Internet and Its Uses Quiz
39 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What can be a consequence of DNS cache poisoning?

  • Connection to a fake website (correct)
  • Connection to a legitimate website
  • Improved security measures
  • Increased internet speed
  • Phishing occurs when an attacker sends emails that look legitimate to trick users into revealing personal information.

    True

    What is one method to protect against phishing attacks?

    Do not click on any email links unless certain that they are safe.

    Social engineering manipulates people into providing __________ data that can be used in criminal activity.

    <p>confidential</p> Signup and view all the answers

    Match the following security measures with their purposes:

    <p>HTTPS = Indicates a secure connection Anti-phishing toolbars = Alerts users of malicious websites Reputable ISP = Provides reliable internet connectivity Pop-up blockers = Prevents unwanted advertisements</p> Signup and view all the answers

    What is the main purpose of a timestamp in a new block?

    <p>To identify when an event takes place</p> Signup and view all the answers

    The Genesis block contains a previous hash value.

    <p>False</p> Signup and view all the answers

    What is the protocol called that requires miners to solve complex mathematical problems?

    <p>Proof of Work</p> Signup and view all the answers

    A _____ block is responsible for maintaining the integrity of the blockchain and does not reference any previous block.

    <p>Genesis</p> Signup and view all the answers

    Match the following elements with their descriptions:

    <p>Timestamp = Indicates when an event occurs Proof of Work = Protocol for adding blocks by solving problems Mining = The process of solving mathematical problems P2P Network = A decentralized group of connected devices</p> Signup and view all the answers

    What is the primary difference between the internet and the World Wide Web?

    <p>The internet is the infrastructure that connects networks, while the World Wide Web is a service that provides access to webpages.</p> Signup and view all the answers

    A Uniform Resource Locator (URL) is the address of a webpage, while an IP address identifies the individual device connected to the internet.

    <p>True</p> Signup and view all the answers

    What protocol is used for secure communication over the internet?

    <p>HTTPS</p> Signup and view all the answers

    A web server is a computer dedicated to storing web pages securely and delivering them when requested, and it is identified by its unique ______.

    <p>IP address</p> Signup and view all the answers

    Match the following web protocols and their purposes:

    <p>HTTP = Unsecure data transfer HTTPS = Secure data transfer URL = Address of a resource Cookie = Data stored on a user's computer</p> Signup and view all the answers

    What is a characteristic of cryptocurrency?

    <p>It is secured by cryptography.</p> Signup and view all the answers

    Digital currency can exist in a purely electronic form.

    <p>True</p> Signup and view all the answers

    Name one well-known form of digital currency.

    <p>Cryptocurrency</p> Signup and view all the answers

    A blockchain consists of multiple ________.

    <p>blocks</p> Signup and view all the answers

    What happens if someone tries to tamper with a block in the blockchain?

    <p>The hash will change, triggering an alarm.</p> Signup and view all the answers

    Match the following elements of a block with their descriptions:

    <p>Data in the block = Amount of money transferred Hash value = Unique value created for each block Previous hash value = Points to the prior block in the chain Block = Collection of transaction information</p> Signup and view all the answers

    Blockchain technology relies on a central banking system for security.

    <p>False</p> Signup and view all the answers

    Digital currency can be converted into physical cash using an ________.

    <p>ATM</p> Signup and view all the answers

    What is the primary function of anti-malware software?

    <p>To detect and remove security threats</p> Signup and view all the answers

    Strong passwords are ineffective against phishing attacks.

    <p>True</p> Signup and view all the answers

    What are two common forms of authentication?

    <p>Username and password, Two-factor authentication</p> Signup and view all the answers

    Anti-spyware software helps encrypt files to make the data more _____ in case it is spied on.

    <p>secure</p> Signup and view all the answers

    Which feature is NOT typically provided by anti-spyware software?

    <p>Improves computer performance</p> Signup and view all the answers

    Match the authentication type to its description:

    <p>Username and Password = Most common authentication mechanism Two-Factor Authentication = Requires two separate forms of identification Biometrics = Uses physical characteristics for verification Password Encryption = Stores passwords securely</p> Signup and view all the answers

    Two-factor authentication is typically a combination of a password and a _____ sent to your smartphone.

    <p>code</p> Signup and view all the answers

    What action can a system take to protect itself after a user has attempted to enter their password incorrectly multiple times?

    <p>Lock the user out</p> Signup and view all the answers

    What is one of the primary functions of a firewall?

    <p>Block unauthorized access</p> Signup and view all the answers

    Proxy servers can improve security by masking the user's IP address.

    <p>True</p> Signup and view all the answers

    What is one way to protect data from accidental damage?

    <p>Backup</p> Signup and view all the answers

    ____ can be spilled on a device, causing potential damage.

    <p>Water</p> Signup and view all the answers

    Match the following protection methods with their causes of data damage:

    <p>Backup = Data is accidentally deleted UPS = Power surge/loss Fireproof box = Fire can destroy device Waterproof box = Water can be spilled on the device</p> Signup and view all the answers

    Which of the following is a characteristic of the Secure Sockets Layer (SSL) protocol?

    <p>It allows secure data transmission over the internet.</p> Signup and view all the answers

    Cache helps to reduce response time by storing frequently viewed web pages.

    <p>True</p> Signup and view all the answers

    What device can be used to protect data during power surges?

    <p>UPS (Uninterruptible Power Supply)</p> Signup and view all the answers

    Study Notes

    Internet and its Uses

    • A network consists of two or more computers that share resources.
    • The internet is a global wide area network (WAN) that billions of people use daily.
    • The internet is the infrastructure that supports and facilitates the internet's functions.
    • The World Wide Web (WWW) is a service on the internet.
    • Webpages are documents or resources, which are stored on web servers—webpages can contain text and media.
    • Webpages are linked together using hyperlinks to navigate through the connections of resources.
    • A Uniform Resource Locator (URL) is a unique address (text-based) that allows access to resources on the World Wide Web.
    • A web server is a computer dedicated to storing and delivering web pages to users when requested.
    • A Network Interface Card (NIC) is a component in a computer that enables it to connect to a network.

    Web Pages

    • Web pages are typically created using HTML, CSS, and JavaScript.
    • HTML, HyperText Markup Language, is a markup language used to create web pages.
    • CSS, Cascading Style Sheets, is a presentation language that controls the appearance and styling of web pages.
    • JavaScript is a scripting language that is used to enhance HTML pages.

    HyperText Transfer Protocol (HTTP)

    • HTTP is a protocol for data transmission over the internet.
    • HTTP, in combination with SSL/TLS, transmits data securely.
    • It encrypts data for security.

    Web Browsers

    • A web browser is a software program that retrieves and displays web pages.
    • A web browser translates HTML code into a viewable page.
    • Common examples include Chrome, Firefox, Edge, and Internet Explorer.
    • Provides security through secure methods.

    Internet Protocol (IP) Addresses

    • An IP address is a unique identification number for each device connected to the internet.
    • It identifies each location on the internet—allowing other devices to communicate.
    • A dynamic IP address changes each time a device connects to the network.

    Domain Name System (DNS)

    • DNS acts as a phonebook for the internet.
    • It translates domain names, for example nytimes.com or espn.com, into IP addresses so web browsers can access internet resources.

    Transmission Control Protocol (TCP)

    • TCP is the standard method for communicating over the internet.
    • Enables the accurate and correct transmission of data between devices, using packet switching.

    Cookies

    • Cookies are small text files stored on a user's computer by a web browser at the request of a web server.
    • Session cookies are temporary and deleted once the session ends.
    • Cookies store: user preferences, visitor identification, shopping basket items, and login details.
    • Used for targeted advertising.

    Digital Currency

    • Digital currency is a payment method that exists in an electronic form, as opposed to physical currency.
    • Cryptocurrency (e.g., Bitcoin) is a virtual currency that is secured using cryptography (encryption).
    • Traditional digital currencies are regulated and controlled by central banks.
    • Digital currency transactions use technologies like smartphones, credit cards, and online exchanges to be traded, in some cases can be exchanged for physical cash through an ATM.

    Blockchain

    • Blockchain is a decentralized database that contains all transactions of networked members.
    • It consists of interconnected computers (not connected to a central server).
    • New transactions result in an updated copy of transaction being sent to every computer.
    • Transactions are grouped, forming "blocks".

    Peer-to-Peer (P2P) Network

    • A P2P network is a decentralized network where devices connect.
    • Each device acts as its own server.

    Cyber Security Threats

    • Cyber threats are risks that can damage or exploit internet-connected systems (hardware, software, and data)
    • Examples include Brute-force attacks, Data interception, Distributed denial of service (DDoS) attacks, Hacking and Malware (viruses, worms, Trojans, spyware, adware).
    • Other threats include Phishing, Social engineering, and Pharming

    Protection against Cyber Security Threats

    • Techniques to prevent or reduce the impact of cyber security threats include firewalls, access levels, anti-malware (antivirus and anti-spyware software), automatic updates, careful review of emails (spelling, links, or attachments).

    Access Levels

    • Systems have access levels tied to usernames and passwords.
    • Access levels dictate what users can do with the system—crucial to protect and control sensitive data.

    Anti-Malware

    • Anti-malware software, including antivirus and anti-spyware, is essential to protect the computer system.
    • Prevents and removes malicious software.
    • Regularly updating and scanning devices protects from new threats.

    Authentication

    • Authentication is the process of confirming the identity of a user.
    • Includes usernames and passwords, biometrics, or two-step verification.
    • Strong passwords, frequent changing of passwords, and using multiple forms of authentication are essential for high security.

    SSL (Secure Sockets Layer)

    • SSL is a protocol that encrypts data sent over the internet, protecting it from unauthorized access.
    • This ensures security of user's data, and is used on websites that require security of transactions.
    • Ensures website and user's device authenticity.

    TLS (Transport Layer Security)

    • TLS is an improved version of SSL with some key differences, but they protect user data in similar ways.
    • TLS provides security and privacy for data between devices and users—crucial for safe communication over the internet.
    • Crucial for secure online transactions that involve data transmission.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge about the internet and its functionalities. This quiz covers various aspects like networks, web pages, and the technologies that support the web. Get ready to explore how the internet connects billions of users worldwide.

    More Like This

    Internet Uses and Benefits
    10 questions
    Internet Overview and Uses
    17 questions

    Internet Overview and Uses

    ImpartialMagnesium avatar
    ImpartialMagnesium
    Use Quizgecko on...
    Browser
    Browser