Web Browsing Quiz

Show all answers     Hide all answers

    Completion

  1. URI stands for _____________   _____________   _____________. Answer Uniform Resource Identifier
  2. URL stands for _____________   _____________   _____________. Answer Uniform Resource Locator
  3. SSL stands for _____________   _____________   _____________. Answer Secure Socket Layer
  4. TLS stands for _____________   _____________   _____________. Answer Transport Layer Security
  5. Short answer

  6. Name four browsers. Answer Here are eight: Chrome, Firefox, Opera, Safari, Internet Explorer, Konqueror, Lynx, Maxthon Cloud.
  7. Explain what a cookie is? Answer A cookie is a small text file which a web site can store on a local machine so it can recognize the user the next time they vist that site.
  8. Describe the four parts of a URL. Answer
    1. protocol
    2. domain name (possibly suffixed with a port number)
    3. path
    4. file name
  9. What is HTTP used for? Answer HTTP is used to transfer web pages between computers.
  10. Explain what HTTPS is. Answer HTTPS is a secure version of HTTP which uses encryption.
  11. Explain what a cache is. Answer A cache is local storage where pages, images, and other data that has been downloaded can be stored in case it is wanted again. If it is wanted again, then it can be quickly used directly from the cache instead of having to wait and download it again.
  12. Explain the purpose of a proxy service. Answer A proxy server is a machine used to funnel an organization's external traffic though a single machine. This provides a convenient way to do caching for the whole organization. It also provides a convenient way to monitor external communication and block unwanted messages going in both directions.
  13. Describe the differences between the Internet, an intranet, and an extranet. Answer An intranet appears like the Internet, but is only accessible within an organization. An extranet is an intranet which is set up to allow some limited external access.
  14. Explain the purpose of an anonymous proxy server. Answer An anonymous proxy server can be used to hide the IP address of the client requesting resources from the Internet. The servers will see the IP address of the anonymous proxy server instead of the actual requesting client.
  15. Explain the purpose of anonymous mode browsing. Answer Anonymous mode browsing tries to protect privacy by not storing cookies, and not storing information in the cache or history file.
  16. Explain how a web page is retrieved by a browser. Answer
    • The browser requests the IP address of the domain name of the URL that was entered from a DNS server.
    • Hopefully, the browser gets the IP address back from the DNS server.
    • The browser requests a TCP connection to the specified IP address (on port 80 if no other port was specified in the URL).
    • If the connection is granted, then the browser will ask for the specific page given in the URL.
    • Hopefully, the server returns the specified file if it exists (and it is allowed).
    • The TCP connection is closed.
    • The browser renders the text elements of the page.
    • Separate TCP connections are then opened to request any images or other parts of the web page which must be retrieved. Each image or other object that is retrieved requires a separate connection. The pictures are displayed as they are received.
  17. Matching

    Identify the letter of the choice that best matches the phrase or definition.

    1. http://www.kishwaukeecollege.edu/faculty/dklick/cis115/
    2. web conference
    3. webcast
    4. RSS, Atom
    5. index.html
    6. asymmetric encryption
    7. symmetric encryption
    8. webinar
  18. relative URL Answer E (index.html)
  19. web feed Answer D (RSS, Atom)
  20. usually used to present lectures and/or PowerPoint presentations Answer H (webinar)
  21. usually used to present lectures and conduct meetings with some audience participation Answer B (web conference)
  22. encryption key is made publicly available Answer F (asymmetric encryption)
  23. absolute URL Answer A (www.kishwaukeecollege.edu/faculty/dklick/cis115/)
  24. encryption key must be kept private Answer G (symmetric encryption)
  25. usually used to present an audio or video presentation which may be streamed live and/or downloaded later Answer C (webcast)