Name: 
 

IT125SS17 Study Guide Web Multimedia & Interactivity - Chaps 11-12



ins002-1.jpgThis Study Guide is organized with questions grouped as follows: MC and Matching.  The questions are drawn from questions at the end of each chapter, the author’s Test Bank, and lecture. 
This constitutes the “test bank” for Quiz 4.
Select answers using the pull-down windows in the boxes to left of each question (do not use roller-wheel on mouse as it will shift answers). 
All questions have equal weight. 
When completed, select the "Check Answers" button at the bottom of the Webpage.  Results are returned only to you.  You may change selections anytime prior to completing Study Guide and you may take as often as desired.

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
 

 1. 

Chapter 11 Multiple Choice Questions
Java can be described as:
a.
a more sophisticated form of JavaScript
b.
an object-oriented programming language
c.
a language created by Netscape
d.
none of the above
 

 2. 

JavaScript can be described as:
a.
an object-based scripting language
b.
an easy form of Java
c.
a language created by Microsoft
d.
none of the above
 

 3. 

Select the true statement from those listed below.
a.
Java applets may be contained in files with the .class extension
b.
Java applets are not copyrighted
c.
Java applets must be saved in a different folder than web pages
d.
All of the statements above are true
 

 4. 

The file extensions .avi, .m4v, and .ogv are used for:
a.
audio files
b.
video files
c.
Flash media files
d.
none of the above
 

 5. 

_______ is a JavaScript library intended to simplify client-side scripting:
a.
Ajax
b.
jQuery
c.
Flash
d.
Java
 

 6. 

Use the _______ attribute on a <video> tag to display user controls for the video player.
a.
poster
b.
player
c.
controls
d.
image
 

 7. 

Select the void element that can configure a Flash .swf on a web page:
a.
<script>
b.
<embed>
c.
<object>
d.
<img>
 

 8. 

When displaying a Java applet, the browser invokes the _______ to interpret the bytecode into the appropriate machine language.
a.
Java Virtual Machine (JVM)
b.
JavaScript interpreter
c.
Windows operating system
d.
Java Compiler
 

 9. 

The _______ defines every object and element on a web page.
a.
Document Object Model
b.
Browser
c.
Operating System
d.
None of the above
 

 10. 

Select the technology that was developed by a joint effort between Netscape and Sun Microsystems.
a.
Java
b.
JavaScript
c.
Flash
d.
Ajax
 

 11. 

Select the term below which is a protocol that provides a method for software components to communicate, interact, and share data.
a.
JavaScript
b.
Application Programming Interface
c.
Java
d.
Canvas
 

 12. 

Use the _______ attribute on a <video> tag to display an image that represents the movie.
a.
poster
b.
player
c.
controls
d.
image
 

 13. 

Select the term below which names an HTML5 API that allows web page visitors to share their geographic location.
a.
data
b.
web storage
c.
canvas
d.
geolocation
 

 14. 

The term Ajax stands for____.
a.
Asynchronous Java and ActionScript
b.
Asynchronous JavaScript and XML
c.
Asynchronous JavaScript and XHTML
d.
none of the above
 

 15. 

Select recommended usability and accessibility practices.
a.
use video and sound whenever possible
b.
supply text descriptions of audio and video files that appear in your web pages
c.
never use audio and video files
d.
none of the above
 

 16. 

Select the true statement from those listed below.
a.
There is no copyright on the Web
b.
It is OK to use files created by others if you give them credit.
c.
You should obtain permission before using files created by others.
d.
None of the statements above are true.
 

 17. 

Use  _______ resolution when recording human speech in an audio file.
a.
8-bit
b.
16-bit
c.
212-bit
d.
2 million bit
 

 18. 

In terms of copyright, Fair Use is determined to be
a.
The use of a copyrighted work for purposes such as criticism, reporting, teaching, scholarship, or research.
b.
The use of anything you find on the web.
c.
Copying other’s music and fairly distributing it to your friends.
d.
None of the above
 

 19. 

The CSS3 _____________ property allows you to rotate, scale, skew, or move an element.
a.
display
b.
transform
c.
transition
d.
hover
 

 20. 

The _______________ element configures dynamic graphics.
a.
object
b.
script
c.
embed
d.
canvas
 

 21. 

The CSS3 _____________ property provides for changes in property values to display in a smoother manner over a specified time.
a.
display
b.
transform
c.
transition
d.
hover
 

 22. 

Use the ________ element to associate JavaScript with a web page.
a.
object
b.
script
c.
embed
d.
canvas
 

 23. 

When coding an audio element, the code placed before the closing audio tag is considered to be ______.
a.
invalid
b.
fallback content
c.
only available to browsers that support HTML5
d.
none of the above
 

 24. 

Scenario: The Firefox browser is being used to display a web page with a video but no video controls display —only the poster image is shown. Read the following code snippet and select the reason for the incorrect display from the choices below.
<video controls="controls" poster="sparky.jpg"
      width="160" height="150">
      <source src="sparky.m4v" type="video/mv4">
      <source src="sparky.ogg" type="video/ogg">
   <a href="sparky.mov">Sparky the Dog</a> (.mov)
</video>
a.
The controls attribute should be controls=”yes”
b.
There are too many source elements.
c.
The file extension .ogg is incorrect.
d.
The MIME type values are incorrect.
 

 25. 

Select the term below which names an HTML5 API that allows web page visitors to share their geographic location.
a.
geodata
b.
web storage
c.
canvas
d.
geolocation
 

 26. 

Scenario: The Internet Explorer 8 browser is being used to display a web page with an audio player but the audio element displays nothing on the page. Read the following code snippet and select the reason for the incorrect display from the choices below.
<audio controls="controls">
       <source src="podcast.mp3" type="audio/mpeg">
        <source src="podcast.ogg" type="audio/ogg">
</audio>
a.
The controls attribute should be controls=”yes”
b.
There are too many source elements.
c.
There is no fallback content to display for browsers that do not support the audio element.
d.
The MIME type values are incorrect.
 

 27. 

The _________ element is used with an object element to provide additional information.
a.
object
b.
source
c.
param
d.
iframe
 

 28. 

Chapter 11 Text Questions
Which property provides a way for you to rotate, scale, skew, or move an element?
a.
display
b.
transition
c.
transform
d.
relative
 

 29. 

Which code provides a hyperlink to an audio file called hello.mp3?
a.
<object data="hello.mp3"> </object>
b.
<a href="hello.mp3">Hello (Audio File)</a>
c.
<object data="hello.mp3"></object>
d.
<link src="hello.mp3">
 

 30. 

What type of files are .wav, .aiff, .mid, and .au?
a.
audio files
b.
video files
c.
both audio and video files
d.
image files
 

 31. 

Which of the following should you do to provide for usability and accessibility?
a.
Use video and sound whenever possible.
b.
Supply text descriptions of audio and video files that appear on your web pages.
c.
Never use audio and video files.
d.
none of the above
 

 32. 

What happens when a browser does not support the video or audio element?
a.
The computer crashes.
b.
The web page does not display.
c.
The fallback content, if it exists, will display.
d.
The browser closes.
 

 33. 

Which of the following is an open-source video codec?
a.
Theora
b.
Vorbis
c.
MP3
d.
Flash
 

 34. 

A file that contains a Flash animation uses the ____________________ file extension.
a.
.class
b.
.swf
c.
.mp3
d.
.flash
 

 35. 

Which of the following can describe Ajax?
a.
It is an object-based scripting language.
b.
It is the same as Web 2.0.
c.
It is a web development technique for creating interactive web applications.
d.
It is an obsolete technology.
 

 36. 

Chapter 12 Multiple Choice Questions
Select a major function of E-Commerce.
a.
using SSL to encrypt orders
b.
adding items to a shopping cart
c.
the buying and selling of goods
d.
none of the above
 

 37. 

Select a reason why a business would use E-Commerce.
a.
reduced costs
b.
ability to comparison shop
c.
using shopping carts
d.
none of the above
 

 38. 

Identify a potential risk for businesses using E-Commerce.
a.
increased customer satisfaction
b.
the possibility of fraudulent transactions
c.
inconvenience of returns
d.
none of the above
 

 39. 

According to a recent U.S. Census report, the type of product that sells best online is ____.
a.
clothing, accessories, and footwear
b.
food and candy
c.
books, music, and videos
d.
home appliances and electronics
 

 40. 

International Issues uniquely related to E-Commerce include:
a.
currency conversion
b.
browser version, screen resolution
c.
culture
d.
none of the above
 

 41. 

Identify a disadvantage of an instant online storefront.
a.
the store is based on a template and may look very similar to other online stores
b.
the store can be ready in minutes
c.
the store cannot accept credit cards
d.
none of the above
 

 42. 

Most commercial _________________ include(s) an online catalog, a shopping cart, and a secure order form.
a.
web host providers
b.
shopping cart software
c.
web server software
d.
e-commerce hosting packages
 

 43. 

Select an encryption method that uses a single shared, private key.
a.
Symmetric Encryption
b.
Asymmetric Encryption
c.
Hash Algorithm
d.
Security Lock Encryption
 

 44. 

The transfer of business data between different companies using networks is called ____.
a.
FTP
b.
EDI
c.
e-mail
d.
None of the above
 

 45. 

A _______ is a form of an asymmetric key that also contains additional information about the entity holding the certificate.
a.
SSL
b.
SET
c.
Digital Certificate
d.
None of the above
 

 46. 

Identify a protocol that allows data to be privately exchanged over public networks.
a.
SSL
b.
TCP
c.
IP
d.
None of the above
 

 47. 

Select the term below that describes a virtual wallet that can be used for mobile or online payments.
a.
symmetric encryption
b.
e-wallet
c.
digital wallet
d.
merchant account
 

 48. 

Select the term below that describes communication that uses a radio frequency to share information between electronic devices in close proximity.
a.
cybersquatting
b.
digital certificate
c.
shopping cart
d.
Near Field Communication (NFC)
 

 49. 

Select the term below that describes communication that uses a radio frequency to share information between electronic devices in close proximity.
a.
ciphertext
b.
cybersquatting
c.
symmetric-key
d.
shopping cart
 

 50. 

Chapter 12 Text Questions
Which of the following acronyms refer to the business-to-consumer e-commerce business model?
a.
B2B
b.
BTC
c.
B2C
d.
C2B
 

 51. 

What is a short-range wireless communication that uses a radio frequency to share information between electronic devices?
a.
NFC
b.
SSL
c.
EDI
d.
FTP
 

 52. 

For businesses, which is a potential risk of using e-commerce?
a.
increased customer satisfaction
b.
the possibility of fraudulent transactions
c.
lower overhead costs
d.
none of the above
 

 53. 

For businesses, which is an advantage of using e-commerce?
a.
the potential for fraudulent transactions
b.
reduced costs
c.
using shopping carts
d.
increased costs
 

 54. 

Which of the following options best describes how a website owner can obtain a digital certificate?
a.
Digital certificates are automatically created when you register for a domain name.
b.
Contact a certificate authority and apply for a digital certificate.
c.
Digital certificates are automatically created when you are listed in a search engine.
d.
none of the above
 

 55. 

Which of the following issues are uniquely related to international e-commerce?
a.
language and currency conversion
b.
browser version and screen resolutionContact a certificate authority and apply for a digital certificate.
c.
bandwidth and Internet service provider
d.
none of the above
 

 56. 

Which of the following is a major function of e-commerce?
a.
using SSL to encrypt orders
b.
adding items to a shopping cart
c.
buying and selling goods
d.
none of the above
 

 57. 

Which of the following is a disadvantage of an instant online storefront?
a.
The store is based on a template and may look very similar to other online stores.
b.
The store can be ready in minutes.
c.
The store cannot accept credit cards.
d.
none of the above
 

 58. 

Which of the following include(s) an online cata- log, a shopping cart, and a secure order form?
a.
web host providers
b.
shopping cart software
c.
web server software
d.
e-commerce hosting packages
 

 59. 

Which of the following is true?
a.
A merchant account allows you to use SSL on your website.
b.
A digital wallet is a virtual wallet that can be used for mobile or online payments.
c.
Instant storefronts are what most large-scale e-commerce sites use
d.
none of the above
 

Matching
 
 
Chapter 12 True/ False by Matching each phrase to response of True or False.
a.
True
b.
False
 

 60. 

Purchasing based on photos and descriptions may be perceived as a risk by consumers engaging in e-commerce.
 

 61. 

Decryption is the conversion of data into an unreadable form.
 

 62. 

A merchant account is a type of business bank account that allows a business to accept credit card payments.
 
 
Chapter 11 Fill In The Blank by Matching word or phrase that best completes the sentence.
a.
application programming interface (API)
b.
fair use
c.
video
d.
Java Virtual Machine
e.
Document Object Model (DOM)
 

 63. 

A(n) ____________________ is a protocol that allows software components to communicate— interacting and sharing data.
 

 64. 

Use of a copyrighted work for purposes such as criticism, reporting, teaching, scholarship, or research is called ____________________.
 

 65. 

The file extensions .webm, .ogv, and .m4v indicate types of ____________________ files.
 

 66. 

When displaying a Java applet, the browser invokes the ____________________ to inter- pret the bytecode into the appropriate machine language.
 

 67. 

The ____________________ defines every object and element on a web page.
 
 
Chapter 12 Fill In The Blank by Matching word or phrase that best completes the sentence.
a.
Secure Sockets Layer (SSL)
b.
EDI
c.
asymmetric key
d.
symmetric encryption
 

 68. 

_______________ is a protocol that allows data to be privately exchanged over public networks.
 

 69. 

____________________ can be described as the transfer of structured data between different com- panies using networks.
 

 70. 

A digital certificate is a form of a(n) _______________ that also contains additional information about the entity holding the certificate.
 

 71. 

An encryption method that uses a single, shared private key is ________.
 



 
Check Your Work     Start Over