Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. Which came first, the World Wide Web or the Internet? World Wide Web Internet

ID: 3793920 • Letter: 1

Question

1. Which came first, the World Wide Web or the Internet?

World Wide Web

Internet

Neither. The Web is the same thing as the Internet

2. When the cursor is positioned over a hyperlink how can you tell where the link will take you?

You can't

Look for a URL on the status line at the bottom of the window

Look for a URL on the status line at the top of the window

Double-click the hyperlink                   

3. The primary purpose of encryption is to reduce the amount of data that must be stored or sent across a computer network.

  True

  False

4. The primary purpose of compression is to is to prevent unauthorized access to data while it is either in storage or being transmitted.

  True

  False

5. Content on the Internet that doesn't have a copyright symbol may be legally copied. It is only illegal to copy content that has a copyright symbol (assuming you don't have permission of the author or are copying the content as part of news reporting, etc.).

  True

  False

6. Bandwidth is the amount of data that can be passed along a communications channel in a given period of time.

  True

  False

7. What is the language used to encode web pages on the Internet?

Java

JavaScript

HTML

Semantic Web Language

8. With most forms of cloud computing:

Applications and user data are stored locally.

Applications are stored locally but user data is stored remotely

Applications are stored remotely but user data is stored locally

Applications and user data are both stored remotely

9. It's not unusual to get an email that appears to be from eBay or other well-known site asking you to click on a link to correct some irregularity with your account. It is most likely a bogus email from someone attempting to defraud you. If so, what technique is being used?

Trojan Horse

Cyber Bandit

Phishing

Denial-of-Service

10. You go to a file sharing web site and learn that in order to share files you have to download and install a client program. You do so but unbeknownst to you the client program that you install also scans your hard drive and sends any excel spreadsheets it finds to a computer in Romania. The file sharing program that you downloaded can best be described as a _______________.

Trojan Horse

Cyber Bandit

Anti-Phishing program

Firewall

11. A computer firewall may run as software on the computer it is protecting or be located on a dedicated device (hardware) located somewhere between the computer it is protecting and the external network.

  True

  False

12. It is always safe to click on an email attachment as long as the message is from someone you know and trust.

  True

  False

13. HTML is a programming language.

  True

  False

14. Cookies are commonly used by Web sites

to attract the attention of search engines

to prevent viruses from spreading

to personalize visitor experiences

for animation

as components in Cascade Style Sheets (CSS)

15. It's never a good idea to allow your browser to accept cookies from shopping sites because the security risks posed by cookies far outweigh any possible benefits.

  True

  False

16. Where is the Internet's central hub and control center located?

Washington, D.C.

Google

Apple

An undisclosed location in North America

Silicon Valley

Nowhere; the Internet has no central hub or control center

17. Which of the following domains is restricted to qualified organizations? (A restricted domain is one that is granted only when the individual or organization requesting the domain name can show proof of eligibility. Unrestricted domains are given to anyone.)

.com

.org

.net

.edu

None of the above are restricted. Anyone can have a domain name in any of the above top-level domains.

18. The primary function of DNS (Domain Name System) is to

Translates IP addresses into domain names

Translates domain names into IP addresses

Store the registered location of each domain name

Store the registered owner of each domain name

19. The terms World Wide Web and Internet are sometimes used interchangeably, but in general the World Wide Web adds a graphical user interface (GUI) and ______________ to the Internet.

security

reliability

process capability

hypertext capability

20. Which of the following, if true, would be a violation of the principle of net neutrality?

Google using browsing history to deliver targeted advertising

Facebook making a change that allows some of your content to be available to a wider audiance

Time Warner Cable slowing your Internet connection to Netflix because their video streaming competes with their own video offerings.

Developing countries having less restrictive intellectual property laws (or lax enforcement of existing laws) than those in developed countries.

21. Net neutrality is pretty much guaranteed in the future because of the way the Internet was designed.

  True

  False

22. After searching for expensive shoes you might notice advertisements for the same shoes following you around on the internet, appearing at web sites you never visited in the past. What technology or protocol is primarily responsible for the ability of web sites to show you targeted advertisements like this.

Third-party cookies

HTTP

TCP/IP

JavaScript

23. It's OK (doesn't increase vulnerability) to use the same password at different web sites as long as the password is strong (conforms to guidelines for creating a secure password).

  True

  False

24. Password strength is determined only by the length of the password.

  True

  False

25. When a hacker steals personal information with the intent of impersonating another individual to commit fraud, this is known as:

impersonation theft

scareware

identity theft

information robbery


World Wide Web

Internet

Neither. The Web is the same thing as the Internet

2. When the cursor is positioned over a hyperlink how can you tell where the link will take you?

You can't

Look for a URL on the status line at the bottom of the window

Look for a URL on the status line at the top of the window

Double-click the hyperlink                   

3. The primary purpose of encryption is to reduce the amount of data that must be stored or sent across a computer network.

  True

  False

4. The primary purpose of compression is to is to prevent unauthorized access to data while it is either in storage or being transmitted.

  True

  False

5. Content on the Internet that doesn't have a copyright symbol may be legally copied. It is only illegal to copy content that has a copyright symbol (assuming you don't have permission of the author or are copying the content as part of news reporting, etc.).

  True

  False

6. Bandwidth is the amount of data that can be passed along a communications channel in a given period of time.

  True

  False

7. What is the language used to encode web pages on the Internet?

Java

JavaScript

HTML

Semantic Web Language

8. With most forms of cloud computing:

Applications and user data are stored locally.

Applications are stored locally but user data is stored remotely

Applications are stored remotely but user data is stored locally

Applications and user data are both stored remotely

9. It's not unusual to get an email that appears to be from eBay or other well-known site asking you to click on a link to correct some irregularity with your account. It is most likely a bogus email from someone attempting to defraud you. If so, what technique is being used?

Trojan Horse

Cyber Bandit

Phishing

Denial-of-Service

10. You go to a file sharing web site and learn that in order to share files you have to download and install a client program. You do so but unbeknownst to you the client program that you install also scans your hard drive and sends any excel spreadsheets it finds to a computer in Romania. The file sharing program that you downloaded can best be described as a _______________.

Trojan Horse

Cyber Bandit

Anti-Phishing program

Firewall

11. A computer firewall may run as software on the computer it is protecting or be located on a dedicated device (hardware) located somewhere between the computer it is protecting and the external network.

  True

  False

12. It is always safe to click on an email attachment as long as the message is from someone you know and trust.

  True

  False

13. HTML is a programming language.

  True

  False

14. Cookies are commonly used by Web sites

to attract the attention of search engines

to prevent viruses from spreading

to personalize visitor experiences

for animation

as components in Cascade Style Sheets (CSS)

15. It's never a good idea to allow your browser to accept cookies from shopping sites because the security risks posed by cookies far outweigh any possible benefits.

  True

  False

16. Where is the Internet's central hub and control center located?

Washington, D.C.

Google

Apple

An undisclosed location in North America

Silicon Valley

Nowhere; the Internet has no central hub or control center

17. Which of the following domains is restricted to qualified organizations? (A restricted domain is one that is granted only when the individual or organization requesting the domain name can show proof of eligibility. Unrestricted domains are given to anyone.)

.com

.org

.net

.edu

None of the above are restricted. Anyone can have a domain name in any of the above top-level domains.

18. The primary function of DNS (Domain Name System) is to

Translates IP addresses into domain names

Translates domain names into IP addresses

Store the registered location of each domain name

Store the registered owner of each domain name

19. The terms World Wide Web and Internet are sometimes used interchangeably, but in general the World Wide Web adds a graphical user interface (GUI) and ______________ to the Internet.

security

reliability

process capability

hypertext capability

20. Which of the following, if true, would be a violation of the principle of net neutrality?

Google using browsing history to deliver targeted advertising

Facebook making a change that allows some of your content to be available to a wider audiance

Time Warner Cable slowing your Internet connection to Netflix because their video streaming competes with their own video offerings.

Developing countries having less restrictive intellectual property laws (or lax enforcement of existing laws) than those in developed countries.

21. Net neutrality is pretty much guaranteed in the future because of the way the Internet was designed.

  True

  False

22. After searching for expensive shoes you might notice advertisements for the same shoes following you around on the internet, appearing at web sites you never visited in the past. What technology or protocol is primarily responsible for the ability of web sites to show you targeted advertisements like this.

Third-party cookies

HTTP

TCP/IP

JavaScript

23. It's OK (doesn't increase vulnerability) to use the same password at different web sites as long as the password is strong (conforms to guidelines for creating a secure password).

  True

  False

24. Password strength is determined only by the length of the password.

  True

  False

25. When a hacker steals personal information with the intent of impersonating another individual to commit fraud, this is known as:

impersonation theft

scareware

identity theft

information robbery


Explanation / Answer

1. Internet came first. World wide web is an extension to the internet idea.

2. Look for the url on the status line at the bottom of the window.

3. False. The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the internet or other computer network.

4. False. Compression is useful because it reduces resources required to store and transmit data.

5. False. As per Berne copyright convention, for example in USA, everything created privately or originally after April 1 2989, is copyrighted and protected , whether it has a notice or no.

6. True.

7. HTML is used to encode web pages on the internet.

8. Applications and user data both stored remotely.

9. Phishing

10. Trojan horse

11. True.

12. True

13. False. It is a markup language and does not contain programming logic.

14. Cookies are used to per1sonalize visitor's experience.

15. False. Cookies are threats for viruses or malware.

16. Nowhere, the internet has no central hub or control centre.

17. The restricted domains are .edu

18. Translate domain names into IP address.

19. Hypertext capability

20. Time Warner Cable slowing your Internet connection to Netflix because their video streaming competes with their own video offerings.

21. True

22. Third party cookies.

23. False. It may lead to vulnerabilities of hacking other accounts too.

24. False. It also must be by The combinations of characters in it like letters, numbers, symbols, combination of uppercase and lowercase letters along with its length.

25.When a hacker steals personal information with the intent of impersonating another individual to commit fraud, this is known as: identity theft.