8º - Internet and Ethical use of Technology

Beschreibung

Noveno Tecnología Quiz am 8º - Internet and Ethical use of Technology, erstellt von Julian Perez am 15/05/2018.
Julian Perez
Quiz von Julian Perez, aktualisiert more than 1 year ago
Julian Perez
Erstellt von Julian Perez vor mehr als 6 Jahre
134
1

Zusammenfassung der Ressource

Frage 1

Frage
"Time Sharing" was a strategy in the 90's to provide access to computers for many expert users.
Antworten
  • True
  • False

Frage 2

Frage
Which was the influence of Cold War in the history of Internet?
Antworten
  • The Cold War provided the resources needed to build Internet.
  • The Cold War concentrated the nations to get strategic advantages.
  • The Cold War improved the international relationships.
  • The Cold War ordered east and west in a different way.
  • None of above.

Frage 3

Frage
What is a Mainframe?
Antworten
  • A powerful computer used over the Internet.
  • A computer that brings the opportunity to work simultaneously to a hundreds of users.
  • A computer that saves information in the Internet.
  • All of the above.

Frage 4

Frage
In which decade Internet was called like that, and start running?
Antworten
  • 80's
  • 90's
  • 70's
  • 60's
  • None of the above.

Frage 5

Frage
What is a Server?
Antworten
  • Is a special computer connected to a network.
  • Is a special computer connected directly to the Internet.
  • Is a special computer disconnected to a network.
  • All of the above.

Frage 6

Frage
What is an Internet Protocol Address? (I.P. Address)
Antworten
  • Is an unique identifier to connect a device to a network.
  • Is a piece of hardware important to connect to the Internet.
  • Is a number to identify a specific group of computers in the Internet.
  • None of the above.

Frage 7

Frage
What is an I.S.P.?
Antworten
  • It is a special computer designed to browse the internet.
  • It is a company to save information in the client computers connected to the Internet.
  • It is a company that provides the service to connect client computers to the Internet.
  • None of the above.

Frage 8

Frage
Which is the purpose that represents the functionality of the Web 1.0?
Antworten
  • To communicate.
  • To Share.
  • To inform.
  • To connect.
  • All of the above.

Frage 9

Frage
Which is the purpose that represents the functionality of the earlier versions to the Internet?
Antworten
  • To communicate.
  • To connect.
  • To share.
  • To inform.
  • None of the above.

Frage 10

Frage
Which is the purpose that represents the functionality of the Web 2.0?
Antworten
  • To share.
  • To connect.
  • To inform.
  • To communicate.
  • None of the above.

Frage 11

Frage
Which is the purpose that represents the functionality of the Web 3.0?
Antworten
  • To connect devices.
  • To communicate people.
  • To share information.
  • To provide useful information about user.
  • None of the above.

Frage 12

Frage
The user role in Web 1.0 was a Information consumer.
Antworten
  • True
  • False

Frage 13

Frage
The user role in Web 2.0 is Information producer.
Antworten
  • True
  • False

Frage 14

Frage
The main purpose in Web 3.0 is to learn about the user information to provide better information to him.
Antworten
  • True
  • False

Frage 15

Frage
Which of the following sentences related with the image are not true:
Antworten
  • A repeated behavior leads to create an habit.
  • Our habits are based on our beliefs.
  • Our behavior is leaded by our emotions.
  • The first step to reach an habit, is to create a belief.
  • None of above.

Frage 16

Frage
[blank_start]Sexting[blank_end] is the sending of sexually explicit digital images, videos, text messages, or emails, usually by cell phone.
Antworten
  • Sexting

Frage 17

Frage
[blank_start]Grooming[blank_end] means that an adult is getting to know and befriending a child with the intention of sexually abusing it.
Antworten
  • Grooming

Frage 18

Frage
[blank_start]Phishing[blank_end] is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Antworten
  • Phishing

Frage 19

Frage
[blank_start]Hacking[blank_end] is an attempt to exploit a computer system or a private network inside a computer.
Antworten
  • Hacking

Frage 20

Frage
[blank_start]Cyberwar[blank_end] is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
Antworten
  • Cyberwar

Frage 21

Frage
A [blank_start]white[blank_end] hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security.
Antworten
  • white

Frage 22

Frage
A [blank_start]black[blank_end] hat hacker is a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
Antworten
  • black

Frage 23

Frage
What is Netiquette?
Antworten
  • Rules of etiquette that apply when communicating over computer networks, especially the Internet.
  • Rules of etiquette that apply when people use communications devices.
  • Common guidelines include being courteous and precise, and avoiding cyber-bullying and obey copyright laws.
  • All of the above.

Frage 24

Frage
If you write using [blank_start]caps[blank_end] is considered to be shouting.
Antworten
  • caps

Frage 25

Frage
Another netiquette rule could be: Do not reveal your sensitive [blank_start]information[blank_end] online.
Antworten
  • information

Frage 26

Frage
What is Malware?
Antworten
  • Is a special kind of hacker that uses malicious intentions to attack information systems.
  • Is an specific computer virus that attacks the computer like a trojan horse.
  • Is an specific software which is designed to disrupt, damage, or gain authorized access to a computer system.
  • All of the above.
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

CCNA Answers – CCNA Exam
Abdul Demir
Network Protocols
Shannon Anderson-Rush
Materials (vocabulary)
Jesús García
Introduction to the Internet
Shannon Anderson-Rush
Construcción de software
CRHISTIAN SUAREZ
Tarea 1 - La Naturaleza de la Electricidad
Paula Andrea
Home networks
johnson8221
The Internet
Gee_0599
Edgar Zepeda-Glosario
EDGAR ISAAC ZEPEDA LOZANO
Wireless Networking
Tunds
Client Server DHCP-DNS
cloud3413