Internet technologies
44 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT a characteristic of an Intranet?

  • Shares information within an organization
  • Open to public access (correct)
  • Uses TCP/IP protocol
  • Private computer network

Vinton Gray Cerf is known as the father of the World Wide Web (WWW).

False (B)

Name a popular broadband technology that uses coaxial cables for internet access.

Cable Internet

__________ technology uses optical fibers for high-speed data transmission to homes.

<p>FTTH</p> Signup and view all the answers

Match the broadband technology with its description:

<p>ISDN = Broadband service for voice and digital data DSL = Internet via standard telephone lines Wi-MAX = Metropolitan Area Network for wireless internet Satellite Broadband = Internet connectivity through a satellite</p> Signup and view all the answers

Which wireless broadband access method provides internet using mobile phones and USB modems?

<p>Mobile Broadband (B)</p> Signup and view all the answers

Leased lines are typically used to provide internet access to individual home users.

<p>False (B)</p> Signup and view all the answers

Which of the following components is NOT typically required for connecting to the Internet?

<p>Printer (B)</p> Signup and view all the answers

Which technology is used for locating geographic positions using a satellite-based navigation system?

<p>GPS (C)</p> Signup and view all the answers

Which of the following is the odd one out?

<p>Firewall (A)</p> Signup and view all the answers

Which of the following is NOT a function of a web browser?

<p>Indexing keywords for search engines (A)</p> Signup and view all the answers

Wi-MAX Internet connectivity uses satellite connection.

<p>False (B)</p> Signup and view all the answers

Which security measure primarily protects against man-in-the-middle attacks?

<p>Using encrypted connections like HTTPS (B)</p> Signup and view all the answers

In an email, 'Cc' recipients are kept unaware of who else received the email.

<p>False (B)</p> Signup and view all the answers

Acquiring information such as username, password, credit card details using misleading websites is known as _______.

<p>phishing</p> Signup and view all the answers

What is the purpose of a URL?

<p>A URL is a reference or address used to access resources or documents on the World Wide Web.</p> Signup and view all the answers

A firewall primarily functions by scanning files for known viruses and removing them.

<p>False (B)</p> Signup and view all the answers

________ are programs used by search engines to explore web pages and collect information.

<p>Web crawlers</p> Signup and view all the answers

What is the primary function of antivirus programs?

<p>to detect viruses and cure infected systems</p> Signup and view all the answers

__________ are small text files created when you visit a website and remember your preferences.

<p>cookies</p> Signup and view all the answers

Match the following terms with their descriptions:

<p>WWW = A system of interlinked hypertext documents Search Engine = A tool for finding information on the internet E-mail = A method of exchanging digital messages Social Blog = Informational website with entries in reverse chronological order</p> Signup and view all the answers

Which of the following best describes a microblog?

<p>A social media site for exchanging short messages and multimedia. (C)</p> Signup and view all the answers

Which of the following is a characteristic of 4G mobile communication technology?

<p>Mobile ultra-broadband Internet access (B)</p> Signup and view all the answers

Match the mobile communication technology with its description:

<p>SMS = Exchanging short text messages. MMS = Sending multimedia content. GPS = Global Positioning System for location data. Smart cards = Secure storage of information and authentication.</p> Signup and view all the answers

Internet forums are characterized by posts displayed in reverse chronological order.

<p>False (B)</p> Signup and view all the answers

Which of the following is a primary advantage of using email for communication?

<p>Cost-effectiveness and availability anytime, anywhere. (A)</p> Signup and view all the answers

How does a 'man-in-the-middle' attack typically occur?

<p>By intercepting and possibly modifying messages between sender and receiver. (B)</p> Signup and view all the answers

Explain how cookies can be a security risk.

<p>hackers can use cookies for malicious purposes, such as spyware</p> Signup and view all the answers

Which of the following is the primary function of a computer worm?

<p>To replicate itself and spread to other computers. (D)</p> Signup and view all the answers

Ethical hacking involves breaking into secure networks to destroy data.

<p>False (B)</p> Signup and view all the answers

What is the main goal of a Denial of Service (DoS) attack?

<p>To force a server/computer to restart</p> Signup and view all the answers

An attempt to acquire sensitive information by posing as a legitimate website is known as ______.

<p>phishing</p> Signup and view all the answers

Match the following social media platforms with their primary function:

<p>Facebook = Connecting with friends and sharing content LinkedIn = Professional networking YouTube = Organizing and sharing videos Wikipedia = Community document</p> Signup and view all the answers

Which of the following best describes a Trojan horse?

<p>A program that appears useful but causes damage once installed. (D)</p> Signup and view all the answers

Spam emails are typically sent to a targeted group of individuals with personalized content.

<p>False (B)</p> Signup and view all the answers

What is the difference between 'black hat' and 'grey hat' hackers?

<p>Black hats act maliciously, while grey hats act illegally though with good intentions.</p> Signup and view all the answers

Which of the following is the primary function of a Global Positioning System (GPS)?

<p>To locate a geographical position using longitude and latitude. (C)</p> Signup and view all the answers

A smart card's data is NOT protected.

<p>False (B)</p> Signup and view all the answers

Name an operating system, other than Android, used in mobile phones.

<p>iOS</p> Signup and view all the answers

Android is a Linux-based operating system designed mainly for touch screen mobile devices such as smart phones and ______.

<p>tablets</p> Signup and view all the answers

Match the following terms with their corresponding descriptions:

<p>GPS = Satellite-based navigation system Smart Card = Plastic card with embedded computer chip Android = Linux-based mobile operating system Mobile OS = Software managing hardware and connectivity</p> Signup and view all the answers

Which company initially developed the Android operating system?

<p>Android Inc. (D)</p> Signup and view all the answers

What is the full form of SIM?

<p>Subscriber Identity Module (D)</p> Signup and view all the answers

A technical effort to manipulate the normal behavior of networked computer systems is known as:

<p>Hacking (A)</p> Signup and view all the answers

Flashcards

Internet

An interconnected global system of computer networks.

Vinton Gray Cerf

Considered the 'father of the Internet'.

Tim Berners Lee

Proposed the idea of the World Wide Web (WWW).

Intranet

A private network using TCP/IP to share resources within an organization.

Signup and view all the flashcards

Modem

A device that converts digital signals to analog for transmission over phone lines, and vice versa.

Signup and view all the flashcards

Cable Internet

Internet access using coaxial cables.

Signup and view all the flashcards

DSL

Internet access through standard telephone lines.

Signup and view all the flashcards

FTTH

Internet via optical fibers directly to homes.

Signup and view all the flashcards

World Wide Web (WWW)

A system of interlinked hypertext documents accessed via the Internet.

Signup and view all the flashcards

Web Browser

Software to retrieve and navigate web pages (e.g., Chrome, Firefox).

Signup and view all the flashcards

Search Engines

Programs to find information on the web using web crawlers.

Signup and view all the flashcards

Web Crawlers/Spiders/Robots

Programs that search web pages and index keywords and URLs.

Signup and view all the flashcards

E-mail

Exchanging digital messages between computers over the Internet.

Signup and view all the flashcards

Sections of an E-mail

To, Cc, Bcc, Subject, Content, Attachments.

Signup and view all the flashcards

Internet Forums

Online discussion websites for conversations via posted messages.

Signup and view all the flashcards

Social Blogs

Websites with posts displayed in reverse chronological order.

Signup and view all the flashcards

GPS

A satellite-based navigation system used to determine precise geographic locations.

Signup and view all the flashcards

DoS Attack

An attack that disrupts server availability by overwhelming it with traffic.

Signup and view all the flashcards

Browsing (Internet)

Navigating the Internet to find information, usually with a web browser.

Signup and view all the flashcards

Phishing

A type of fraud where attackers try to trick individuals into revealing sensitive information through deceptive websites or emails.

Signup and view all the flashcards

Man-in-the-middle attack

An attack where an attacker intercepts and modifies messages between sender and receiver.

Signup and view all the flashcards

Firewall

A hardware and software system that protects a network by denying malicious data.

Signup and view all the flashcards

Antivirus programs

Tools that detect and remove viruses from a computer system.

Signup and view all the flashcards

Cookies

Small text files that websites create to remember user preferences.

Signup and view all the flashcards

Mobile computing

Computing that can transmit data while in motion using portable devices.

Signup and view all the flashcards

1G mobile phones

Analog system providing basic voice facility.

Signup and view all the flashcards

2G networks

Digital system introduced picture messages and MMS.

Signup and view all the flashcards

3G networks

Multimedia services combining voice and data, transmitting large data amounts.

Signup and view all the flashcards

Smart Card

A plastic card with a computer chip that stores and transacts data securely.

Signup and view all the flashcards

Mobile Operating System

Software managing hardware, multimedia, and internet connectivity in mobile devices.

Signup and view all the flashcards

Android OS

A Linux-based OS for touchscreen mobile devices, developed by Google.

Signup and view all the flashcards

SIM Card (Full Form)

Subscriber Identity Module: authenticates your mobile phone to the network.

Signup and view all the flashcards

White Hat Hacker

An ethical hacker who uses their skills to identify vulnerabilities and improve security.

Signup and view all the flashcards

Spam

Unsolicited emails sent to a large number of recipients.

Signup and view all the flashcards

Wikis

Websites where users can collaboratively add or modify content, creating a community document.

Signup and view all the flashcards

Social Networks

Online platforms for building personal pages, connecting with others, and sharing content like text, pictures, and videos.

Signup and view all the flashcards

Content Communities

Websites designed for organizing and sharing specific types of content, such as photos or videos.

Signup and view all the flashcards

Computer Virus

A program that attaches to another program or file and spreads to other computers without knowledge, interfering with normal operation.

Signup and view all the flashcards

Computer Worm

A standalone malware program that replicates itself to spread to other computers.

Signup and view all the flashcards

Trojan Horse

Malicious software disguised as a useful program, but causes damage once installed.

Signup and view all the flashcards

Spam/Junk Mails

Unsolicited emails sent to many recipients, often promoting a product or service.

Signup and view all the flashcards

Study Notes

  • Internet is a global system of interconnected computer networks.
  • Vinton Gray Cerf is considered the father of the Internet.
  • Tim Berners Lee proposed the idea of the World Wide Web (WWW).
  • Intranet is a private computer network, similar to the Internet, using TCP/IP protocol for sharing within an organization.

Hardware and Software for Internet Connection

  • Computer with Network Interface Card (wired/wireless) and TCP/IP compatible OS
  • Modem
  • Internet account from an Internet Service Provider (ISP)
  • Software like browser, email client, chat applications

Dial-up vs. Wired Broadband

  • Dial-up offers slow connection speeds (up to 56 kbps), requires dialing, uses telephone line exclusively, uses dial-up modem
  • Wired broadband offers high-speed connections (usually > 256 kbps), is always on, allows simultaneous voice and Internet, uses a broadband modem

Broadband Technologies

  • Integrated Services Digital Network (ISDN) is a broadband service for voice and digital data.

  • Cable Internet: Internet access via coaxial cables used for TV signal transmission.

  • DSL: Internet connection through standard telephone lines.

  • Leased lines are dedicated lines for Internet to ISPs, businesses, etc.

  • Fibre to the Home (FTTH) uses optical fibres for data transmission to homes.

  • Wireless broadband provides speeds similar to wired, including Mobile Broadband, Wi-MAX, Satellite Broadband, and Wi-Fi.

  • Mobile broadband: Wireless Internet via mobile phone, USB modem, tablets, etc.

  • Wi-MAX (Worldwide Interoperability for Microwave Access) offers wireless Internet up to 50 km.

  • Satellite broadband provides Internet connectivity through a satellite.

  • Internet connection sharing allows multiple computers to use one connection via LAN, Wi-Fi, or Li-Fi.

  • Internet services: WWW, e-mail, search engines, social media, etc.

  • World Wide Web (WWW) is a system of interlinked hypertext documents accessed via the Internet.

Web Browsers

  • Web browser software retrieves, presents, and navigates web pages (e.g., Chrome, Explorer, Firefox, Opera, Safari).

Web Browsing Procedure

  • Browser requests IP address from ISP's DNS

  • Server returns IP address

  • Browser makes a TCP connection to the server

  • Browser sends a GET request for the file

  • The server returns the file

  • Search engines: Websites designed to help find information, using web crawlers (spiders/robots).

  • Search engine functioning: Web crawlers find keywords on web pages and store them with URLs, creating an index, then displaying a list of URLs when a topic is searched.

  • Email is digital message exchange over the Internet.

  • Email sections: "To" (recipient), "Cc" (secondary), "Bcc" (tertiary), Subject, Content, Attachments.

Email Functioning

  • Sender composes message using email client/webmail
  • Sender uploads message to SMTP (Simple Mail Transfer Protocol) server
  • Message traverses the Internet
  • Message arrives at receiving server and is placed in recipient's mailbox
  • Recipient's email checks for new messages and downloads it
  • Recipient reads the message

Email Advantages

  • Email's advantages include speed, ease of use attachments, environmentally friendly, easy reply and cost effectiveness

Types of Social Media

  • Social media types are internet forums, social blogs, micro blogs, wikis, social networks and content communities
  • Internet forums are for online discussions via posted messages (e.g., Ubuntu Forum).
  • Social blogs are informational websites with reverse chronological posts (e.g., Blogger, WordPress).
  • Microblogs allow short sentences/images/videos exchange (e.g., Twitter).
  • Wikis enable users to add/edit content for collaborative documents (e.g., Wikipedia).
  • Social networks allow personal web pages and connecting with friends (e.g., Facebook, LinkedIn).
  • Content communities organize and share content like photos, videos, etc. (e.g., YouTube, Flickr).
  • Advantages of Social media: brings people together, plans and organizes events, business promotion and enhances business skills
  • Limitation of social media includes intrusion to provacy, addiction and spreading rumours

Malware

  • Computer virus attaches itself to other programs, spreading without knowledge and interfering with computer operations.
  • Computer worm is standalone malware that replicates to spread to other computers.
  • Trojan horse appears useful but damages once installed/run.
  • Spams: Unsolicited emails sent to promote a product or service.
  • Hacking is manipulating network connections.

Ethical Hacking

  • Ethical hacking performed by "white hats" to test and secure vulnerabilities
  • Criminal hacking ("black hats") breaks into networks to destroy data
  • "Grey hat hackers" act illegally to identify vulnerabilities

Network Attacks

  • Denial of Service (DoS) attacks a web server, forcing a restart.
  • Phishing attempts to acquire information by impersonating original websites and creating misleading websites (spoofing).
  • Man-in-the-middle attack secretly intercepts and modifies messages; use HTTPS/SFTP for secure transactions.
  • Firewall provides network security, denying malicious data.
  • Antivirus programs detect, cure and remove viruses by scanning known viruses.
  • Cookies are small text files websites create that remember usernames, preferences, etc, that can be used as spyware.
  • Mobile computing is computing and data transmission while in motion, using devices like laptops, tablets, and smartphones.
  • 1G mobile phones were analog with basic voice.

Generations of Communication

  • 2G networks were digital , introducing picture messages and MMS.
  • 3G networks offered multimedia combining voice and data.
  • 4G (LTE) provides ultra-broadband Internet access with high speeds and quality images/videos.
  • Mobile communication technologies include SMS, MMS, GPS, and smart cards.
  • SMS is a text messaging service (up to 160 characters).
  • MMS sends multimedia content.

GPS

  • GPS is a satellite navigation system for locating positions.
  • Smart cards store/transact data.
  • Advantages of using Secure, intelligent and convenient smart cards.
  • Mobile Operating System manages hardware, multimedia, Internet (e.g., Android, iOS, BlackBerry OS, Windows Phone).
  • Android (Linux-based) is for touch screen devices, developed by Android Inc. (founded by Andy Rubin in 2003) and acquired by Google in 2005.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Explore Internet characteristics, broadband technologies, and security. Identify components for connecting to the Internet and security measures.

More Like This

Use Quizgecko on...
Browser
Browser