Internet and Its Uses Quiz
39 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What can be a consequence of DNS cache poisoning?

  • Connection to a fake website (correct)
  • Connection to a legitimate website
  • Improved security measures
  • Increased internet speed
  • Phishing occurs when an attacker sends emails that look legitimate to trick users into revealing personal information.

    True (A)

    What is one method to protect against phishing attacks?

    Do not click on any email links unless certain that they are safe.

    Social engineering manipulates people into providing __________ data that can be used in criminal activity.

    <p>confidential</p> Signup and view all the answers

    Match the following security measures with their purposes:

    <p>HTTPS = Indicates a secure connection Anti-phishing toolbars = Alerts users of malicious websites Reputable ISP = Provides reliable internet connectivity Pop-up blockers = Prevents unwanted advertisements</p> Signup and view all the answers

    What is the main purpose of a timestamp in a new block?

    <p>To identify when an event takes place (B)</p> Signup and view all the answers

    The Genesis block contains a previous hash value.

    <p>False (B)</p> Signup and view all the answers

    What is the protocol called that requires miners to solve complex mathematical problems?

    <p>Proof of Work</p> Signup and view all the answers

    A _____ block is responsible for maintaining the integrity of the blockchain and does not reference any previous block.

    <p>Genesis</p> Signup and view all the answers

    Match the following elements with their descriptions:

    <p>Timestamp = Indicates when an event occurs Proof of Work = Protocol for adding blocks by solving problems Mining = The process of solving mathematical problems P2P Network = A decentralized group of connected devices</p> Signup and view all the answers

    What is the primary difference between the internet and the World Wide Web?

    <p>The internet is the infrastructure that connects networks, while the World Wide Web is a service that provides access to webpages. (C)</p> Signup and view all the answers

    A Uniform Resource Locator (URL) is the address of a webpage, while an IP address identifies the individual device connected to the internet.

    <p>True (A)</p> Signup and view all the answers

    What protocol is used for secure communication over the internet?

    <p>HTTPS</p> Signup and view all the answers

    A web server is a computer dedicated to storing web pages securely and delivering them when requested, and it is identified by its unique ______.

    <p>IP address</p> Signup and view all the answers

    Match the following web protocols and their purposes:

    <p>HTTP = Unsecure data transfer HTTPS = Secure data transfer URL = Address of a resource Cookie = Data stored on a user's computer</p> Signup and view all the answers

    What is a characteristic of cryptocurrency?

    <p>It is secured by cryptography. (B)</p> Signup and view all the answers

    Digital currency can exist in a purely electronic form.

    <p>True (A)</p> Signup and view all the answers

    Name one well-known form of digital currency.

    <p>Cryptocurrency</p> Signup and view all the answers

    A blockchain consists of multiple ________.

    <p>blocks</p> Signup and view all the answers

    What happens if someone tries to tamper with a block in the blockchain?

    <p>The hash will change, triggering an alarm. (B)</p> Signup and view all the answers

    Match the following elements of a block with their descriptions:

    <p>Data in the block = Amount of money transferred Hash value = Unique value created for each block Previous hash value = Points to the prior block in the chain Block = Collection of transaction information</p> Signup and view all the answers

    Blockchain technology relies on a central banking system for security.

    <p>False (B)</p> Signup and view all the answers

    Digital currency can be converted into physical cash using an ________.

    <p>ATM</p> Signup and view all the answers

    What is the primary function of anti-malware software?

    <p>To detect and remove security threats (A)</p> Signup and view all the answers

    Strong passwords are ineffective against phishing attacks.

    <p>True (A)</p> Signup and view all the answers

    What are two common forms of authentication?

    <p>Username and password, Two-factor authentication</p> Signup and view all the answers

    Anti-spyware software helps encrypt files to make the data more _____ in case it is spied on.

    <p>secure</p> Signup and view all the answers

    Which feature is NOT typically provided by anti-spyware software?

    <p>Improves computer performance (A)</p> Signup and view all the answers

    Match the authentication type to its description:

    <p>Username and Password = Most common authentication mechanism Two-Factor Authentication = Requires two separate forms of identification Biometrics = Uses physical characteristics for verification Password Encryption = Stores passwords securely</p> Signup and view all the answers

    Two-factor authentication is typically a combination of a password and a _____ sent to your smartphone.

    <p>code</p> Signup and view all the answers

    What action can a system take to protect itself after a user has attempted to enter their password incorrectly multiple times?

    <p>Lock the user out</p> Signup and view all the answers

    What is one of the primary functions of a firewall?

    <p>Block unauthorized access (D)</p> Signup and view all the answers

    Proxy servers can improve security by masking the user's IP address.

    <p>True (A)</p> Signup and view all the answers

    What is one way to protect data from accidental damage?

    <p>Backup</p> Signup and view all the answers

    ____ can be spilled on a device, causing potential damage.

    <p>Water</p> Signup and view all the answers

    Match the following protection methods with their causes of data damage:

    <p>Backup = Data is accidentally deleted UPS = Power surge/loss Fireproof box = Fire can destroy device Waterproof box = Water can be spilled on the device</p> Signup and view all the answers

    Which of the following is a characteristic of the Secure Sockets Layer (SSL) protocol?

    <p>It allows secure data transmission over the internet. (D)</p> Signup and view all the answers

    Cache helps to reduce response time by storing frequently viewed web pages.

    <p>True (A)</p> Signup and view all the answers

    What device can be used to protect data during power surges?

    <p>UPS (Uninterruptible Power Supply)</p> Signup and view all the answers

    Flashcards

    Internet

    A global network of networks that connects billions of computers and devices.

    World Wide Web (WWW)

    A service accessed through the internet, enabling users to view web pages.

    Uniform Resource Locator (URL)

    An address that uniquely identifies a specific web page or resource on the web.

    Web server

    A computer that stores and delivers web pages to users upon request.

    Signup and view all the flashcards

    Web page

    A document on the World Wide Web that can contain text, images, and other media.

    Signup and view all the flashcards

    Timestamp in Blockchains

    A timestamp in a block of data records the time of its creation, crucial for identifying when an event occurred.

    Signup and view all the flashcards

    Genesis Block

    The first block in a blockchain; it doesn't link to a previous block.

    Signup and view all the flashcards

    P2P Network (Blockchain)

    A decentralized network of computers (nodes) sharing data, where each node acts like a server.

    Signup and view all the flashcards

    Proof-of-Work (POW)

    A protocol where network participants (miners) solve complex math problems to add new blocks to the blockchain.

    Signup and view all the flashcards

    Blockchain Transaction Process (steps)

    A step-by-step process involving request, broadcasting, validation, addition to blockchain; a permanent record.

    Signup and view all the flashcards

    DNS Cache Poisoning

    A cyberattack where a malicious actor alters DNS records on a server, redirecting users to fake websites.

    Signup and view all the flashcards

    Phishing

    A type of online fraud where attackers use deceptive emails and websites to trick users into revealing personal information, like passwords or credit card details.

    Signup and view all the flashcards

    Social Engineering

    A technique used by attackers to manipulate people into providing confidential information or performing actions that can be misused for malicious purposes.

    Signup and view all the flashcards

    HTTPS

    A secure protocol used for communication over the internet, encrypting data sent between a website and the user's browser.

    Signup and view all the flashcards

    How to protect against phishing

    Always verify the legitimacy of emails and websites, never click suspicious links, and use anti-phishing tools to detect malicious websites.

    Signup and view all the flashcards

    Digital Currency

    Any form of payment existing only electronically, not physically tangible like cash. It's handled and transferred through online systems.

    Signup and view all the flashcards

    Cryptocurrency

    A type of digital currency secured by cryptography. Usually decentralized and not controlled by a central bank.

    Signup and view all the flashcards

    Blockchain

    A decentralized database storing all transactions of networked members. It's a digital ledger that's spread across many computers.

    Signup and view all the flashcards

    Block (in Blockchain)

    A group of transactions in a blockchain. Each block contains the transaction data, and links to the previous block.

    Signup and view all the flashcards

    Hash Value (in Blockchain)

    A unique code for each block, acting as a fingerprint. It's calculated using an algorithm.

    Signup and view all the flashcards

    Decentralized Database

    A database not controlled by a single entity. Instead, the data is distributed among multiple computers within a network.

    Signup and view all the flashcards

    Session Cookies

    Temporary cookies used to store information about online shopping sessions, like items in a shopping cart.

    Signup and view all the flashcards

    Previous Hash Value (in Blockchain)

    Links a block to the previous block in the chain .

    Signup and view all the flashcards

    Anti-Malware

    Software designed to detect and remove malicious programs like viruses, spyware, and ransomware from a computer system.

    Signup and view all the flashcards

    Anti-Spyware

    A specific type of anti-malware software that specifically targets spyware aiming to steal personal information.

    Signup and view all the flashcards

    Authentication

    The process of verifying a user's identity, ensuring they are who they claim to be.

    Signup and view all the flashcards

    Username and Password Authentication

    The most common authentication method, where a unique username and a secret password are used to verify a user's identity.

    Signup and view all the flashcards

    Two-Factor Authentication

    A more secure authentication method that requires two separate forms of identification, for example, a password and a code sent to a mobile device.

    Signup and view all the flashcards

    Encryption

    The process of transforming data into an unreadable format, protecting it from unauthorized access.

    Signup and view all the flashcards

    Keylogging

    A type of spyware that records every keystroke a user makes, potentially stealing passwords and sensitive information.

    Signup and view all the flashcards

    Webcam and Microphone Blocking

    Anti-malware features that prevent unauthorized access to a user's webcam and microphone.

    Signup and view all the flashcards

    Proxy Server

    A server that acts as an intermediary between your computer and the internet, hiding your network from direct exposure and offering security features like filtering and caching.

    Signup and view all the flashcards

    Cache (Proxy Servers)

    A temporary storage space within a proxy server that holds frequently accessed web pages, allowing for faster retrieval and reduced load on the web server.

    Signup and view all the flashcards

    Data Damage: Accidental Deletion

    When data is unintentionally removed from storage, often due to misclicks, accidental formatting, or software errors.

    Signup and view all the flashcards

    Data Protection: Backup

    Creating a duplicate copy of your data stored in a separate location, facilitating recovery in case of accidental data loss or hardware failure.

    Signup and view all the flashcards

    Data Damage: Hardware Failure

    Physical damage or malfunction of a device, impacting access to stored data. Causes include power surges, physical impact, or component failure.

    Signup and view all the flashcards

    Protocol

    A set of established rules and procedures that define how data is exchanged between computers or devices on a network.

    Signup and view all the flashcards

    SSL (Secure Sockets Layer)

    A protocol that encrypts data transmitted over the internet, ensuring secure and confidential communication between your computer and a website.

    Signup and view all the flashcards

    DoS Attack (Denial of Service)

    An attack that overwhelms a server with excessive requests, making it unable to respond to legitimate users and effectively denying service.

    Signup and view all the flashcards

    Study Notes

    Internet and its Uses

    • A network consists of two or more computers that share resources.
    • The internet is a global wide area network (WAN) that billions of people use daily.
    • The internet is the infrastructure that supports and facilitates the internet's functions.
    • The World Wide Web (WWW) is a service on the internet.
    • Webpages are documents or resources, which are stored on web servers—webpages can contain text and media.
    • Webpages are linked together using hyperlinks to navigate through the connections of resources.
    • A Uniform Resource Locator (URL) is a unique address (text-based) that allows access to resources on the World Wide Web.
    • A web server is a computer dedicated to storing and delivering web pages to users when requested.
    • A Network Interface Card (NIC) is a component in a computer that enables it to connect to a network.

    Web Pages

    • Web pages are typically created using HTML, CSS, and JavaScript.
    • HTML, HyperText Markup Language, is a markup language used to create web pages.
    • CSS, Cascading Style Sheets, is a presentation language that controls the appearance and styling of web pages.
    • JavaScript is a scripting language that is used to enhance HTML pages.

    HyperText Transfer Protocol (HTTP)

    • HTTP is a protocol for data transmission over the internet.
    • HTTP, in combination with SSL/TLS, transmits data securely.
    • It encrypts data for security.

    Web Browsers

    • A web browser is a software program that retrieves and displays web pages.
    • A web browser translates HTML code into a viewable page.
    • Common examples include Chrome, Firefox, Edge, and Internet Explorer.
    • Provides security through secure methods.

    Internet Protocol (IP) Addresses

    • An IP address is a unique identification number for each device connected to the internet.
    • It identifies each location on the internet—allowing other devices to communicate.
    • A dynamic IP address changes each time a device connects to the network.

    Domain Name System (DNS)

    • DNS acts as a phonebook for the internet.
    • It translates domain names, for example nytimes.com or espn.com, into IP addresses so web browsers can access internet resources.

    Transmission Control Protocol (TCP)

    • TCP is the standard method for communicating over the internet.
    • Enables the accurate and correct transmission of data between devices, using packet switching.

    Cookies

    • Cookies are small text files stored on a user's computer by a web browser at the request of a web server.
    • Session cookies are temporary and deleted once the session ends.
    • Cookies store: user preferences, visitor identification, shopping basket items, and login details.
    • Used for targeted advertising.

    Digital Currency

    • Digital currency is a payment method that exists in an electronic form, as opposed to physical currency.
    • Cryptocurrency (e.g., Bitcoin) is a virtual currency that is secured using cryptography (encryption).
    • Traditional digital currencies are regulated and controlled by central banks.
    • Digital currency transactions use technologies like smartphones, credit cards, and online exchanges to be traded, in some cases can be exchanged for physical cash through an ATM.

    Blockchain

    • Blockchain is a decentralized database that contains all transactions of networked members.
    • It consists of interconnected computers (not connected to a central server).
    • New transactions result in an updated copy of transaction being sent to every computer.
    • Transactions are grouped, forming "blocks".

    Peer-to-Peer (P2P) Network

    • A P2P network is a decentralized network where devices connect.
    • Each device acts as its own server.

    Cyber Security Threats

    • Cyber threats are risks that can damage or exploit internet-connected systems (hardware, software, and data)
    • Examples include Brute-force attacks, Data interception, Distributed denial of service (DDoS) attacks, Hacking and Malware (viruses, worms, Trojans, spyware, adware).
    • Other threats include Phishing, Social engineering, and Pharming

    Protection against Cyber Security Threats

    • Techniques to prevent or reduce the impact of cyber security threats include firewalls, access levels, anti-malware (antivirus and anti-spyware software), automatic updates, careful review of emails (spelling, links, or attachments).

    Access Levels

    • Systems have access levels tied to usernames and passwords.
    • Access levels dictate what users can do with the system—crucial to protect and control sensitive data.

    Anti-Malware

    • Anti-malware software, including antivirus and anti-spyware, is essential to protect the computer system.
    • Prevents and removes malicious software.
    • Regularly updating and scanning devices protects from new threats.

    Authentication

    • Authentication is the process of confirming the identity of a user.
    • Includes usernames and passwords, biometrics, or two-step verification.
    • Strong passwords, frequent changing of passwords, and using multiple forms of authentication are essential for high security.

    SSL (Secure Sockets Layer)

    • SSL is a protocol that encrypts data sent over the internet, protecting it from unauthorized access.
    • This ensures security of user's data, and is used on websites that require security of transactions.
    • Ensures website and user's device authenticity.

    TLS (Transport Layer Security)

    • TLS is an improved version of SSL with some key differences, but they protect user data in similar ways.
    • TLS provides security and privacy for data between devices and users—crucial for safe communication over the internet.
    • Crucial for secure online transactions that involve data transmission.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge about the internet and its functionalities. This quiz covers various aspects like networks, web pages, and the technologies that support the web. Get ready to explore how the internet connects billions of users worldwide.

    More Like This

    Internet Uses and Benefits
    10 questions
    Internet Overview and Uses
    17 questions

    Internet Overview and Uses

    ImpartialMagnesium avatar
    ImpartialMagnesium
    Introduction to the Internet and Web
    45 questions
    Use Quizgecko on...
    Browser
    Browser