8º - Internet and Ethical use of Technology

Descripción

Noveno Tecnología Test sobre 8º - Internet and Ethical use of Technology, creado por Julian Perez el 15/05/2018.
Julian Perez
Test por Julian Perez, actualizado hace más de 1 año
Julian Perez
Creado por Julian Perez hace más de 6 años
142
1

Resumen del Recurso

Pregunta 1

Pregunta
"Time Sharing" was a strategy in the 90's to provide access to computers for many expert users.
Respuesta
  • True
  • False

Pregunta 2

Pregunta
Which was the influence of Cold War in the history of Internet?
Respuesta
  • The Cold War provided the resources needed to build Internet.
  • The Cold War concentrated the nations to get strategic advantages.
  • The Cold War improved the international relationships.
  • The Cold War ordered east and west in a different way.
  • None of above.

Pregunta 3

Pregunta
What is a Mainframe?
Respuesta
  • A powerful computer used over the Internet.
  • A computer that brings the opportunity to work simultaneously to a hundreds of users.
  • A computer that saves information in the Internet.
  • All of the above.

Pregunta 4

Pregunta
In which decade Internet was called like that, and start running?
Respuesta
  • 80's
  • 90's
  • 70's
  • 60's
  • None of the above.

Pregunta 5

Pregunta
What is a Server?
Respuesta
  • Is a special computer connected to a network.
  • Is a special computer connected directly to the Internet.
  • Is a special computer disconnected to a network.
  • All of the above.

Pregunta 6

Pregunta
What is an Internet Protocol Address? (I.P. Address)
Respuesta
  • Is an unique identifier to connect a device to a network.
  • Is a piece of hardware important to connect to the Internet.
  • Is a number to identify a specific group of computers in the Internet.
  • None of the above.

Pregunta 7

Pregunta
What is an I.S.P.?
Respuesta
  • It is a special computer designed to browse the internet.
  • It is a company to save information in the client computers connected to the Internet.
  • It is a company that provides the service to connect client computers to the Internet.
  • None of the above.

Pregunta 8

Pregunta
Which is the purpose that represents the functionality of the Web 1.0?
Respuesta
  • To communicate.
  • To Share.
  • To inform.
  • To connect.
  • All of the above.

Pregunta 9

Pregunta
Which is the purpose that represents the functionality of the earlier versions to the Internet?
Respuesta
  • To communicate.
  • To connect.
  • To share.
  • To inform.
  • None of the above.

Pregunta 10

Pregunta
Which is the purpose that represents the functionality of the Web 2.0?
Respuesta
  • To share.
  • To connect.
  • To inform.
  • To communicate.
  • None of the above.

Pregunta 11

Pregunta
Which is the purpose that represents the functionality of the Web 3.0?
Respuesta
  • To connect devices.
  • To communicate people.
  • To share information.
  • To provide useful information about user.
  • None of the above.

Pregunta 12

Pregunta
The user role in Web 1.0 was a Information consumer.
Respuesta
  • True
  • False

Pregunta 13

Pregunta
The user role in Web 2.0 is Information producer.
Respuesta
  • True
  • False

Pregunta 14

Pregunta
The main purpose in Web 3.0 is to learn about the user information to provide better information to him.
Respuesta
  • True
  • False

Pregunta 15

Pregunta
Which of the following sentences related with the image are not true:
Respuesta
  • A repeated behavior leads to create an habit.
  • Our habits are based on our beliefs.
  • Our behavior is leaded by our emotions.
  • The first step to reach an habit, is to create a belief.
  • None of above.

Pregunta 16

Pregunta
[blank_start]Sexting[blank_end] is the sending of sexually explicit digital images, videos, text messages, or emails, usually by cell phone.
Respuesta
  • Sexting

Pregunta 17

Pregunta
[blank_start]Grooming[blank_end] means that an adult is getting to know and befriending a child with the intention of sexually abusing it.
Respuesta
  • Grooming

Pregunta 18

Pregunta
[blank_start]Phishing[blank_end] is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Respuesta
  • Phishing

Pregunta 19

Pregunta
[blank_start]Hacking[blank_end] is an attempt to exploit a computer system or a private network inside a computer.
Respuesta
  • Hacking

Pregunta 20

Pregunta
[blank_start]Cyberwar[blank_end] is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
Respuesta
  • Cyberwar

Pregunta 21

Pregunta
A [blank_start]white[blank_end] hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security.
Respuesta
  • white

Pregunta 22

Pregunta
A [blank_start]black[blank_end] hat hacker is a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
Respuesta
  • black

Pregunta 23

Pregunta
What is Netiquette?
Respuesta
  • Rules of etiquette that apply when communicating over computer networks, especially the Internet.
  • Rules of etiquette that apply when people use communications devices.
  • Common guidelines include being courteous and precise, and avoiding cyber-bullying and obey copyright laws.
  • All of the above.

Pregunta 24

Pregunta
If you write using [blank_start]caps[blank_end] is considered to be shouting.
Respuesta
  • caps

Pregunta 25

Pregunta
Another netiquette rule could be: Do not reveal your sensitive [blank_start]information[blank_end] online.
Respuesta
  • information

Pregunta 26

Pregunta
What is Malware?
Respuesta
  • Is a special kind of hacker that uses malicious intentions to attack information systems.
  • Is an specific computer virus that attacks the computer like a trojan horse.
  • Is an specific software which is designed to disrupt, damage, or gain authorized access to a computer system.
  • All of the above.
Mostrar resumen completo Ocultar resumen completo

Similar

CCNA Answers – CCNA Exam
Abdul Demir
Network Protocols
Shannon Anderson-Rush
Materials (vocabulary)
Jesús García
Introduction to the Internet
Shannon Anderson-Rush
Construcción de software
CRHISTIAN SUAREZ
Tarea 1 - La Naturaleza de la Electricidad
Paula Andrea
Home networks
johnson8221
The Internet
Gee_0599
Edgar Zepeda-Glosario
EDGAR ISAAC ZEPEDA LOZANO
Wireless Networking
Tunds
Client Server DHCP-DNS
cloud3413