Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CIS 150 EXAM 1-2: Internet/Networks/Security/Ethics In-class activity, Exams of Computer Science

internet/Networks/Security/Ethics In-class activity

Typology: Exams

2022/2023

Available from 02/08/2024

sarah-miller-6
sarah-miller-6 🇬🇧

5

(2)

65 documents

1 / 9

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CIS 150 Exam 1-2: Internet/Networks/Security/Ethics
IP -
. Every computer or device that is on the Internet needs a(n) ______ address that uniquely identifies it.
CSNET -
. The National Science Foundation (NSF) created ______ in 1981 to bring together researchers in the
field of computer science.
No single person or group controls the internet. -
. Who owns the Internet?
HTML -
. In 1990, the first web page was created in a language called _______ and placed on the first web
server.
website -
. Web pages that are linked to each other make up a _____________.
delete -
. If you don't recognize the sender of an email or if the content of the message is suspicious, you
should _________ the email immediately.
Subject -
. Always include the topic or purpose of your message in the ___________ box.
Google
pf3
pf4
pf5
pf8
pf9

Partial preview of the text

Download CIS 150 EXAM 1-2: Internet/Networks/Security/Ethics In-class activity and more Exams Computer Science in PDF only on Docsity!

CIS 150 Exam 1-2: Internet/Networks/Security/Ethics

IP -

. Every computer or device that is on the Internet needs a(n) ______ address that uniquely identifies it. CSNET - . The National Science Foundation (NSF) created ______ in 1981 to bring together researchers in the field of computer science. No single person or group controls the internet. - . Who owns the Internet? HTML - . In 1990, the first web page was created in a language called _______ and placed on the first web server. website - . Web pages that are linked to each other make up a _____________. delete - . If you don't recognize the sender of an email or if the content of the message is suspicious, you should _________ the email immediately. Subject - . Always include the topic or purpose of your message in the ___________ box. Google

Facebook Microsoft (Skype) -

. Select three companies that have popular instant messaging services. Voice over Internet Protocol (VoIP) - . ________ allows people to cancel their traditional phone service and make calls using their Internet connection. webcast - . A radio station can broadcast their programs online via a _____________, allowing people from around the world to listen to their shows online. peer-to-peer (P2P) - . Many software companies use ______ technology to distribute software and updates to millions of users at a time. Massively Multiplayer Online Role-PLaying Games (MMORPG) - . World of Warcraft and Fortnight are two examples of ______, or online video game sets in a virtual world where millions of people play with or against other players. Click on the Max, MaxPlus, and MaxTurbo hotspots. - . Ken wants to watch high-definition movies and be able to download data at a speed of at least 12 Mbps. Click on three home packages that will fit his needs. mobile hot spot - . If you are staying in an area that doesn't offer free wireless Internet, you can tether your computer to your smartphone and use it as a(n) ______.

. To help build trust between users of its service, online stores typically feature a ______ for rating buyers and sellers. sharing economy - . The ______ refer(s) to the way in which the Internet has enabled people to share (for a price) their time, goods or services. Cheating Plagiarism - . Copying large chunks of data from a web page and pasting them into your schoolwork without properly citing the source is known as ______. Select all that apply. extranet - . Contractors that have ongoing business with a company can log into its ______ by using a valid username and password. computer network - . Employees use their company's ______ to access documents, programs, and hardware devices. wide area network (WAN) - . A ______ is the connection of two or more central computers or LANS. Twisted-pair cable - . ______ is the most common medium used in homes and businesses. True - . (True/False)

Wi-Fi signals generally reach 100 to 200 feet indoors, unless the signal is blocked by walls or floors. TCP/IP -

. ______ is the communication protocol that rules how packets of data are transmitted. star mesh - . Select two types of network topologies. fiber-optic cables - . Ethernets generally use ______ when communicating over long distances. router - . Many ISPs give users a wireless broadband ______ that serves all the networking and Internet functions a home user needs. hub - . A ______ provides multiple ports for connecting nodes and transmits packets to all connected nodes. router - . In a small business or home network, the gateway is usually the ______. management information system (MIS) - . A(n) ______ helps managers use software tools to gather, organize, and evaluate information. expert system -

. Select the malware that is designed to report activity on your computer to another party. virus - . When a recipient opens an infected file, a ________ will activate itself and find more files to infect, often making your operating system unuseable. "white hat" - . Also known as _________ hackers, non-criminal hackers engage in hacking out of curiosity, not criminal intent. identity theft - . One way to help prevent ____________ is to check your credit reports regularly. Select the "Check with the Bank" hotspot. Select the "Ignore the Email" hotspot. - . Cam has an account with Bank of America. He received an email to renew his account. What should he do? encrypts - . Many companies make their communication more secure by using HTTPS, a protocol that ______ communication that contains financial or personal information. tunneling - . A virtual private network (VPN) uses a method called _____________ in which a packet from the sending computer is encapsulated within another packet before it's sent over the Internet. Select the "8 characters" hotspot.

Select the "SIMnet (both)" hotspot. Select the "9$7#21! (both)" hotspot. -

. Professor Smith wants to create a strong password for his bank account. Click on three strong guidelines. encryption - . A(n) ________ utility scrambles your data or communication, making it unreadable by anyone who doesn't have the proper key. No. It is not morally acceptable to download copyrighted music files that you didn't purchase. - . Is it ethical to illegally download music because your friends are doing it? copyrighted music copyrighted photographs copyrighted videos - . Many musicians don't download ______ because they feel empathy for fellow musicians who don't financially benefit from their creations. Select the three correct answers. 70 - . Works go into the public domain when their copyright expires, usually _____ years after an author dies. What is the nature of the work? What is the nature of the use? How much of the work is being copied? How will the copy affect the market? - . Select four questions you should ask yourself to determine whether fair use applies to your situation.