Question 1
Question
"Time Sharing" was a strategy in the 90's to provide access to computers for many expert users.
Question 2
Question
Which was the influence of Cold War in the history of Internet?
Answer
-
The Cold War provided the resources needed to build Internet.
-
The Cold War concentrated the nations to get strategic advantages.
-
The Cold War improved the international relationships.
-
The Cold War ordered east and west in a different way.
-
None of above.
Question 3
Question
What is a Mainframe?
Answer
-
A powerful computer used over the Internet.
-
A computer that brings the opportunity to work simultaneously to a hundreds of users.
-
A computer that saves information in the Internet.
-
All of the above.
Question 4
Question
In which decade Internet was called like that, and start running?
Answer
-
80's
-
90's
-
70's
-
60's
-
None of the above.
Question 5
Question
What is a Server?
Answer
-
Is a special computer connected to a network.
-
Is a special computer connected directly to the Internet.
-
Is a special computer disconnected to a network.
-
All of the above.
Question 6
Question
What is an Internet Protocol Address? (I.P. Address)
Answer
-
Is an unique identifier to connect a device to a network.
-
Is a piece of hardware important to connect to the Internet.
-
Is a number to identify a specific group of computers in the Internet.
-
None of the above.
Question 7
Question
What is an I.S.P.?
Answer
-
It is a special computer designed to browse the internet.
-
It is a company to save information in the client computers connected to the Internet.
-
It is a company that provides the service to connect client computers to the Internet.
-
None of the above.
Question 8
Question
Which is the purpose that represents the functionality of the Web 1.0?
Answer
-
To communicate.
-
To Share.
-
To inform.
-
To connect.
-
All of the above.
Question 9
Question
Which is the purpose that represents the functionality of the earlier versions to the Internet?
Answer
-
To communicate.
-
To connect.
-
To share.
-
To inform.
-
None of the above.
Question 10
Question
Which is the purpose that represents the functionality of the Web 2.0?
Answer
-
To share.
-
To connect.
-
To inform.
-
To communicate.
-
None of the above.
Question 11
Question
Which is the purpose that represents the functionality of the Web 3.0?
Question 12
Question
The user role in Web 1.0 was a Information consumer.
Question 13
Question
The user role in Web 2.0 is Information producer.
Question 14
Question
The main purpose in Web 3.0 is to learn about the user information to provide better information to him.
Question 15
Question
Which of the following sentences related with the image are not true:
Answer
-
A repeated behavior leads to create an habit.
-
Our habits are based on our beliefs.
-
Our behavior is leaded by our emotions.
-
The first step to reach an habit, is to create a belief.
-
None of above.
Question 16
Question
[blank_start]Sexting[blank_end] is the sending of sexually explicit digital images, videos, text messages, or emails, usually by cell phone.
Question 17
Question
[blank_start]Grooming[blank_end] means that an adult is getting to know and befriending a child with the intention of sexually abusing it.
Question 18
Question
[blank_start]Phishing[blank_end] is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Question 19
Question
[blank_start]Hacking[blank_end] is an attempt to exploit a computer system or a private network inside a computer.
Question 20
Question
[blank_start]Cyberwar[blank_end] is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
Question 21
Question
A [blank_start]white[blank_end] hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security.
Question 22
Question
A [blank_start]black[blank_end] hat hacker is a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
Question 23
Question
What is Netiquette?
Answer
-
Rules of etiquette that apply when communicating over computer networks, especially the Internet.
-
Rules of etiquette that apply when people use communications devices.
-
Common guidelines include being courteous and precise, and avoiding cyber-bullying and obey copyright laws.
-
All of the above.
Question 24
Question
If you write using [blank_start]caps[blank_end] is considered to be shouting.
Question 25
Question
Another netiquette rule could be: Do not reveal your sensitive [blank_start]information[blank_end] online.
Question 26
Question
What is Malware?
Answer
-
Is a special kind of hacker that uses malicious intentions to attack information systems.
-
Is an specific computer virus that attacks the computer like a trojan horse.
-
Is an specific software which is designed to disrupt, damage, or gain authorized access to a computer system.
-
All of the above.