Information Technology Reference
In-Depth Information
a. An email message contains an attachment—perhaps in PDF
format—and that attachment is encoded for transmission.
b. The text of an email message is written in HTML and con
tains some comments (not displayed on your screen) along
with regular text.
c. An email message contains pictures or sounds, perhaps in
GIF or JPEG format.
4. Consider the section of this chapter entitled, “Can I be certain
who sent me an email message?” While this section contains 6
full paragraphs to answer the question, some might argue that
the short answer is simply “no.” Do you believe this shortened
answer would have been adequate? Why or why not?
Exercises
1. a. Give a careful definition for each of the words or phrases
listed in the “Terminology from This Chapter” section.
b. Use each term in two or three sentences to explain its sig
nificance and clarify its relevance to this chapter.
2. When you obtain the results of a query from a search engine,
it sometimes happens that a reference no longer works; that
is, you click on a reference to find that page is no longer
available.
a. Explain how it might happen that a search engine produces
a reference to a nonexistent Web page.
b. The Google search engine anticipates the possibility that
such broken links might arise and allows a user to view an
old copy of the page. In Google's terms, this is a “cached”
copy. Based on your reading in Chapter 3, why do you
think this copy is called “cache”?
3. This chapter discusses possibilities for email scripts to send
email from your account or to activate viruses and other pro
grams. As another example, consider what might happen if
an email message was written in HTML format. Suppose
further that your browser was configured to accept cookies,
display images, and run scripts.
Search WWH ::




Custom Search