Pregunta 1
Pregunta
"Time Sharing" was a strategy in the 90's to provide access to computers for many expert users.
Pregunta 2
Pregunta
Which was the influence of Cold War in the history of Internet?
Respuesta
-
The Cold War provided the resources needed to build Internet.
-
The Cold War concentrated the nations to get strategic advantages.
-
The Cold War improved the international relationships.
-
The Cold War ordered east and west in a different way.
-
None of above.
Pregunta 3
Pregunta
What is a Mainframe?
Respuesta
-
A powerful computer used over the Internet.
-
A computer that brings the opportunity to work simultaneously to a hundreds of users.
-
A computer that saves information in the Internet.
-
All of the above.
Pregunta 4
Pregunta
In which decade Internet was called like that, and start running?
Respuesta
-
80's
-
90's
-
70's
-
60's
-
None of the above.
Pregunta 5
Pregunta
What is a Server?
Respuesta
-
Is a special computer connected to a network.
-
Is a special computer connected directly to the Internet.
-
Is a special computer disconnected to a network.
-
All of the above.
Pregunta 6
Pregunta
What is an Internet Protocol Address? (I.P. Address)
Respuesta
-
Is an unique identifier to connect a device to a network.
-
Is a piece of hardware important to connect to the Internet.
-
Is a number to identify a specific group of computers in the Internet.
-
None of the above.
Pregunta 7
Pregunta
What is an I.S.P.?
Respuesta
-
It is a special computer designed to browse the internet.
-
It is a company to save information in the client computers connected to the Internet.
-
It is a company that provides the service to connect client computers to the Internet.
-
None of the above.
Pregunta 8
Pregunta
Which is the purpose that represents the functionality of the Web 1.0?
Respuesta
-
To communicate.
-
To Share.
-
To inform.
-
To connect.
-
All of the above.
Pregunta 9
Pregunta
Which is the purpose that represents the functionality of the earlier versions to the Internet?
Respuesta
-
To communicate.
-
To connect.
-
To share.
-
To inform.
-
None of the above.
Pregunta 10
Pregunta
Which is the purpose that represents the functionality of the Web 2.0?
Respuesta
-
To share.
-
To connect.
-
To inform.
-
To communicate.
-
None of the above.
Pregunta 11
Pregunta
Which is the purpose that represents the functionality of the Web 3.0?
Pregunta 12
Pregunta
The user role in Web 1.0 was a Information consumer.
Pregunta 13
Pregunta
The user role in Web 2.0 is Information producer.
Pregunta 14
Pregunta
The main purpose in Web 3.0 is to learn about the user information to provide better information to him.
Pregunta 15
Pregunta
Which of the following sentences related with the image are not true:
Respuesta
-
A repeated behavior leads to create an habit.
-
Our habits are based on our beliefs.
-
Our behavior is leaded by our emotions.
-
The first step to reach an habit, is to create a belief.
-
None of above.
Pregunta 16
Pregunta
[blank_start]Sexting[blank_end] is the sending of sexually explicit digital images, videos, text messages, or emails, usually by cell phone.
Pregunta 17
Pregunta
[blank_start]Grooming[blank_end] means that an adult is getting to know and befriending a child with the intention of sexually abusing it.
Pregunta 18
Pregunta
[blank_start]Phishing[blank_end] is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Pregunta 19
Pregunta
[blank_start]Hacking[blank_end] is an attempt to exploit a computer system or a private network inside a computer.
Pregunta 20
Pregunta
[blank_start]Cyberwar[blank_end] is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
Pregunta 21
Pregunta
A [blank_start]white[blank_end] hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security.
Pregunta 22
Pregunta
A [blank_start]black[blank_end] hat hacker is a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
Pregunta 23
Pregunta
What is Netiquette?
Respuesta
-
Rules of etiquette that apply when communicating over computer networks, especially the Internet.
-
Rules of etiquette that apply when people use communications devices.
-
Common guidelines include being courteous and precise, and avoiding cyber-bullying and obey copyright laws.
-
All of the above.
Pregunta 24
Pregunta
If you write using [blank_start]caps[blank_end] is considered to be shouting.
Pregunta 25
Pregunta
Another netiquette rule could be: Do not reveal your sensitive [blank_start]information[blank_end] online.
Pregunta 26
Pregunta
What is Malware?
Respuesta
-
Is a special kind of hacker that uses malicious intentions to attack information systems.
-
Is an specific computer virus that attacks the computer like a trojan horse.
-
Is an specific software which is designed to disrupt, damage, or gain authorized access to a computer system.
-
All of the above.