Questão 1
Questão
"Time Sharing" was a strategy in the 90's to provide access to computers for many expert users.
Questão 2
Questão
Which was the influence of Cold War in the history of Internet?
Responda
-
The Cold War provided the resources needed to build Internet.
-
The Cold War concentrated the nations to get strategic advantages.
-
The Cold War improved the international relationships.
-
The Cold War ordered east and west in a different way.
-
None of above.
Questão 3
Questão
What is a Mainframe?
Responda
-
A powerful computer used over the Internet.
-
A computer that brings the opportunity to work simultaneously to a hundreds of users.
-
A computer that saves information in the Internet.
-
All of the above.
Questão 4
Questão
In which decade Internet was called like that, and start running?
Responda
-
80's
-
90's
-
70's
-
60's
-
None of the above.
Questão 5
Questão
What is a Server?
Responda
-
Is a special computer connected to a network.
-
Is a special computer connected directly to the Internet.
-
Is a special computer disconnected to a network.
-
All of the above.
Questão 6
Questão
What is an Internet Protocol Address? (I.P. Address)
Responda
-
Is an unique identifier to connect a device to a network.
-
Is a piece of hardware important to connect to the Internet.
-
Is a number to identify a specific group of computers in the Internet.
-
None of the above.
Questão 7
Questão
What is an I.S.P.?
Responda
-
It is a special computer designed to browse the internet.
-
It is a company to save information in the client computers connected to the Internet.
-
It is a company that provides the service to connect client computers to the Internet.
-
None of the above.
Questão 8
Questão
Which is the purpose that represents the functionality of the Web 1.0?
Responda
-
To communicate.
-
To Share.
-
To inform.
-
To connect.
-
All of the above.
Questão 9
Questão
Which is the purpose that represents the functionality of the earlier versions to the Internet?
Responda
-
To communicate.
-
To connect.
-
To share.
-
To inform.
-
None of the above.
Questão 10
Questão
Which is the purpose that represents the functionality of the Web 2.0?
Responda
-
To share.
-
To connect.
-
To inform.
-
To communicate.
-
None of the above.
Questão 11
Questão
Which is the purpose that represents the functionality of the Web 3.0?
Questão 12
Questão
The user role in Web 1.0 was a Information consumer.
Questão 13
Questão
The user role in Web 2.0 is Information producer.
Questão 14
Questão
The main purpose in Web 3.0 is to learn about the user information to provide better information to him.
Questão 15
Questão
Which of the following sentences related with the image are not true:
Responda
-
A repeated behavior leads to create an habit.
-
Our habits are based on our beliefs.
-
Our behavior is leaded by our emotions.
-
The first step to reach an habit, is to create a belief.
-
None of above.
Questão 16
Questão
[blank_start]Sexting[blank_end] is the sending of sexually explicit digital images, videos, text messages, or emails, usually by cell phone.
Questão 17
Questão
[blank_start]Grooming[blank_end] means that an adult is getting to know and befriending a child with the intention of sexually abusing it.
Questão 18
Questão
[blank_start]Phishing[blank_end] is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Questão 19
Questão
[blank_start]Hacking[blank_end] is an attempt to exploit a computer system or a private network inside a computer.
Questão 20
Questão
[blank_start]Cyberwar[blank_end] is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
Questão 21
Questão
A [blank_start]white[blank_end] hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security.
Questão 22
Questão
A [blank_start]black[blank_end] hat hacker is a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
Questão 23
Questão
What is Netiquette?
Responda
-
Rules of etiquette that apply when communicating over computer networks, especially the Internet.
-
Rules of etiquette that apply when people use communications devices.
-
Common guidelines include being courteous and precise, and avoiding cyber-bullying and obey copyright laws.
-
All of the above.
Questão 24
Questão
If you write using [blank_start]caps[blank_end] is considered to be shouting.
Questão 25
Questão
Another netiquette rule could be: Do not reveal your sensitive [blank_start]information[blank_end] online.
Questão 26
Responda
-
Is a special kind of hacker that uses malicious intentions to attack information systems.
-
Is an specific computer virus that attacks the computer like a trojan horse.
-
Is an specific software which is designed to disrupt, damage, or gain authorized access to a computer system.
-
All of the above.