet service provider | d. | none of the
above |
|
|
56.
|
Which of the following is a major function of e-commerce?
a. | using SSL to encrypt orders | b. | adding items to a shopping
cart | c. | buying and selling goods | d. | none of the
above |
|
|
57.
|
Which of the following is a disadvantage of an instant online storefront?
a. | The store is based on a template and may look very similar to other online
stores. | b. | The store can be ready in minutes. | c. | The store cannot accept credit
cards. | d. | none of the above |
|
|
58.
|
Which of the following include(s) an online cata- log, a shopping cart, and a
secure order form?
a. | web host providers | b. | shopping cart software | c. | web server
software | d. | e-commerce hosting packages |
|
|
59.
|
Which of the following is true?
a. | A merchant account allows you to use SSL on your website. | b. | A digital wallet is
a virtual wallet that can be used for mobile or online payments. | c. | Instant storefronts
are what most large-scale e-commerce sites use | d. | none of the
above |
|
Matching
|
|
|
Chapter 12 True/ False by Matching each phrase to response of True or
False.
|
|
60.
|
Purchasing based on photos and descriptions may be perceived as a risk by
consumers engaging in e-commerce.
|
|
61.
|
Decryption is the conversion of data into an unreadable form.
|
|
62.
|
A merchant account is a type of business bank account that allows a business to
accept credit card payments.
|
|
|
Chapter 11 Fill In The Blank by Matching word or phrase that best
completes the sentence. a. | application programming interface (API) | b. | fair
use | c. | video | d. | Java Virtual Machine | e. | Document Object
Model (DOM) |
|
|
63.
|
A(n) ____________________ is a protocol that allows software components to
communicate— interacting and sharing data.
|
|
64.
|
Use of a copyrighted work for purposes such as criticism, reporting, teaching,
scholarship, or research is called ____________________.
|
|
65.
|
The file extensions .webm, .ogv, and .m4v indicate types of
____________________ files.
|
|
66.
|
When displaying a Java applet, the browser invokes the ____________________ to
inter- pret the bytecode into the appropriate machine language.
|
|
67.
|
The ____________________ defines every object and element on a web
page.
|
|
|
Chapter 12 Fill In The Blank by Matching word or phrase that best
completes the sentence. a. | Secure Sockets Layer (SSL) | b. | EDI | c. | asymmetric key | d. | symmetric
encryption |
|
|
68.
|
_______________ is a protocol that allows data to be privately exchanged over
public networks.
|
|
69.
|
____________________ can be described as the transfer of structured data
between different com- panies using networks.
|
|
70.
|
A digital certificate is a form of a(n) _______________ that also contains
additional information about the entity holding the certificate.
|
|
71.
|
An encryption method that uses a single, shared private key is
________.
|