Marcella is looking for a very unique product online. She has found one on the XYZ Company’s Web site, which is designed well and appears to be legitimate. As she navigates through the checkout process, she reaches the checkout page with this URL, which asks her to enter her credit card information:
http://XYZ.com/gp/checkout.html/ref=chk_out_TLS12B_lb?ie=UTF8 &docId=10007931
Why should Marcella cancel her online transaction instead of proceeding?
Which of the following is used to help non-technical users collectively classify and find information on a site?
You received an e-mail message on which several other individuals were copied. You want to respond to this message in a way that will include everyone who was copied on the original message. You can accomplish this by using which action?
Consider the following address:
http://www.CIWcertified .com/Certifications/Web_Foundations/iba.php
Which of the following is the best classification for the address?
Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of music preferences, including favorite songs. The music service then suggests additional songs she might enjoy. The music provider is an example of a cloud-computing application that uses a technology for collaborative filtering, which helps define the list of songs available to listeners. Which term describes this technology?
You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance drafting business. You have a personal Web site and would like to share samples of your work for potential new customers to review. To which file format should you convert your drawings so that they are viewable regardless of the local operating system used by the individual viewing your site?
When using secure authentication, which of the following are required?