Internet and Cybersecurity Quiz
125 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary reason for the internet being more fault tolerant than other networks?

  • It relies on redundant servers.
  • It employs specialized routing protocols.
  • It utilizes a hierarchical system.
  • It uses a decentralized architecture. (correct)
  • Which of the following correctly describes the difference between IPv4 and IPv6 addresses?

  • IPv4 is used for local networks while IPv6 is for global networks.
  • IPv4 uses binary code while IPv6 uses decimal code.
  • IPv4 is more secure than IPv6.
  • IPv4 has a smaller address space than IPv6. (correct)
  • What is the role of the 'https' protocol in web browsing?

  • It facilitates faster data transfer speeds.
  • It encrypts data transmitted between the browser and the website. (correct)
  • It enables secure communication between multiple websites.
  • It allows access to websites through a dedicated server.
  • What is the significance of Network Address Translation (NAT) in home networking?

    <p>It allows multiple devices in a home to share a single public IP address. (C)</p> Signup and view all the answers

    Which of the following technologies is NOT used to transmit internet information?

    <p>Gravity (B)</p> Signup and view all the answers

    Which of the following is a way in which the internet can be used to communicate?

    <p>All of the above (D)</p> Signup and view all the answers

    Which of the following is NOT a type of cyberbullying?

    <p>The Vengeful Angel (C)</p> Signup and view all the answers

    What is an example of a physical vulnerability of the internet?

    <p>Cutting fiber-optic cables (A)</p> Signup and view all the answers

    Which of the following is a pro of using online textbooks?

    <p>They don't have to be carried around (D)</p> Signup and view all the answers

    What is a method used by governments to censor the internet?

    <p>Domain name system tampering (D)</p> Signup and view all the answers

    What is one way to prevent cyberbullying?

    <p>Blocking social media websites from school computers (D)</p> Signup and view all the answers

    What is a benefit of encryption?

    <p>It makes online transactions more secure (D)</p> Signup and view all the answers

    What is a con of online textbooks?

    <p>They can be distracting (A)</p> Signup and view all the answers

    What is a pro of anonymous online content?

    <p>It can protect people's privacy (D)</p> Signup and view all the answers

    What is a con of government censorship of the internet?

    <p>It can limit access to certain websites (D)</p> Signup and view all the answers

    What is NOT a way in which a search engine determines the ranking of websites?

    <p>The length of the website (B)</p> Signup and view all the answers

    What was one social problem that was solved using internet communication?

    <p>Distance learning during COVID-19 (A)</p> Signup and view all the answers

    What is NOT a characteristic of the 'Mean Girls' type of cyberbullying?

    <p>Trying to right wrongs (D)</p> Signup and view all the answers

    What is one way to protect your online privacy?

    <p>Avoid clicking on links without double checking the URL (B)</p> Signup and view all the answers

    What is one reason why some people are concerned about encryption?

    <p>It prevents the government from accessing information for investigations (D)</p> Signup and view all the answers

    What was the main reason the internet was designed to be redundant?

    <p>To ensure it could operate even if parts of it failed (D)</p> Signup and view all the answers

    What is the main reason why open standards are important for the internet?

    <p>They ensure that all devices can communicate with each other. (A)</p> Signup and view all the answers

    What is the main difference between bandwidth and latency?

    <p>Bandwidth refers to the amount of data transferred, while latency refers to the time it takes to transfer data. (A)</p> Signup and view all the answers

    Which of the following is NOT a way that cybercriminals can harm someone's computer?

    <p>Downloading software updates (C)</p> Signup and view all the answers

    What does the encryption key length refer to?

    <p>The number of characters used to create the key (D)</p> Signup and view all the answers

    What is a Certificate Authority responsible for?

    <p>Issuing digital certificates to verify who owns encryption keys (C)</p> Signup and view all the answers

    What is the main reason why private data is kept secret on the internet, even though it is a public network?

    <p>The internet uses encryption. (C)</p> Signup and view all the answers

    What is a one-way function?

    <p>A function that is easy to solve in one direction, but difficult to solve in the opposite direction. (D)</p> Signup and view all the answers

    Why is the internet considered hierarchical?

    <p>Because it is broken down into smaller subcategories that can be managed more efficiently. (A)</p> Signup and view all the answers

    What is the main purpose of a domain name server?

    <p>To translate domain names into IP addresses (D)</p> Signup and view all the answers

    What is the difference between a domain name and an IP address?

    <p>A domain name is a human-readable address, while an IP address is a numeric address. (D)</p> Signup and view all the answers

    What is the main purpose of a cloud computing system?

    <p>To store and process data in a centralized location (D)</p> Signup and view all the answers

    What is the difference between symmetric and asymmetric encryption?

    <p>Symmetric encryption uses the same key to encrypt and decrypt data, while asymmetric encryption uses different keys for encryption and decryption. (D)</p> Signup and view all the answers

    Which of the following is NOT an example of a nationwide system that could be attacked by a Cyber Army?

    <p>Financial markets (D)</p> Signup and view all the answers

    What is the main advantage of using a strong password?

    <p>It makes it more difficult for hackers to guess your password. (C)</p> Signup and view all the answers

    What is the main purpose of a substitution cipher?

    <p>To hide the true meaning of a message by replacing letters with symbols (D)</p> Signup and view all the answers

    What is a potential drawback of Google tracking search history?

    <p>It can create a filter bubble, leading to polarized opinions. (D)</p> Signup and view all the answers

    Which of these scenarios exemplifies the concept of the "digital divide"?

    <p>A student in a rural area lacks access to a computer and reliable internet. (A)</p> Signup and view all the answers

    What is the main purpose of a null byte in programming languages?

    <p>To mark the end of a text string. (B)</p> Signup and view all the answers

    Why is it important for software projects to be designed by diverse teams?

    <p>To prevent the software from being biased towards specific demographics. (D)</p> Signup and view all the answers

    How does the "bit depth" impact the accuracy of digital representations of analog data?

    <p>A higher bit depth leads to more accurate representation of the analog data. (D)</p> Signup and view all the answers

    Which of the following is NOT a benefit of computing innovation?

    <p>Reduced reliance on human expertise and creativity. (A)</p> Signup and view all the answers

    What is the primary reason why the digital divide is more pronounced in countries like Africa?

    <p>Lack of technological infrastructure. (C)</p> Signup and view all the answers

    Which of these is NOT a factor that contributes to the digital divide?

    <p>Increased use of artificial intelligence in various industries. (C)</p> Signup and view all the answers

    Why might Google search results differ when accessed from different countries?

    <p>Google complies with local laws and regulations regarding internet content. (A)</p> Signup and view all the answers

    What does the term "digital coding of analog values" refer to?

    <p>Converting continuous, analog signals into discrete, digital values. (B)</p> Signup and view all the answers

    Which of the following is considered a computing innovation that has significantly impacted "creative expression"?

    <p>The creation of music synthesizers. (B)</p> Signup and view all the answers

    What is the significance of the "sampling rate" in the digital representation of analog values?

    <p>The frequency at which the analog signal is sampled. (D)</p> Signup and view all the answers

    What is the main purpose of a multi-author document editing software, like Google Docs?

    <p>To enable simultaneous editing of a document by multiple users. (C)</p> Signup and view all the answers

    How does the number of bits used to represent information impact the number of possible values?

    <p>Adding one bit doubles the number of possible values. (B)</p> Signup and view all the answers

    Why is it important to consider the "social implications" of internet searches?

    <p>Because some people may not have access to all information due to censorship or misinformation. (D)</p> Signup and view all the answers

    Which of the following is NOT a way computers and the internet enable collaboration?

    <p>The development of artificial intelligence (AI) systems for decision-making. (C)</p> Signup and view all the answers

    What is the main reason why analog data is digitized for processing by computers?

    <p>To represent analog data in a way that's interpretable by computers. (A)</p> Signup and view all the answers

    What is one primary function of Digital Rights Management (DRM)?

    <p>To restrict how copyrighted media can be used (B)</p> Signup and view all the answers

    What are Creative Commons licenses primarily intended for?

    <p>To promote the sharing and reuse of creative works (B)</p> Signup and view all the answers

    What is a significant challenge that arises from the misuse of the DMCA?

    <p>It can lead to wrongful takedown of legitimate content. (C)</p> Signup and view all the answers

    Why is open access research important in the scientific community?

    <p>It allows free access to research without cost barriers. (A)</p> Signup and view all the answers

    Which of the following best describes a LAN?

    <p>A network connecting multiple devices in a limited area. (C)</p> Signup and view all the answers

    What is a notable concern associated with open source software?

    <p>It can be hacked if vulnerabilities in the code are discovered. (C)</p> Signup and view all the answers

    Which best defines a WAN?

    <p>A network that encompasses a broad geographic area, composed of many LANs. (C)</p> Signup and view all the answers

    What is the main goal of the open access movement?

    <p>To encourage free distribution of full research papers online. (A)</p> Signup and view all the answers

    What does the term 'network topology' refer to?

    <p>The physical arrangement of devices in a network. (B)</p> Signup and view all the answers

    What can be a consequence of using DRM technology for visually impaired users?

    <p>It may prevent assistive technologies from functioning properly. (C)</p> Signup and view all the answers

    What is one of the main factors contributing to the homework gap among low-income households?

    <p>Low-income households often lack computers and broadband. (A)</p> Signup and view all the answers

    Which of the following initiatives is aimed at increasing digital literacy among senior citizens?

    <p>SFConnected (D)</p> Signup and view all the answers

    What is DNS spoofing?

    <p>A hacker tactic to redirect users to a fraudulent website. (B)</p> Signup and view all the answers

    What is one disadvantage of using technology in schools?

    <p>Potential distractions for students. (C)</p> Signup and view all the answers

    How do ISPs contribute to bridging the digital divide for low-income families?

    <p>By offering low-cost internet connections to eligible households. (C)</p> Signup and view all the answers

    What contributes to the disparity in online content quality between urban and rural areas?

    <p>Urban peer-produced content is generally higher quality. (D)</p> Signup and view all the answers

    What does digital literacy NOT include?

    <p>Ability to fix technical issues independently. (A)</p> Signup and view all the answers

    Which protocol is designed primarily for the transmission of information across the internet?

    <p>HTTP (B)</p> Signup and view all the answers

    What can be a consequence of using technology in educational settings?

    <p>It may take time away from more beneficial forms of learning. (C)</p> Signup and view all the answers

    Which of the following is NOT a step in how DNS resolves a domain name?

    <p>Asks the host computer for the IP address. (A)</p> Signup and view all the answers

    What is the smallest possible addressable unit of memory in most modern computers?

    <p>Byte (D)</p> Signup and view all the answers

    Which of the following statements best describes the concept of overflow in computing?

    <p>When a number exceeds the available bits to represent it (D)</p> Signup and view all the answers

    Which encoding standard was one of the first to standardize the representation of characters in binary?

    <p>ASCII (B)</p> Signup and view all the answers

    What is a significant drawback of using ASCII encoding?

    <p>It only supports a limited set of characters (D)</p> Signup and view all the answers

    What is the definition of 'roundoff' in the context of computer programming?

    <p>Adjusting a number to fit within the constraints of available memory bits (B)</p> Signup and view all the answers

    Which category of data compression allows for a complete restoration of original data?

    <p>Lossless compression (C)</p> Signup and view all the answers

    What kind of protocol allows public access and modification of its code without permission?

    <p>Open protocol (B)</p> Signup and view all the answers

    The IEEE 754 standard is primarily used for which type of data representation?

    <p>Floating point representation (B)</p> Signup and view all the answers

    Which of the following is NOT a factor influencing data compression effectiveness?

    <p>Length of the original file (D)</p> Signup and view all the answers

    How many bytes are in a Terabyte?

    <p>1,099,511,627,776 bytes (C)</p> Signup and view all the answers

    Which of the following statements is true about floating point representation?

    <p>Typically uses base 2 for representation (C)</p> Signup and view all the answers

    What does the term 'NaN' mean in computing?

    <p>Not a Number (D)</p> Signup and view all the answers

    What is the impact of a 'fair use' consideration in copyright law?

    <p>Permits limited use for educational and non-profit activities (A)</p> Signup and view all the answers

    Which of the following best defines 'bit' in computing?

    <p>A binary digit that can be 1 or 0 (B)</p> Signup and view all the answers

    What is the primary advantage of Huffman coding?

    <p>It is efficient for data with sharp transitions. (B)</p> Signup and view all the answers

    Which of the following describes lossy data compression?

    <p>It removes details that are unlikely to affect user experience. (C)</p> Signup and view all the answers

    What is a limitation of the ASCII encoding standard?

    <p>It does not support a wide range of symbols. (A)</p> Signup and view all the answers

    What differentiates Unicode from ASCII?

    <p>Unicode supports an extensive range of characters and languages. (B)</p> Signup and view all the answers

    What does UTF-8 encoding accomplish?

    <p>It describes Unicode characters using 1 to 4 bytes. (B)</p> Signup and view all the answers

    Which of the following best describes 'bit rate' in networking?

    <p>The number of bits sent per second. (B)</p> Signup and view all the answers

    Which coding method is primarily used for high-precision data reproduction?

    <p>Huffman coding algorithm. (B)</p> Signup and view all the answers

    What is an effect of excessive latency in a computer network?

    <p>It can cause delays in data message reception. (A)</p> Signup and view all the answers

    What feature of lossy compression allows manipulation of data precision?

    <p>Chroma subsampling technique. (D)</p> Signup and view all the answers

    What does line coding achieve in computer networks?

    <p>Transforms binary data into a time-based signal. (D)</p> Signup and view all the answers

    Which type of cable primarily transmits data through electrical pulses?

    <p>Twisted pair cable (B)</p> Signup and view all the answers

    What is a characteristic of fiber-optic cables compared to copper cables?

    <p>They transmit data as light pulses (A)</p> Signup and view all the answers

    What is the role of the forwarding table in a router?

    <p>To determine the closest next router for a packet (B)</p> Signup and view all the answers

    What does the term 'single point of failure' refer to in a network?

    <p>A critical component that if it fails, the entire system fails (A)</p> Signup and view all the answers

    What happens to packets in an IP routing protocol when they encounter multiple potential paths?

    <p>They may arrive at their destination out of order (C)</p> Signup and view all the answers

    Which aspect of network speed is affected by both bandwidth and latency?

    <p>Internet speed (C)</p> Signup and view all the answers

    What is a potential negative consequence of having many redundant paths in a network?

    <p>Increased costs (A)</p> Signup and view all the answers

    Which addressing system provides a significantly larger number of addresses compared to its predecessor?

    <p>IPv6 (D)</p> Signup and view all the answers

    What is a significant barrier contributing to the digital divide?

    <p>Geographical challenges in infrastructure deployment (D)</p> Signup and view all the answers

    What is one of the main purposes of load testing in network engineering?

    <p>To prepare for spikes in application usage (B)</p> Signup and view all the answers

    Which protocol offers a faster means of data transport but solves fewer problems compared to TCP?

    <p>UDP (A)</p> Signup and view all the answers

    What type of connection is typically more portable and user-friendly in environments without physical cables?

    <p>Wireless connection (C)</p> Signup and view all the answers

    What issue can frequently occur in packet transmission across networks?

    <p>Packets can be lost or duplicated (B)</p> Signup and view all the answers

    What problem arises when a government implements an internet kill switch?

    <p>Complete control over internet access (D)</p> Signup and view all the answers

    What is the main purpose of TCP in data transmission?

    <p>To guarantee reliable data transmission with proper ordering (B)</p> Signup and view all the answers

    What process is used to establish a connection in TCP?

    <p>Three-way handshake (D)</p> Signup and view all the answers

    What information does a UDP header contain?

    <p>Source and destination port numbers (A)</p> Signup and view all the answers

    What is a key characteristic of a dynamic IP address?

    <p>Assigned by an ISP based on availability (B)</p> Signup and view all the answers

    What is the function of SMTP in internet communication?

    <p>To send and receive email messages (B)</p> Signup and view all the answers

    Which statement about SSL/TLS is true?

    <p>They secure data transmission using public key cryptography. (B)</p> Signup and view all the answers

    Which of the following best describes asymmetric encryption?

    <p>Requires both a private key for decryption and a public key for encryption (B)</p> Signup and view all the answers

    What is a characteristic of lossless data compression?

    <p>It allows original data to be reconstructed exactly. (B)</p> Signup and view all the answers

    Which of the following protocols is used for managing webpages effectively?

    <p>HTTP (B)</p> Signup and view all the answers

    In the context of internet protocols, what is the role of the IETF?

    <p>To develop and approve internet protocols (A)</p> Signup and view all the answers

    What security risk is associated with cookies in web browsing?

    <p>They may expose sensitive personal information. (B)</p> Signup and view all the answers

    What is an example of a substitution cipher?

    <p>Replacing each letter with another based on a specific key (B)</p> Signup and view all the answers

    Which type of error occurs when a software variable exceeds its maximum limit?

    <p>Overflow error (D)</p> Signup and view all the answers

    What is the function of a checksum in data transmission protocols?

    <p>To detect data corruption (C)</p> Signup and view all the answers

    Flashcards

    Cold War and Internet

    The Cold War influenced the development of the Internet.

    Point-to-point connections

    The Internet uses point-to-point connections for reliability and resilience.

    First universities on the Internet

    UCLA and Stanford were the first universities connected to the Internet.

    IPv4 vs. IPv6

    IPv4 uses 32 bits while IPv6 uses 128 bits, expanding address capacity significantly.

    Signup and view all the flashcards

    Digital certificate (HTTPS)

    A digital certificate verifies a website's identity, shown in the browser's URL as HTTPS.

    Signup and view all the flashcards

    Encryption benefits

    Encryption enhances security for transactions and privacy.

    Signup and view all the flashcards

    Risks of over-security

    Excessive security can hinder free speech and anonymous publishing.

    Signup and view all the flashcards

    Physical vulnerabilities

    Physical attacks on the Internet can disrupt communication; examples include cutting cables.

    Signup and view all the flashcards

    Rogue access point

    An unauthorized device that can intercept network data.

    Signup and view all the flashcards

    Cyber security practices

    Best practices include strong passwords and updated software to enhance safety online.

    Signup and view all the flashcards

    Search engine indexing

    Search engines use pre-built indexes to quickly find web pages.

    Signup and view all the flashcards

    Ranking algorithm

    Search engines rank results based on the number of links to a page.

    Signup and view all the flashcards

    Machine learning in search

    AI helps search engines understand the context of queries.

    Signup and view all the flashcards

    Distance learning solution

    Internet communication enabled distance education during COVID-19.

    Signup and view all the flashcards

    Types of cyberbullying

    Includes revenge porn and bullies with different motives.

    Signup and view all the flashcards

    Preventing cyberbullying

    Establish rules and consequences for online behavior.

    Signup and view all the flashcards

    Censorship debate

    Censorship can limit harmful messages but may violate free speech.

    Signup and view all the flashcards

    Enemies of the Internet

    Countries that restrict online freedom include China and Cuba.

    Signup and view all the flashcards

    Government censorship tactics

    Methods include IP blocking, URL filtering, and network disconnection.

    Signup and view all the flashcards

    Impact of internet governance

    Government control can restrict innovation and freedom online.

    Signup and view all the flashcards

    World Wide Web

    A subcategory of the Internet focused on interlinked hypertext documents.

    Signup and view all the flashcards

    Redundancy

    Design feature of the Internet providing fault tolerance through multiple backup systems.

    Signup and view all the flashcards

    Cloud Computing

    Utilization of massive computer networks to perform complex computations.

    Signup and view all the flashcards

    Dynamic Routing

    The ability for data on the Internet to be rerouted in real-time during transmission.

    Signup and view all the flashcards

    Internet Protocols

    Standards enabling different devices to communicate over the Internet.

    Signup and view all the flashcards

    Open Standards

    Protocols accessible for anyone to use without permission, promoting innovation.

    Signup and view all the flashcards

    ICANN

    Organization currently overseeing the Domain Name Hierarchy on the Internet.

    Signup and view all the flashcards

    IP Addressing

    A hierarchical system that identifies unique devices on the Internet.

    Signup and view all the flashcards

    Bandwidth vs Latency

    Bandwidth refers to data transfer volume, while latency is the time delay in data transfer.

    Signup and view all the flashcards

    Encryption

    Process to keep private data safe on public networks by transforming it into unreadable formats.

    Signup and view all the flashcards

    Cybersecurity

    Measures taken to protect computers and networks from digital attacks.

    Signup and view all the flashcards

    One-Way Function

    A function easy to compute in one direction but hard to reverse, used in encryption.

    Signup and view all the flashcards

    Certificate Authority

    Entity that issues digital certificates to verify ownership of encryption keys.

    Signup and view all the flashcards

    Asymmetric Encryption

    Encryption method that uses a pair of keys for secure communication.

    Signup and view all the flashcards

    Trial and Error Decoding

    Method used to decode ciphers by systematically testing possibilities.

    Signup and view all the flashcards

    Government Censorship

    The act of restricting access to information online by governments.

    Signup and view all the flashcards

    Search Engine Results Variability

    Search results can differ based on your location due to censorship.

    Signup and view all the flashcards

    Filter Bubbles

    Personalized information that limits exposure to diverse viewpoints.

    Signup and view all the flashcards

    Google Search Benefits

    Searching is easy, allowing quick access to information.

    Signup and view all the flashcards

    Privacy Concerns with Google

    Users risk their privacy in exchange for personalized experiences.

    Signup and view all the flashcards

    Digital Divide

    The gap between those with and without internet access.

    Signup and view all the flashcards

    Benefits of Computing Innovation

    Computing has revolutionized creative expression, such as in music.

    Signup and view all the flashcards

    Digital Collaboration

    Working together online, utilizing various tools and methods.

    Signup and view all the flashcards

    Bit

    The smallest unit of information in computing, representing 0 or 1.

    Signup and view all the flashcards

    Representing Values with Bits

    More bits allow for more values, doubling options with each bit added.

    Signup and view all the flashcards

    Character Representation

    8-bit bytes are commonly used to represent characters in text.

    Signup and view all the flashcards

    Analog vs. Digital Data

    Analog is continuous; digital is discrete, simplifying representation.

    Signup and view all the flashcards

    Sampling Rate

    The frequency at which analog signals are sampled to create digital data.

    Signup and view all the flashcards

    Bit Depth

    The number of bits used per sample in digital data representation.

    Signup and view all the flashcards

    Null Byte

    A byte consisting of all zeros, used to terminate text strings in programming.

    Signup and view all the flashcards

    Copyright Violation

    Unauthorized use of copyrighted materials, often through digital sharing.

    Signup and view all the flashcards

    Digital Rights Management (DRM)

    Tools that restrict how copyrighted media can be used or shared.

    Signup and view all the flashcards

    Kilobyte

    1,024 bytes, roughly equal to a couple of paragraphs of text.

    Signup and view all the flashcards

    DMCA

    A law that criminalizes the circumvention of DRM and protects copyright owners.

    Signup and view all the flashcards

    Fair Use

    Limited use of copyrighted material without permission, for criticism or education.

    Signup and view all the flashcards

    Megabyte

    1,048,576 bytes, approximately the size of one book.

    Signup and view all the flashcards

    Creative Commons

    Licenses that allow creators to share works with fewer restrictions.

    Signup and view all the flashcards

    Gigabyte

    1,073,741,824 bytes, slightly more than a CD's storage capacity.

    Signup and view all the flashcards

    Open Source License

    A license that allows software to be freely used and modified by anyone.

    Signup and view all the flashcards

    Terabyte

    1,099,511,627,776 bytes, roughly the storage of 1,500 CDs.

    Signup and view all the flashcards

    Floating Point

    A method of representing real numbers with varying precision.

    Signup and view all the flashcards

    Open Access Movement

    Efforts to make scientific research freely available to the public.

    Signup and view all the flashcards

    Network Topology

    The arrangement of different devices in a computer network.

    Signup and view all the flashcards

    Overflow

    Occurs when a number exceeds the maximum value that can be stored.

    Signup and view all the flashcards

    Roundoff Error

    The difference between the exact value and the representation in a computer.

    Signup and view all the flashcards

    LAN vs WAN

    LAN covers a small area; WAN connects multiple LANs over large distances.

    Signup and view all the flashcards

    Data Center Network (DCN)

    A network designed for high-speed data exchange in data centers.

    Signup and view all the flashcards

    ASCII

    A character encoding standard using 7 bits to represent text.

    Signup and view all the flashcards

    NaN

    Stands for 'Not a Number', used for undefined computations.

    Signup and view all the flashcards

    Lossless Compression

    Data compression where no information is lost.

    Signup and view all the flashcards

    Lossy Compression

    Data compression that sacrifices some quality for smaller size.

    Signup and view all the flashcards

    Copyright

    Legal rights allowing creators to control their work's use.

    Signup and view all the flashcards

    Firmware

    Permanent software programmed into a read-only memory.

    Signup and view all the flashcards

    Income Inequality

    A gap between income groups affecting access to technology like computers and broadband.

    Signup and view all the flashcards

    Homework Gaps

    Discrepancies in completing homework due to lack of resources, especially in low-income households.

    Signup and view all the flashcards

    Digital Literacy

    The ability to use devices and interact with digital information effectively.

    Signup and view all the flashcards

    Pros of Technology in Schools

    Benefits include differentiated instructions and monitoring student progress.

    Signup and view all the flashcards

    Cons of Technology in Schools

    Challenges include distractions and time lost on troubleshooting.

    Signup and view all the flashcards

    GeoChicas

    A project aimed at increasing diversity in mapping and technology.

    Signup and view all the flashcards

    Missing Maps

    A humanitarian project that aims to create maps of vulnerable areas for crisis aid.

    Signup and view all the flashcards

    DNS Spoofing

    A tactic where a hacker redirects a domain name to a fraudulent IP address.

    Signup and view all the flashcards

    HTTP Requests

    Messages sent from client to server to request resources on the web.

    Signup and view all the flashcards

    Primary Domain

    The last two segments of a domain name representing the main site address.

    Signup and view all the flashcards

    Run-length coding

    A compression technique that uses pairs (x, y) to represent consecutive values.

    Signup and view all the flashcards

    Huffman coding

    A compression algorithm that assigns variable-length codes to characters based on frequency of occurrence.

    Signup and view all the flashcards

    Lossy data compression

    Removes non-essential details, primarily used for images, audio, and video.

    Signup and view all the flashcards

    Chroma subsampling

    A lossy compression technique that averages color information while preserving brightness.

    Signup and view all the flashcards

    JPEG

    A commonly used method of lossy compression for digital images.

    Signup and view all the flashcards

    Unicode

    A universal character set that assigns a unique code point to each character across languages.

    Signup and view all the flashcards

    UTF-8

    A variable-length encoding that is backward compatible with ASCII and supports all Unicode characters.

    Signup and view all the flashcards

    Bit rate

    The number of bits transmitted per second in a data message.

    Signup and view all the flashcards

    Latency

    The delay between sending and receiving a data message, measured in milliseconds.

    Signup and view all the flashcards

    Copper cables

    Wires that transmit data using electrical pulses; used in telecommunication.

    Signup and view all the flashcards

    Twisted pair cable

    A type of copper cable that transmits data by sending electrical pulses.

    Signup and view all the flashcards

    Fiber-Optic cables

    Transmits data by sending light pulses; offers faster speeds than copper.

    Signup and view all the flashcards

    Wireless communication

    Data transmission through radio waves, requires a wireless access point.

    Signup and view all the flashcards

    Bandwidth

    The maximum rate of data transfer across a network.

    Signup and view all the flashcards

    IP packets

    Data units that contain headers with routing information and the actual data.

    Signup and view all the flashcards

    Routing process

    How routers determine the best path for IP packets to reach their destination.

    Signup and view all the flashcards

    Fault tolerance

    Ability of a system to continue operation despite failures.

    Signup and view all the flashcards

    Load testing

    Simulation of high traffic to prepare systems for increased usage.

    Signup and view all the flashcards

    Internet scalability

    A system's capacity to handle growing amounts of users or data.

    Signup and view all the flashcards

    Internet shut down tactics

    Methods governments use to disconnect citizens from the Internet.

    Signup and view all the flashcards

    Root Name Server

    First point of contact for domain name resolution, providing IP address of TLD servers.

    Signup and view all the flashcards

    Three-Way Handshake

    A method to establish a TCP connection using SYN, ACK, and final ACK messages.

    Signup and view all the flashcards

    TCP Header

    Contains source/destination port numbers and a checksum; size varies from 20 to 60 bytes.

    Signup and view all the flashcards

    UDP

    A fast, connectionless protocol that does not guarantee delivery but checks for data corruption.

    Signup and view all the flashcards

    IP Protocol

    A standard for sending data across the Internet; assigns unique addresses to devices.

    Signup and view all the flashcards

    SMTP

    Protocol for sending and receiving email messages over the Internet.

    Signup and view all the flashcards

    IP Address

    Unique numerical label assigned to each device on a network to identify it.

    Signup and view all the flashcards

    Dynamic IP Address

    An IP address that changes each time a device reconnects to a network.

    Signup and view all the flashcards

    Static IP Address

    An unchanging IP address assigned to a device, often a server for easy access.

    Signup and view all the flashcards

    Virus

    A self-replicating program that can spread and harm computers.

    Signup and view all the flashcards

    Phishing

    Fraudulent practice of sending emails that appear to be from reputable sources to steal personal information.

    Signup and view all the flashcards

    Lossless Data Compression

    Technique that reduces file size without losing any information, allowing full recovery.

    Signup and view all the flashcards

    Study Notes

    Internet History

    • Cold War spurred Internet invention.
    • Internet's structure—multiple point-to-point connections—reduces vulnerability. If one site goes down, others can still communicate.
    • First Internet network involved UCLA and Stanford.
    • Public access to the Internet began in 1983.
    • NSF replaced DARPA in managing the Internet.

    Internet Structure and Protocols

    • Lock/HTTPS indicates secure website communication via digital certificates (secure verification).
    • The Internet transmits binary information.
    • Transmission methods include electricity (inexpensive but prone to signal loss), light (fast, long-distance with minimal signal degradation but expensive), and radio waves (mobile but short range).
    • IP addresses are categorized (inside/outside) by networks like your home network, combining devices into a single IP address.
    • IPv4 uses 32-bit addresses.
    • IPv6 (with 128 bits) provides significantly more addresses.

    Internet Concepts and Functionality

    • The World Wide Web is a subset of the Internet.
    • The World Wide Web's expansion spurred applications like online shopping and personal blogs.
    • The Internet’s design prioritizes redundancy—multiple backup systems and alternative pathways ensure continuous operation.
    • "Computer farms", which are vast computing clusters ("the cloud"), handle complex computations.
    • The Internet’s fault-tolerance is crucial due to widespread dependence and system complexities.
    • Internet routing is dynamic and re-routes data based on network conditions.
    • Protocols (communication standards) enable smooth interaction among diverse Internet devices.
    • The Internet's design incorporates layered abstraction for protocol management.
    • Open standards allow anyone to contribute to software and hardware development.

    Internet Governance and Administration

    • The U.S. government controlled domain name hierarchy until 2009.
    • ICANN now manages the domain name hierarchy, but ongoing international criticism persists concerning independence from the U.S. government.
    • ARPA, a U.S. Department of Defense agency, initialized the Internet (1969) in what became the network’s foundation.
    • IP addresses were initially for research projects and later transitioned to commercial use, governed initially by ARPA and then NSF but finally managed by ICANN.

    Internet Addressing

    • Domain names and IP addresses form hierarchical addressing systems.
    • Subdomains (paths in URLs) locate specific files within server hierarchies.
    • IP addresses simplify location identification on the Internet, hiding the system's complexity from users.
    • Internet hierarchy facilitates efficient functioning and distribution of IP address requests.
    • Bandwidth describes the transferred data rate, while Latency represents data travel time.

    Internet Security

    • Encryption protects private data on public networks.
    • The Caesar Cipher (with a 1-character key) is a historical example of encryption.
    • Modern cryptographic keys like 256-bit encryption provide strong security.
    • Critical infrastructure sectors vulnerable to hacking include nuclear facilities, healthcare records, and water supply systems.
    • Individuals can be lured into installing viruses, or vulnerabilities can be exploited.
    • Cyberattacks lead to data theft/deletion, program control, or remote system takeover.
    • Security best practices include using strong passwords, verifying website authenticity, updating security software, and avoiding untrusted downloads.
    • Public key encryption relies on Certificate Authorities to verify website/user identity.

    Internet Censorship

    • Top "Internet enemy" countries include Bahrain, Belarus, China, Cuba, and Ethiopia.
    • Public concern exists about government control of the Internet.
    • Methods of Internet censorship include IP blocking, domain tampering, URL filtering, keyword blocking, network disconnection, and network attacks.
    • Search engines use pre-built indexes (built through automated crawling called "spiders") for search results rather than real-time processing.
    • Ranking algorithms order pages based on linked sites.
    • Machine learning, a type of artificial intelligence, powers search engine relevance.

    Communication and Technology

    • Common communication technologies include SMS, Instagram, Facebook, Snapchat, FaceTime, and newer platforms.
    • Online communication was crucial during the COVID-19 pandemic for distance learning.

    Online Textbooks

    • Pros: Portability and convenience.
    • Cons: Rely on electronics, connection/battery dependence, and social isolation.

    Cyberbullying

    • Types of cyberbullying include revenge porn, the vengeful angel, the power-hungry, the mean girls, and the inadvertent cyberbully.
    • Addressing cyberbullying requires clearer rules and consequences from social media platforms, along with school policies limiting access to cyberbullying platforms.

    Internet Usage Benefits and Costs

    • Internet accessibility democratizes information. Transparency enhances public awareness.
    • Online access can lead to filter bubbles. Political polarization may be intensified.
    • Individual users can benefit from tailored information. Privacy concerns also exist because platforms often collect information about users' online activity.

    Global Computing and the Digital Divide

    • Top three countries in population, internet users, and online percentage include China, India, and the US.
    • Factors that contribute to the digital divide include affordability, geography, government restrictions, and a lack of digital literacy.
    • Programs like the FCC E-Rate aim to bridge the digital divide in the US.

    Computing Benefits

    • Computing innovations, such as music synthesizers, enhance creative expression.
    • Computing facilitates problem solving through access to public data and analyses such as DNA sequencing and protein folding.

    Digital Collaboration

    • Successful software projects must cater to diverse users and cultural expectations across various demographics.
    • Teams incorporate diverse user feedback and perspectives to design inclusive solutions.
    • The Internet and computers enable collaboration in various forms, from virtual meetings to collaborative documents and revision controls.

    Bits and Binary

    • The bit is the smallest unit of digital information, represented as 0 or 1.
    • Using multiple bits creates more possible values. Each additional bit doubles the possible values.
    • 8 bits form a byte, crucial for representing characters.
    • Unicode, a more comprehensive standard than ASCII, supports a wide range of characters and languages.
    • UTF-8 is the widely-used encoding standard for the web.

    Binary Representation

    • Binary representations can represent various data types (e.g., integers, images, text).
    • Sampling, quantization, and binary encoding are methods for converting analog data (like sound or image) into binary format.
    • Higher bit depth results in higher precision of reproduction in recreating original analog content.

    Data Compression

    • Data compression's effectiveness depends on redundant data and chosen compression algorithms.
    • Lossless and lossy compression are two main categories. Lossless methods preserve all data, while lossy methods sacrifice some detail for more significant compression.

    Internet Protocols and Architecture

    • Protocols provide rules of behavior on the Internet. Open protocols foster innovation; closed protocols restrict access.
    • Applications are layered in terms of their complexity, helping manage the large number of interacting protocols within the system.

    Computer Limitations

    • Overflow errors occur when a value exceeds a computer's capacity.
    • Roundoff errors occur due to using a finite representation for infinitely precise parts.
    • Precision errors depend on the number of bits/bytes available to store data, so more bits give more precision.
    • Copyright laws grant creators exclusive rights but eventually allow works to enter the public domain.
    • Fair use exceptions permit certain use of copyrighted material for limited purposes.
    • Digital Rights Management (DRM) restrictions on copyrighted material restrict use (especially in digital files).
    • DMCA laws affect the creation and distribution of DRM bypass technologies.
    • Issues with DMCA abuse arise from automated detection or human review processes.

    Creative Commons and Open Source

    • Creative Commons licenses allow varying degrees of usage of creative works by others. Open source licenses allow modification of software.
    • Security concerns often exist with open-source projects.

    Open Access Research

    • The open-access movement aims to make scientific research freely available online.
    • Peer-review processes are important for quality control of research for transparency and credibility. Issues exist with open access research that have not been subject to the same measures.
    • Open-access databases facilitate wider data availability and usage.

    Computer Networks

    • Network topologies describe various ways to connect networked devices. Local area networks (LANs) cover a small area, whereas wide area networks (WANs) cover a large geographical area.

    Physical Network Connections

    • Connections use physical mediums like copper cables (using electricity) and fiber-optic cables (using light pulses). Wireless connections use radio waves.

    Internet Speed

    • Internet speed is a combination of bandwidth (data transfer rate) and latency (delay).

    IP Addressing

    • Hierarchical IP addressing simplifies data routing.

    IP Packets

    • Packets contain headers and data for routing data around a network.

    IP Routing Protocols

    • Routers forward packets through a network based on forwarding tables and destination addresses.

    Redundancy and Fault Tolerance

    • Redundancy (multiple paths for data transmission) builds fault tolerance into networks.
    • Redundancy and fault tolerance increase reliability.

    Packet Problems

    • Data packets can get lost, corrupted, or arrive out of order.

    Internet Scalability

    • Features like IP addressing and open protocols enhance the Internet's scalability and capacity to support many devices.
    • Internet speed limits, or throughput limits of routers, threaten scalability.
    • Load testing helps in anticipation of traffic spikes.

    Digital Divide

    • The digital divide encompasses factors like affordability of devices and infrastructure, limited access in rural areas, government policies that restrict access, and varying levels of digital literacy.
    • Programs such as the FCC E-Rate initiative aim to increase access to technology. Gaps persist due to income inequality, education levels, ethnicity, and geographical location.
    • Digital literacy is a critical component of bridging the digital divide.

    HTML

    • HTML (HyperText Markup Language) defines the visual presentation of webpages.
    • Cookies aid in website remembrance of user information.

    IP Addresses

    • IP (Internet Protocol) addresses assign unique identifiers to devices on a network.
    • IPv4 uses 32-bit addresses (limited number of unique addresses); IPv6 employs 128 bits for significantly more addresses.
    • IP addresses can dynamically change with connecting to a Wi-Fi network. Open protocols provide standardization and smooth communication.

    Encryption and Security

    • Encryption protects sensitive data sent over networks.
    • Symmetric encryption uses the same key for encryption/decryption; asymmetric encryption uses separate keys.
    • Viruses, DDoS (Distributed Denial-of-Service) attacks, and phishing attempts pose security risks. A successful solution combines layered security measures and educated users to protect against cyberattacks.

    Internet Protocols

    • Protocols help devices communicate by establishing standards to format and convey data among the many devices that comprise the global networks. Layers of structure allow for organization and complex operation of the network.

    URLs

    • Uniform Resource Locators (URLs) direct to specific resources online (websites, documents, etc.).

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on internet technologies, protocols, and cybersecurity issues with this engaging quiz. From the basics of IPv4 and IPv6 to the implications of cyberbullying and government censorship, this quiz covers a wide range of topics related to the digital world.

    More Like This

    Use Quizgecko on...
    Browser
    Browser