Kunjaw Ptki Lengkap
Kunjaw Ptki Lengkap
Kunjaw Ptki Lengkap
Refer to Servers
10. Which of the following is the timeline for the creation of the World Wide
Web (WWW) and the Internet?
Your Answer: The Internet was created in the 1960s, and the WWW
was created in the 1990s.
Correct. The Internet was created in the 1960s, and the WWW was
created in the 1990s.
Correct. Two examples of Web 2.0 sites are Facebook and MySpace.
15. A change in thinking that results in a new way of seeing the world is a
paradigm shift.
16. In the industrial age, most people work in jobs that require working with
words, numbers, and ideas instead of planting corn or making shoes.
18. The difference between the information technology "haves" and "have
nots" is called the digital divide.
19. Moore's law states that computer power doubles every 18 months.
20. The first microprocessor was a single silicon chip that contained all of a
computer's computational components.
Correct. The first microprocessor was a single silicon chip that contained
all of a computer's computational components.
4. The most widely used code that represents each letter, digit, and special
character as a unique string of 8 bits is ____________.
5. When software that is written for one processor works with another
processor, it is considered ____________.
Refer to Compatibility
Refer to Performance
8. A single chip that contains multiple cores that run simultaneously is a(n)
____________.
Refer to Performance
11. Because flash memory can keep its contents without a flow of electricity,
it is said to be ____________.
Correct. Because flash memory can keep its contents without a flow of
electricity, it is said to be nonvolatile.
12. Which of the following is a special, low-energy type of RAM that can
store small amounts of data for a long time using battery power?
16. The most widely used computer code, ASCII, supports Japanese and
Arabic.
17. The ALU translates an instruction into a form that can be read by the
CPU.
18. One gigahertz (GHz) equals one clock cycle per second.
20. The more modern language coding scheme that supports over 100,000
unique characters, including Chinese, Greek, and Japanese is known as
Unicode.
Correct. The more modern language coding scheme that supports over
100,000 unique characters, including Chinese, Greek, and Japanese is
known as Unicode.
4. A device that uses reflected light to determine the location of pencil marks
on a standardized test answer sheet or other similar form is a(n)
_____________.
Correct. A type of software that converts voice data into words that can be
edited and printed is called speech recognition software.
10. ____________ that contain both microphones and earphones can be used
for telephone and teleconferencing applications.
11. A common storage device on mainframe computers and some PCs that
writes data onto and reads data off of a magnetically coated ribbon of tape
is a(n) ____________.
12. A(n) _____________ uses laser beams to read and write bits of data on a
reflective aluminum layer of the disc.
Correct. An optical disc drive uses laser beams to read and write bits of
data on a reflective aluminum layer of the disc.
13. A science that studies people at work and designs work environments that
enable people to interact efficiently and safely with things is called
____________.
14. ____________ drives can read and write data on Blu-ray discs, DVDs, and
CDs.
Correct. BD-RW drives can read and write data on Blu-ray discs, DVDs, and
CDs.
15. Speech recognition technology can assist someone who cannot use their
hands for computer inputting.
Correct. Speech recognition technology can assist someone who cannot use
their hands for computer inputting.
16. When using a graphics tablet, a stylus is NOT a good choice for a pointing
device.
19. Solid-state storage devices are rewritable memory devices with no moving
parts.
20. Three technological trends that are changing the way people think about
and use computer peripherals are wireless technology, computer networks,
and the Internet "cloud."
Correct. Three technological trends that are changing the way people think
about and use computer peripherals are wireless technology, computer
networks, and the Internet "cloud."
Refer to Licensing
Refer to Licensing
Refer to Distribution
3. Documents that are used in the first step of the publishing process,
which can include articles, drawings, maps, or photos, are called
___________.
15. GIGO is a term that means what you see on the screen is almost exactly
what you will see on the printed page.
16. Outlines and form letters can be produced using Microsoft Word
software.
20. Pie charts show trends or relationships over time or the relative
distribution of one variable through another.
21. Match each computer software application with the correct definition.
8. Predrawn images that users can legally cut and paste into their own
documents are called ____________.
16. Tim Berners-Lee founded the World Wide Web Consortium (W3C).
17. PPI is the resolution of a screen, while DPI is the resolution on printed
documents.
Correct. A key field is a field shared by all the tables that use data from a
table.
9. A database that stores data in cubes rather than 2-D tables is a(n)
____________.
Correct. A database that stores data in cubes rather than 2-D tables is a
multidimensional database.
11. Fraudulent credit card charges, massive phone bills, threats from
collection agencies, and arrests are sometimes the result of
___________.
12. According to the U.S. Supreme Court, the right to privacy is implied by
which document?
5. A significant delay between the time a message is sent and the time it is
received is called ____________.
Your Answer: 4G
16. A blog is an online journal that is usually published on a public Web site.
18. Wi-Fi technology allows notebook computer users to access the Internet
at hotspots.
21. Match the following terms and acronyms to the correct definitions.
Correct. A spider is a software robot that explores the Web and retrieves
information about pages and indexes the information in a database.
5. Which protocol is used to upload and download files from file servers?
6. ____________ files are sound files that begin to play before the file
completely downloads.
14. The ____________ describes the separation of people who have easy
access to computers and the Internet from those who do not have
access.
Correct. The digital divide describes the separation of people who have
easy access to computers and the Internet from those who do not have
access.
16. The World Wide Web is a distributed browsing and searching system
developed at MIT by Tim Berners-Lee.
19. The Internet is controlled by a joint commission from the United States
and China.
Refer to Viruses
10. A technology that collects information from computer users without their
knowledge or consent is called ____________.
15. All corporations in the U.S. work together with the U.S. government to
protect networks.
16. While risks involved in computer use can be reduced, they cannot be
eliminated.
19. Since synthetic DNA is possible, the efforts of biohackers to create and
modify organisms in home laboratories have succeeded.
19. While early predictions stated that computers would significantly reduce
the flow of paper-based information, this has not happened.
8. Systems that provide too many reports, too many summaries, and too
many details cause managers to experience ____________.
14. The time, effort, and money a customer or supplier would have to
expend when changing to a competitor's product or service is called
____________.
18. Handing the responsibility for developing and operating the information
systems to another firm is called outsourcing.
19. Too many reports, too many printouts, too many summaries, and too
many details are known as critical success factors.
20. When the primary and support activities of an organization produce the
desired output with lower costs, the organization's efficiency increases.
Correct. B2B, B2C, C2C, and B2E are examples of e-commerce models.
12. ____________ refers to the tail of the statistical curve that appears
when you rank books, movies, or tunes by popularity as reflected in
sales or rentals.
14. The basic idea of e-commerce is that at least two parties, a business and
a seller, use network technology to exchange information, products, or
services.
16. Facebook, MySpace, LinkedIn, and other social networking sites provide
resources and services to millions of users for a small fee.
19. B2C is an e-business that uses an intranet to support its internal value
chain activities.
20. The Children's Online Privacy Protection Act of 1998 (COPPA) requires
consent before collecting, using, or disclosing personal information about
children ages 12 and under.
Refer to Implementation
13. Two programming tools designed specifically for programming for the
cloud are ____________.
14. The person who uses information systems directly or uses the
information produced by a system is called a(n) ____________.
17. Logic errors are caused by errors in the logical structure, which results in
differences between what the program is supposed to do and what it
actually does.
18. Assembly language makes it easy to reuse features from one program in
another program.
5. The root of the Czech word for "forced labor" is the term ____________.
9. One reason that games such as checkers and chess were used in early AI
work is that they have clearly defined rules and unmistakable goals.
Correct. One reason that games such as checkers and chess were used in
early AI work is that they have clearly defined rules and unmistakable
goals.
1. The three or four letters following the period in a file name are called the
____________.
2. The process of reducing the size of a file so that it takes up less disk
space is called ____________.
Correct. The CPU uses RAM for instant access to information needed to
perform program actions.
15. Microsoft Windows is the operating system used by most PCs today.
16. Files with a .zip extension do not need to be decompressed before using
them in an application.
BAB 1
Word bank
hapter 1: Exploring Our Digital Planet Across 2. programs that serve as navigable windows into the
web 5. a computer that provides other network-connected computers with access to data and
programs 8. invented in 1948 as a substitute for the vacuum tube 9. a high-end desktop computer
with massive computing power 10. software programs that transform computers to supercomputers
for particular needs 11. the nickname for san jose, california because dozens of semiconductor
manufacturing companies were located there 12. the age in which most people earn their living
working with words, numbers, and ideas 13. no-frills notebook computer Down 1. the prediction
that the number of transistors that can be packed into a silicon chip of the same price would double
every two years 3. the most current computing phase that started about 2005 4. the branch of
computer science in which computers perform tasks that people, rather than machines, typically do
6. links on web pages that connect pages 7. a hybrid of hardware and software that is immortalized
on a silicon chip
BAB 2
Across
7. a computer that transmits information via light waves rather than electrical pulses, OPTICAL
11. the part of the computer that contains the CPU, MOTHERBOARD
Down
6. the acronym for the nonvolatile memory that can only be read, ROM
8. the acronym for the computer's memory that needs to be instantly available to the CPU, RAM
10. the timing device that produces electrical pulses to synchronize a computer's operations, CLOCK
Multiple Choice
2. The ________ is the circuit board that contains a computer's CPU, MOTHERBOARD
3. Computer memory that stores program and data that needs to be instantly accesible to the CPU is
called, RANDOM ACCESS MEMORY (RAM)
4. The most widely used code that represents each letter, digit, and special character as a unique
string of bits is, ASCII
5. When software that is written for one processor works with another processor, it is considered,
COMPATIBLE
6. The Processor's _______ is the design that determines how the components of the CPU are put
and work together on the chip, ARCHITECTURE
7. Which of the following are common input devices, KEYBOARDS AND POINTING DEVICES
8. A single chip that contains multiple cores that run simultaneously is a(n), MULTIPLE PROCESSOR
9. The Hardware Component that executes the steps in a software program and contains the circuity
to perform instructions is called the, CENTRAL PROCESSING UNIT (CPU)
10. ________ is used to store start-up instructions and other critical information of all modern
computers, ROM
11. Because flash memory can keep its contents without a flow of electricity, it is said to be,
NONVOLATILE
12. Which of the following is a special, low-energy type of RAM that can store small amounts of data
for a long time using battery power, CMOS
13. For most computer memory, access time is measured in, NANOSECONDS
14. PC cards and ExpressCards that can be inserted or removed from a computer's slot without
powering down the system called, HOT-SWAPPABLE
16. The most widely used computer code, ASCII, supports Japanese and Arabic, FALSE
17. The ALU translates an instruction into a form that can be read by the CPU, FALSE
18. One gigahertz (GHz) equals one clock cycle per second, FALSE
19. Computers perform five basic function : receive input, process information, produce output,
store information, and create new products, FALSE
20. The more modern language coding scheme that supports over 100 000 unique characters,
including Chinese, Greek, and Japanese is known ad Unicode, TRUE
21.5 Bay, C. OPEN AREAS IN THE SYSTEM BOX FOR DISK DRIVES AND OTHER DEVICES
21.6 Cache, E. SMALL MEMORY SPACES USED BY THE CPU TO ELIMINATE BOTTLENECKS IN
PROCESSING
BAB 3
4. The type of printer that sprays ink directly onto paper. INKJET
6. The type of keyboard that places your arms at a less painful position. ERGONOMIC
7. The type of scanner used for high-end publishing and museum archiving. DRUM
8. The fractional relationship between the width and heigth of a display. ASPECTRATIO
9. The type of printer that selectively heats images on special paper. THERMAL
10. The architectural design that enables users to add peripherals. OPEN
11. The type of computer feedback that simulates the visual output. HAPTIC
1. Evidence suggest that typing on a standart keyboard, which forces you to hold your arms and
wrists at unatural angles, may lead to... REPETITIVE-STRESS INJURIES
2. A ..., a small flat panel that is sensitive to light pressure, is sometimes used instead of a mouse.
TOUCHPAD
3. A ... input device allows multi-finger or multi-hand gestures to accomplish complex tasks more
quickly. MULTI-TOUCH
4. A device that uses reflected light to determine the location of pencil marks on a standardized test
answer sheet or other similar from is a(n)... OPTICAL MARK READER
5. A ... captures snapshot of the real world and saves them as bit patterns on flash memory cards.
DIGITAL CAMERA
6. A type of software that converts voice data into words that can be edited and printed is called ...
software. SPEECH RECOGNITION
7. A(n) ... converts a computer's internal bit patterns into a form that humans can understand.
OUTPUT DEVICE
9. A hard copy of the image on the monitor can be produced by a... PRINTER
10. ... that contain both microphones and earphones can be used for telephone and
teleconferencing applications. HEADSETS
11. A common storage device on mainframe computers and some PCs that writes data onto and
reads data off a magnetically coated ribbon of tape is a(n)... TAPE DRIVE
12. A(n) ... uses laser beams to read and write bits of data on a reflective aluminum layer of the disc.
OPTICAL DISC DRIVE
13. A science that studies people at work and design work environments that enable people to
interact efficiently and safely with things is called... ERGONOMICS
14. ... drives can read and write data on Blu-ray discs, DVDs, and CDs. BD-RW
15. Speech recognition technology can assist someone who cannot use their hands for computer
inputting. TRUE
16. When using a graphics tablet, a stylus is NOT a good choice for a pointing device. FALSE
17. Nearly all new monitors use flat-panel LED display technology. FALSE
18. The USB (universal serial bus) is an example of a legacy port. FALSE
19. Solid-state storage devices are rewritable memory devices with no moving parts. TRUE
20. Three technological trends that are changing the way people think about and use computer
peripherals are wireless technology, computer networks, and the internet "cloud." TRUE
21.1 Allows data to be sent and received one bit at a time. SERIAL PORT
21.2 Used to attach printers that send and receive bits in groups. PARALLEL PORT
21.3 A slow port not generally used on PCs anymore. LEGACY PORT
21.4 Allow devices produced by one manufacturer to attach to systems made by another
manufacturer. INTERFACE STANDARDS
21.5 Today's PCs and Macs include one or more of these; allows data transfer rates of up to 480
Mbps. USB PORT
21.6 High-speed connection ideal for data intensive applications. FIREWIRE PORT
BAB 4
Word bank BUGS COMPILER DEVICEDRIVERS MAC MASHUP MENUS MULTITASKING PIRACY PLUGIN
README SERVICEPACKS UTILITYPROGRAMS
Across 1. tools for doing system maintenance that aren't done automatically by the operating
system 4. files that include installation instructions 6. free software updates 7. translator program
that translates high-level languages to machine language 9. a program that interacts with the host
program and extends its functionality 11. the unauthorized use of software 12. errors in software
Down 2. the concurrent execution of multiple applications 3. programs that allow input/output
devices to communicate with a computer 5. web applications that provide a service by combining
functionality from two or more sources 8. on-screen lists where users choose commands 10. the first
computer to develop the graphical user interface
BAB 5
CROSSWORD CHAPTER 5
6. a storage of presteps within documents that can be used as starting points for future documents.
TEMPLATES
8. tool used with a database for producing personalized from letters. MAILMERGE
9. adobe's software program that enables documents to be viewed on any PC. PDF
1. which of the following is a flexible, portable, paper-like material that can erase itself and display
new text and images when a new page is diplayed? E-PAPER
2. ... is a capability that most of today's word processors have that allows them to produce
personalized from letters. MAIL MERGE
3. documents that are used in the first step of the publising process. which can include articles,
drawings, maps, or photos, are called... SOURCE DOCUMENTS
4. a documents publishing program that allows documents to be shared across multiple platforms is
called... ADOBE ACROBAT
5. a user can add words to Microsoft Word's dictionary using the... SPELLING CHECKER TOOL
6. ... fonts represent characters that can be increased or decreased in size without distortion.
SCALABLE
7. page-layout software allows desktop publishers to control the space between a pair of letters by
using... KERNING
8. a ... program makes short work of tasks that involve repetitive calculations, such as budgeting,
business projections, grade books, checkbooks, and more. SPREADSHEET
9. ... software is designed to turn continuous speech into written text, which increases productivity
while reducing the risk of repetitive strain injuries. DICTATION
10. ... software uses shape, location is space, color, brightness, and motion to help scientists and
mathematicians understand relationships that are not apparent. SCIENTIFIC-VISUALIZATION
11. in a computer model, a set of concepts and ideas designed to mimic some type of system is
called a(n)... ABSTRACTION
12. ... software helps professionals and students go beyond the capabilities of spreadsheets to
create, manipulate, and solve complex equations. MATH-PROCESSING
14. a ... chart is used to discover a relationship between two variables. SCATTER
15. GIGO is a term that means what you see on the screen is almost exactly what you will see on the
printed page. FALSE
16. outlines and form letters can be produced using Microsoft Word software. TRUE
18. when creating a professional-looking document, you should avoid using italics, boldface, all caps,
underlines, and any other styles for emphasis. FALSE
19. desktop publishing saves companies money by allowing them to produce brochures and other
publications they need in-house. TRUE
20. pie charts show trends or realtionships over time or the relative distribution of one varibale
through another. FALSE
BAB 6
Word bank CAD CLIPART GRAYSCALE JAGGIES JPG NONLINEAR PIXELS PSD REMIXES RESOLUTION
SWF TWEENING
Across 2. video editing process in which editing occurs in any sequence 4. the acronym for the vector
graphic format associated with adobe flash player 7. predrawn images that can be legally used
electronically 8. file format that is used for photographs on the web 9. graphics that allow each pixel
to appear as black, white, or shades of gray 11. photoshop's native file format Down 1. tiny dots of
white, black, or color arranged in rows that make up an image on a computer screen 3. the density
of pixels described in pixels per inch 5. the process in which an animator creates key frames and
objects and then uses software to fill in movement in-between frames 6. jagged, stair-step-like
bumps that advertise an image's identity as a collection of pixels 7. the acronym for the use of
computers to design products 10. re-creation of songs using fresh rhythms and audio samples
BAB 7
Word bank CAD CLIPART GRAYSCALE JAGGIES JPG NONLINEAR PIXELS PSD REMIXES RESOLUTION
SWF TWEENING
Across 2. video editing process in which editing occurs in any sequence 4. the acronym for the vector
graphic format associated with adobe flash player 7. predrawn images that can be legally used
electronically 8. file format that is used for photographs on the web 9. graphics that allow each pixel
to appear as black, white, or shades of gray 11. photoshop's native file format Down 1. tiny dots of
white, black, or color arranged in rows that make up an image on a computer screen 3. the density
of pixels described in pixels per inch 5. the process in which an animator creates key frames and
objects and then uses software to fill in movement in-between frames 6. jagged, stair-step-like
bumps that advertise an image's identity as a collection of pixels 7. the acronym for the use of
computers to design products 10. re-creation of songs using fresh rhythms and audio samples
BAB 8
Word bank BIOMETRICS BOTNETS CODERED DOS HACTIVISTS LOGICBOMB MACROS MALWARE
PHISHING SPOOFING SPYWARE VIRUS Across 2. malicious software 3. a malicious network that's
been hijacked using viruses to perform harm without the owners knowledge 5. the type of trojan
horse that is programmed to attack in response to an event 7. embedded programs that automate
tasks 10. fishing for sensitive information under false pretenses 11. in 2001 this worm targeted
servers running microsoft software 12. the acronym for the type of attack where servers are
bombarded with bogus traffic to shut them down Down 1. hacking as a form of political activism 4.
pretending to be someone else to trick them into doing something they otherwise would not do
BAB 9
Word bank CAD CLIPART GRAYSCALE JAGGIES JPG NONLINEAR PIXELS PSD REMIXES RESOLUTION
SWF TWEENING
Across 2. video editing process in which editing occurs in any sequence 4. the acronym for the vector
graphic format associated with adobe flash player 7. predrawn images that can be legally used
electronically 8. file format that is used for photographs on the web 9. graphics that allow each pixel
to appear as black, white, or shades of gray 11. photoshop's native file format Down 1. tiny dots of
white, black, or color arranged in rows that make up an image on a computer screen 3. the density
of pixels described in pixels per inch 5. the process in which an animator creates key frames and
objects and then uses software to fill in movement in-between frames 6. jagged, stair-step-like
bumps that advertise an image's identity as a collection of pixels 7. the acronym for the use of
computers to design products 10. re-creation of songs using fresh rhythms and audio samples
BAB 10
Word bank BIOMETRICS BOTNETS CODERED DOS HACTIVISTS LOGICBOMB MACROS MALWARE
PHISHING SPOOFING SPYWARE VIRUS
Across 2. malicious software 3. a malicious network that's been hijacked using viruses to perform
harm without the owners knowledge 5. the type of trojan horse that is programmed to attack in
response to an event 7. embedded programs that automate tasks 10. fishing for sensitive
information under false pretenses 11. in 2001 this worm targeted servers running microsoft
software 12. the acronym for the type of attack where servers are bombarded with bogus traffic to
shut them down Down 1. hacking as a form of political activism 4. pretending to be someone else to
trick them into doing something they otherwise would not do
BAB 11
Word bank BIOMETRICS BOTNETS CODERED DOS HACTIVISTS LOGICBOMB MACROS MALWARE
PHISHING SPOOFING SPYWARE VIRUS
Across 2. malicious software 3. a malicious network that's been hijacked using viruses to perform
harm without the owners knowledge 5. the type of trojan horse that is programmed to attack in
response to an event 7. embedded programs that automate tasks 10. fishing for sensitive
information under false pretenses 11. in 2001 this worm targeted servers running microsoft
software 12. the acronym for the type of attack where servers are bombarded with bogus traffic to
shut them down Down 1. hacking as a form of political activism 4. pretending to be someone else to
trick them into doing something they otherwise would not do
BAB 12
Word bank BIOMETRICS BOTNETS CODERED DOS HACTIVISTS LOGICBOMB MACROS MALWARE
PHISHING SPOOFING SPYWARE VIRUS
Across 2. malicious software 3. a malicious network that's been hijacked using viruses to perform
harm without the owners knowledge 5. the type of trojan horse that is programmed to attack in
response to an event 7. embedded programs that automate tasks 10. fishing for sensitive
information under false pretenses 11. in 2001 this worm targeted servers running microsoft
software 12. the acronym for the type of attack where servers are bombarded with bogus traffic to
shut them down Down 1. hacking as a form of political activism 4. pretending to be someone else to
trick them into doing something they otherwise would not do
BAB 13
Word bank BIOMETRICS BOTNETS CODERED DOS HACTIVISTS LOGICBOMB MACROS MALWARE
PHISHING SPOOFING SPYWARE VIRUS
Across 2. malicious software 3. a malicious network that's been hijacked using viruses to perform
harm without the owners knowledge 5. the type of trojan horse that is programmed to attack in
response to an event 7. embedded programs that automate tasks 10. fishing for sensitive
information under false pretenses 11. in 2001 this worm targeted servers running microsoft
software 12. the acronym for the type of attack where servers are bombarded with bogus traffic to
shut them down Down 1. hacking as a form of political activism 4. pretending to be someone else to
trick them into doing something they otherwise would not do
BAB 14
Word bank BIOMETRICS BOTNETS CODERED DOS HACTIVISTS LOGICBOMB MACROS MALWARE
PHISHING SPOOFING SPYWARE VIRUS Across 2. malicious software 3. a malicious network that's
been hijacked using viruses to perform harm without the owners knowledge 5. the type of trojan
horse that is programmed to attack in response to an event 7. embedded programs that automate
tasks 10. fishing for sensitive information under false pretenses 11. in 2001 this worm targeted
servers running microsoft software 12. the acronym for the type of attack where servers are
bombarded with bogus traffic to shut them down Down 1. hacking as a form of political activism 4.
pretending to be someone else to trick them into doing something they otherwise would not do
BAB 15
Word bank BIOMETRICS BOTNETS CODERED DOS HACTIVISTS LOGICBOMB MACROS MALWARE
PHISHING SPOOFING SPYWARE VIRUS
Across 2. malicious software 3. a malicious network that's been hijacked using viruses to perform
harm without the owners knowledge 5. the type of trojan horse that is programmed to attack in
response to an event 7. embedded programs that automate tasks 10. fishing for sensitive
information under false pretenses 11. in 2001 this worm targeted servers running microsoft
software 12. the acronym for the type of attack where servers are bombarded with bogus traffic to
shut them down Down 1. hacking as a form of political activism 4. pretending to be someone else to
trick them into doing something they otherwise would not do
TAMBAHAN
Across 1. on a web page, the words, pictures, or menus that act like buttons 4. a string of three or
four characters that follows a period at the end of a filename 7. the process of reducing the size of
files 9. software tools that allow you to use the computer for specific purposes 11. where data is
temporarily stored for later usage in a word-processing program 13. fonts with plainer, cleaner lines
Down 2. where the CPU is housed 3. executable programs delivered by email that have malicious
intent on a computer system 5. to move the mouse while holding down the button 6. the feature in
a word processor where words are automatically moved to the next line when they don't fit 8. the
unique address of a web page 10. web sites designed as first-stop gateways for the internet 12. fonts
with fine lines at the ends of the main strokes of each character