8º - Internet and Ethical use of Technology

Description

Noveno Tecnología Quiz on 8º - Internet and Ethical use of Technology, created by Julian Perez on 15/05/2018.
Julian Perez
Quiz by Julian Perez, updated more than 1 year ago
Julian Perez
Created by Julian Perez over 6 years ago
142
1

Resource summary

Question 1

Question
"Time Sharing" was a strategy in the 90's to provide access to computers for many expert users.
Answer
  • True
  • False

Question 2

Question
Which was the influence of Cold War in the history of Internet?
Answer
  • The Cold War provided the resources needed to build Internet.
  • The Cold War concentrated the nations to get strategic advantages.
  • The Cold War improved the international relationships.
  • The Cold War ordered east and west in a different way.
  • None of above.

Question 3

Question
What is a Mainframe?
Answer
  • A powerful computer used over the Internet.
  • A computer that brings the opportunity to work simultaneously to a hundreds of users.
  • A computer that saves information in the Internet.
  • All of the above.

Question 4

Question
In which decade Internet was called like that, and start running?
Answer
  • 80's
  • 90's
  • 70's
  • 60's
  • None of the above.

Question 5

Question
What is a Server?
Answer
  • Is a special computer connected to a network.
  • Is a special computer connected directly to the Internet.
  • Is a special computer disconnected to a network.
  • All of the above.

Question 6

Question
What is an Internet Protocol Address? (I.P. Address)
Answer
  • Is an unique identifier to connect a device to a network.
  • Is a piece of hardware important to connect to the Internet.
  • Is a number to identify a specific group of computers in the Internet.
  • None of the above.

Question 7

Question
What is an I.S.P.?
Answer
  • It is a special computer designed to browse the internet.
  • It is a company to save information in the client computers connected to the Internet.
  • It is a company that provides the service to connect client computers to the Internet.
  • None of the above.

Question 8

Question
Which is the purpose that represents the functionality of the Web 1.0?
Answer
  • To communicate.
  • To Share.
  • To inform.
  • To connect.
  • All of the above.

Question 9

Question
Which is the purpose that represents the functionality of the earlier versions to the Internet?
Answer
  • To communicate.
  • To connect.
  • To share.
  • To inform.
  • None of the above.

Question 10

Question
Which is the purpose that represents the functionality of the Web 2.0?
Answer
  • To share.
  • To connect.
  • To inform.
  • To communicate.
  • None of the above.

Question 11

Question
Which is the purpose that represents the functionality of the Web 3.0?
Answer
  • To connect devices.
  • To communicate people.
  • To share information.
  • To provide useful information about user.
  • None of the above.

Question 12

Question
The user role in Web 1.0 was a Information consumer.
Answer
  • True
  • False

Question 13

Question
The user role in Web 2.0 is Information producer.
Answer
  • True
  • False

Question 14

Question
The main purpose in Web 3.0 is to learn about the user information to provide better information to him.
Answer
  • True
  • False

Question 15

Question
Which of the following sentences related with the image are not true:
Answer
  • A repeated behavior leads to create an habit.
  • Our habits are based on our beliefs.
  • Our behavior is leaded by our emotions.
  • The first step to reach an habit, is to create a belief.
  • None of above.

Question 16

Question
[blank_start]Sexting[blank_end] is the sending of sexually explicit digital images, videos, text messages, or emails, usually by cell phone.
Answer
  • Sexting

Question 17

Question
[blank_start]Grooming[blank_end] means that an adult is getting to know and befriending a child with the intention of sexually abusing it.
Answer
  • Grooming

Question 18

Question
[blank_start]Phishing[blank_end] is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Answer
  • Phishing

Question 19

Question
[blank_start]Hacking[blank_end] is an attempt to exploit a computer system or a private network inside a computer.
Answer
  • Hacking

Question 20

Question
[blank_start]Cyberwar[blank_end] is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
Answer
  • Cyberwar

Question 21

Question
A [blank_start]white[blank_end] hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security.
Answer
  • white

Question 22

Question
A [blank_start]black[blank_end] hat hacker is a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
Answer
  • black

Question 23

Question
What is Netiquette?
Answer
  • Rules of etiquette that apply when communicating over computer networks, especially the Internet.
  • Rules of etiquette that apply when people use communications devices.
  • Common guidelines include being courteous and precise, and avoiding cyber-bullying and obey copyright laws.
  • All of the above.

Question 24

Question
If you write using [blank_start]caps[blank_end] is considered to be shouting.
Answer
  • caps

Question 25

Question
Another netiquette rule could be: Do not reveal your sensitive [blank_start]information[blank_end] online.
Answer
  • information

Question 26

Question
What is Malware?
Answer
  • Is a special kind of hacker that uses malicious intentions to attack information systems.
  • Is an specific computer virus that attacks the computer like a trojan horse.
  • Is an specific software which is designed to disrupt, damage, or gain authorized access to a computer system.
  • All of the above.
Show full summary Hide full summary

Similar

CCNA Answers – CCNA Exam
Abdul Demir
Network Protocols
Shannon Anderson-Rush
Materials (vocabulary)
Jesús García
Introduction to the Internet
Shannon Anderson-Rush
Construcción de software
CRHISTIAN SUAREZ
Tarea 1 - La Naturaleza de la Electricidad
Paula Andrea
FICHA DE RESUMEN: GESTIÓN DE LA INFORMACIÓN.
Krista Davila
Home networks
johnson8221
The Internet
Gee_0599
Edgar Zepeda-Glosario
EDGAR ISAAC ZEPEDA LOZANO
Wireless Networking
Tunds