1. Which came first, the World Wide Web or the Internet? World Wide Web Internet
ID: 3793920 • Letter: 1
Question
1. Which came first, the World Wide Web or the Internet?
World Wide Web
Internet
Neither. The Web is the same thing as the Internet
2. When the cursor is positioned over a hyperlink how can you tell where the link will take you?
You can't
Look for a URL on the status line at the bottom of the window
Look for a URL on the status line at the top of the window
Double-click the hyperlink
3. The primary purpose of encryption is to reduce the amount of data that must be stored or sent across a computer network.
True
False
4. The primary purpose of compression is to is to prevent unauthorized access to data while it is either in storage or being transmitted.
True
False
5. Content on the Internet that doesn't have a copyright symbol may be legally copied. It is only illegal to copy content that has a copyright symbol (assuming you don't have permission of the author or are copying the content as part of news reporting, etc.).
True
False
6. Bandwidth is the amount of data that can be passed along a communications channel in a given period of time.
True
False
7. What is the language used to encode web pages on the Internet?
Java
JavaScript
HTML
Semantic Web Language
8. With most forms of cloud computing:
Applications and user data are stored locally.
Applications are stored locally but user data is stored remotely
Applications are stored remotely but user data is stored locally
Applications and user data are both stored remotely
9. It's not unusual to get an email that appears to be from eBay or other well-known site asking you to click on a link to correct some irregularity with your account. It is most likely a bogus email from someone attempting to defraud you. If so, what technique is being used?
Trojan Horse
Cyber Bandit
Phishing
Denial-of-Service
10. You go to a file sharing web site and learn that in order to share files you have to download and install a client program. You do so but unbeknownst to you the client program that you install also scans your hard drive and sends any excel spreadsheets it finds to a computer in Romania. The file sharing program that you downloaded can best be described as a _______________.
Trojan Horse
Cyber Bandit
Anti-Phishing program
Firewall
11. A computer firewall may run as software on the computer it is protecting or be located on a dedicated device (hardware) located somewhere between the computer it is protecting and the external network.
True
False
12. It is always safe to click on an email attachment as long as the message is from someone you know and trust.
True
False
13. HTML is a programming language.
True
False
14. Cookies are commonly used by Web sites
to attract the attention of search engines
to prevent viruses from spreading
to personalize visitor experiences
for animation
as components in Cascade Style Sheets (CSS)
15. It's never a good idea to allow your browser to accept cookies from shopping sites because the security risks posed by cookies far outweigh any possible benefits.
True
False
16. Where is the Internet's central hub and control center located?
Washington, D.C.
Apple
An undisclosed location in North America
Silicon Valley
Nowhere; the Internet has no central hub or control center
17. Which of the following domains is restricted to qualified organizations? (A restricted domain is one that is granted only when the individual or organization requesting the domain name can show proof of eligibility. Unrestricted domains are given to anyone.)
.com
.org
.net
.edu
None of the above are restricted. Anyone can have a domain name in any of the above top-level domains.
18. The primary function of DNS (Domain Name System) is to
Translates IP addresses into domain names
Translates domain names into IP addresses
Store the registered location of each domain name
Store the registered owner of each domain name
19. The terms World Wide Web and Internet are sometimes used interchangeably, but in general the World Wide Web adds a graphical user interface (GUI) and ______________ to the Internet.
security
reliability
process capability
hypertext capability
20. Which of the following, if true, would be a violation of the principle of net neutrality?
Google using browsing history to deliver targeted advertising
Facebook making a change that allows some of your content to be available to a wider audiance
Time Warner Cable slowing your Internet connection to Netflix because their video streaming competes with their own video offerings.
Developing countries having less restrictive intellectual property laws (or lax enforcement of existing laws) than those in developed countries.
21. Net neutrality is pretty much guaranteed in the future because of the way the Internet was designed.
True
False
22. After searching for expensive shoes you might notice advertisements for the same shoes following you around on the internet, appearing at web sites you never visited in the past. What technology or protocol is primarily responsible for the ability of web sites to show you targeted advertisements like this.
Third-party cookies
HTTP
TCP/IP
JavaScript
23. It's OK (doesn't increase vulnerability) to use the same password at different web sites as long as the password is strong (conforms to guidelines for creating a secure password).
True
False
24. Password strength is determined only by the length of the password.
True
False
25. When a hacker steals personal information with the intent of impersonating another individual to commit fraud, this is known as:
impersonation theft
scareware
identity theft
information robbery
World Wide Web
Internet
Neither. The Web is the same thing as the Internet
2. When the cursor is positioned over a hyperlink how can you tell where the link will take you?
You can't
Look for a URL on the status line at the bottom of the window
Look for a URL on the status line at the top of the window
Double-click the hyperlink
3. The primary purpose of encryption is to reduce the amount of data that must be stored or sent across a computer network.
True
False
4. The primary purpose of compression is to is to prevent unauthorized access to data while it is either in storage or being transmitted.
True
False
5. Content on the Internet that doesn't have a copyright symbol may be legally copied. It is only illegal to copy content that has a copyright symbol (assuming you don't have permission of the author or are copying the content as part of news reporting, etc.).
True
False
6. Bandwidth is the amount of data that can be passed along a communications channel in a given period of time.
True
False
7. What is the language used to encode web pages on the Internet?
Java
JavaScript
HTML
Semantic Web Language
8. With most forms of cloud computing:
Applications and user data are stored locally.
Applications are stored locally but user data is stored remotely
Applications are stored remotely but user data is stored locally
Applications and user data are both stored remotely
9. It's not unusual to get an email that appears to be from eBay or other well-known site asking you to click on a link to correct some irregularity with your account. It is most likely a bogus email from someone attempting to defraud you. If so, what technique is being used?
Trojan Horse
Cyber Bandit
Phishing
Denial-of-Service
10. You go to a file sharing web site and learn that in order to share files you have to download and install a client program. You do so but unbeknownst to you the client program that you install also scans your hard drive and sends any excel spreadsheets it finds to a computer in Romania. The file sharing program that you downloaded can best be described as a _______________.
Trojan Horse
Cyber Bandit
Anti-Phishing program
Firewall
11. A computer firewall may run as software on the computer it is protecting or be located on a dedicated device (hardware) located somewhere between the computer it is protecting and the external network.
True
False
12. It is always safe to click on an email attachment as long as the message is from someone you know and trust.
True
False
13. HTML is a programming language.
True
False
14. Cookies are commonly used by Web sites
to attract the attention of search engines
to prevent viruses from spreading
to personalize visitor experiences
for animation
as components in Cascade Style Sheets (CSS)
15. It's never a good idea to allow your browser to accept cookies from shopping sites because the security risks posed by cookies far outweigh any possible benefits.
True
False
16. Where is the Internet's central hub and control center located?
Washington, D.C.
Apple
An undisclosed location in North America
Silicon Valley
Nowhere; the Internet has no central hub or control center
17. Which of the following domains is restricted to qualified organizations? (A restricted domain is one that is granted only when the individual or organization requesting the domain name can show proof of eligibility. Unrestricted domains are given to anyone.)
.com
.org
.net
.edu
None of the above are restricted. Anyone can have a domain name in any of the above top-level domains.
18. The primary function of DNS (Domain Name System) is to
Translates IP addresses into domain names
Translates domain names into IP addresses
Store the registered location of each domain name
Store the registered owner of each domain name
19. The terms World Wide Web and Internet are sometimes used interchangeably, but in general the World Wide Web adds a graphical user interface (GUI) and ______________ to the Internet.
security
reliability
process capability
hypertext capability
20. Which of the following, if true, would be a violation of the principle of net neutrality?
Google using browsing history to deliver targeted advertising
Facebook making a change that allows some of your content to be available to a wider audiance
Time Warner Cable slowing your Internet connection to Netflix because their video streaming competes with their own video offerings.
Developing countries having less restrictive intellectual property laws (or lax enforcement of existing laws) than those in developed countries.
21. Net neutrality is pretty much guaranteed in the future because of the way the Internet was designed.
True
False
22. After searching for expensive shoes you might notice advertisements for the same shoes following you around on the internet, appearing at web sites you never visited in the past. What technology or protocol is primarily responsible for the ability of web sites to show you targeted advertisements like this.
Third-party cookies
HTTP
TCP/IP
JavaScript
23. It's OK (doesn't increase vulnerability) to use the same password at different web sites as long as the password is strong (conforms to guidelines for creating a secure password).
True
False
24. Password strength is determined only by the length of the password.
True
False
25. When a hacker steals personal information with the intent of impersonating another individual to commit fraud, this is known as:
impersonation theft
scareware
identity theft
information robbery
Explanation / Answer
1. Internet came first. World wide web is an extension to the internet idea.
2. Look for the url on the status line at the bottom of the window.
3. False. The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the internet or other computer network.
4. False. Compression is useful because it reduces resources required to store and transmit data.
5. False. As per Berne copyright convention, for example in USA, everything created privately or originally after April 1 2989, is copyrighted and protected , whether it has a notice or no.
6. True.
7. HTML is used to encode web pages on the internet.
8. Applications and user data both stored remotely.
9. Phishing
10. Trojan horse
11. True.
12. True
13. False. It is a markup language and does not contain programming logic.
14. Cookies are used to per1sonalize visitor's experience.
15. False. Cookies are threats for viruses or malware.
16. Nowhere, the internet has no central hub or control centre.
17. The restricted domains are .edu
18. Translate domain names into IP address.
19. Hypertext capability
20. Time Warner Cable slowing your Internet connection to Netflix because their video streaming competes with their own video offerings.
21. True
22. Third party cookies.
23. False. It may lead to vulnerabilities of hacking other accounts too.
24. False. It also must be by The combinations of characters in it like letters, numbers, symbols, combination of uppercase and lowercase letters along with its length.
25.When a hacker steals personal information with the intent of impersonating another individual to commit fraud, this is known as: identity theft.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.