Information Technology Reference
In-Depth Information
a. Suppose someone sends you email. How might they be able
to confirm that you have actually viewed their message?
b. How might a company be able to set a cookie on your ac
count based on email you have received?
4. Suppose someone wants to develop a list of valid email ad
dresses, perhaps for the purpose of sending spam selling the
address list to others for spam. Toward this end, this person
identifies valid Web site names and makes up possible user
names (e.g., henry01, henry02, . . .). Suppose further that this
person sends out numerous email messages to all of these po
tential users, and these messages are written in HTML.
Describe how you could set up your HTML page and handle
subsequent processing to determine which of the possible user
names and addresses were in use. You can assume that a user
might read your email, but you should not assume that the
user will consciously reply to that email.
5. Suppose you ran a Webbased company, so you would want
your company's pages to be listed early on search engines.
Suppose you knew or suspected that a particular search engine
used click popularity or stickiness as a factor in determining
which sites to list before others in giving its search results.
a. What technique(s) might you employ to manipulate the
search engine's statistics regarding click popularity for
your Web site(s)? That is, what might you do to give your
site(s) a higher rating for click popularity?
b. What technique(s) might you employ to manipulate the
search engine's statistics regarding stickiness for your Web
site(s)?
Search WWH ::




Custom Search