Podcast
Questions and Answers
Which of the following is NOT a characteristic of an Intranet?
Which of the following is NOT a characteristic of an Intranet?
- Shares information within an organization
- Open to public access (correct)
- Uses TCP/IP protocol
- Private computer network
Vinton Gray Cerf is known as the father of the World Wide Web (WWW).
Vinton Gray Cerf is known as the father of the World Wide Web (WWW).
False (B)
Name a popular broadband technology that uses coaxial cables for internet access.
Name a popular broadband technology that uses coaxial cables for internet access.
Cable Internet
__________ technology uses optical fibers for high-speed data transmission to homes.
__________ technology uses optical fibers for high-speed data transmission to homes.
Match the broadband technology with its description:
Match the broadband technology with its description:
Which wireless broadband access method provides internet using mobile phones and USB modems?
Which wireless broadband access method provides internet using mobile phones and USB modems?
Leased lines are typically used to provide internet access to individual home users.
Leased lines are typically used to provide internet access to individual home users.
Which of the following components is NOT typically required for connecting to the Internet?
Which of the following components is NOT typically required for connecting to the Internet?
Which technology is used for locating geographic positions using a satellite-based navigation system?
Which technology is used for locating geographic positions using a satellite-based navigation system?
Which of the following is the odd one out?
Which of the following is the odd one out?
Which of the following is NOT a function of a web browser?
Which of the following is NOT a function of a web browser?
Wi-MAX Internet connectivity uses satellite connection.
Wi-MAX Internet connectivity uses satellite connection.
Which security measure primarily protects against man-in-the-middle attacks?
Which security measure primarily protects against man-in-the-middle attacks?
In an email, 'Cc' recipients are kept unaware of who else received the email.
In an email, 'Cc' recipients are kept unaware of who else received the email.
Acquiring information such as username, password, credit card details using misleading websites is known as _______.
Acquiring information such as username, password, credit card details using misleading websites is known as _______.
What is the purpose of a URL?
What is the purpose of a URL?
A firewall primarily functions by scanning files for known viruses and removing them.
A firewall primarily functions by scanning files for known viruses and removing them.
________ are programs used by search engines to explore web pages and collect information.
________ are programs used by search engines to explore web pages and collect information.
What is the primary function of antivirus programs?
What is the primary function of antivirus programs?
__________ are small text files created when you visit a website and remember your preferences.
__________ are small text files created when you visit a website and remember your preferences.
Match the following terms with their descriptions:
Match the following terms with their descriptions:
Which of the following best describes a microblog?
Which of the following best describes a microblog?
Which of the following is a characteristic of 4G mobile communication technology?
Which of the following is a characteristic of 4G mobile communication technology?
Match the mobile communication technology with its description:
Match the mobile communication technology with its description:
Internet forums are characterized by posts displayed in reverse chronological order.
Internet forums are characterized by posts displayed in reverse chronological order.
Which of the following is a primary advantage of using email for communication?
Which of the following is a primary advantage of using email for communication?
How does a 'man-in-the-middle' attack typically occur?
How does a 'man-in-the-middle' attack typically occur?
Explain how cookies can be a security risk.
Explain how cookies can be a security risk.
Which of the following is the primary function of a computer worm?
Which of the following is the primary function of a computer worm?
Ethical hacking involves breaking into secure networks to destroy data.
Ethical hacking involves breaking into secure networks to destroy data.
What is the main goal of a Denial of Service (DoS) attack?
What is the main goal of a Denial of Service (DoS) attack?
An attempt to acquire sensitive information by posing as a legitimate website is known as ______.
An attempt to acquire sensitive information by posing as a legitimate website is known as ______.
Match the following social media platforms with their primary function:
Match the following social media platforms with their primary function:
Which of the following best describes a Trojan horse?
Which of the following best describes a Trojan horse?
Spam emails are typically sent to a targeted group of individuals with personalized content.
Spam emails are typically sent to a targeted group of individuals with personalized content.
What is the difference between 'black hat' and 'grey hat' hackers?
What is the difference between 'black hat' and 'grey hat' hackers?
Which of the following is the primary function of a Global Positioning System (GPS)?
Which of the following is the primary function of a Global Positioning System (GPS)?
A smart card's data is NOT protected.
A smart card's data is NOT protected.
Name an operating system, other than Android, used in mobile phones.
Name an operating system, other than Android, used in mobile phones.
Android is a Linux-based operating system designed mainly for touch screen mobile devices such as smart phones and ______.
Android is a Linux-based operating system designed mainly for touch screen mobile devices such as smart phones and ______.
Match the following terms with their corresponding descriptions:
Match the following terms with their corresponding descriptions:
Which company initially developed the Android operating system?
Which company initially developed the Android operating system?
What is the full form of SIM?
What is the full form of SIM?
A technical effort to manipulate the normal behavior of networked computer systems is known as:
A technical effort to manipulate the normal behavior of networked computer systems is known as:
Flashcards
Internet
Internet
An interconnected global system of computer networks.
Vinton Gray Cerf
Vinton Gray Cerf
Considered the 'father of the Internet'.
Tim Berners Lee
Tim Berners Lee
Proposed the idea of the World Wide Web (WWW).
Intranet
Intranet
Signup and view all the flashcards
Modem
Modem
Signup and view all the flashcards
Cable Internet
Cable Internet
Signup and view all the flashcards
DSL
DSL
Signup and view all the flashcards
FTTH
FTTH
Signup and view all the flashcards
World Wide Web (WWW)
World Wide Web (WWW)
Signup and view all the flashcards
Web Browser
Web Browser
Signup and view all the flashcards
Search Engines
Search Engines
Signup and view all the flashcards
Web Crawlers/Spiders/Robots
Web Crawlers/Spiders/Robots
Signup and view all the flashcards
E-mail
Signup and view all the flashcards
Sections of an E-mail
Sections of an E-mail
Signup and view all the flashcards
Internet Forums
Internet Forums
Signup and view all the flashcards
Social Blogs
Social Blogs
Signup and view all the flashcards
GPS
GPS
Signup and view all the flashcards
DoS Attack
DoS Attack
Signup and view all the flashcards
Browsing (Internet)
Browsing (Internet)
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Man-in-the-middle attack
Man-in-the-middle attack
Signup and view all the flashcards
Firewall
Firewall
Signup and view all the flashcards
Antivirus programs
Antivirus programs
Signup and view all the flashcards
Cookies
Cookies
Signup and view all the flashcards
Mobile computing
Mobile computing
Signup and view all the flashcards
1G mobile phones
1G mobile phones
Signup and view all the flashcards
2G networks
2G networks
Signup and view all the flashcards
3G networks
3G networks
Signup and view all the flashcards
Smart Card
Smart Card
Signup and view all the flashcards
Mobile Operating System
Mobile Operating System
Signup and view all the flashcards
Android OS
Android OS
Signup and view all the flashcards
SIM Card (Full Form)
SIM Card (Full Form)
Signup and view all the flashcards
White Hat Hacker
White Hat Hacker
Signup and view all the flashcards
Spam
Spam
Signup and view all the flashcards
Wikis
Wikis
Signup and view all the flashcards
Social Networks
Social Networks
Signup and view all the flashcards
Content Communities
Content Communities
Signup and view all the flashcards
Computer Virus
Computer Virus
Signup and view all the flashcards
Computer Worm
Computer Worm
Signup and view all the flashcards
Trojan Horse
Trojan Horse
Signup and view all the flashcards
Spam/Junk Mails
Spam/Junk Mails
Signup and view all the flashcards
Study Notes
- Internet is a global system of interconnected computer networks.
- Vinton Gray Cerf is considered the father of the Internet.
- Tim Berners Lee proposed the idea of the World Wide Web (WWW).
- Intranet is a private computer network, similar to the Internet, using TCP/IP protocol for sharing within an organization.
Hardware and Software for Internet Connection
- Computer with Network Interface Card (wired/wireless) and TCP/IP compatible OS
- Modem
- Internet account from an Internet Service Provider (ISP)
- Software like browser, email client, chat applications
Dial-up vs. Wired Broadband
- Dial-up offers slow connection speeds (up to 56 kbps), requires dialing, uses telephone line exclusively, uses dial-up modem
- Wired broadband offers high-speed connections (usually > 256 kbps), is always on, allows simultaneous voice and Internet, uses a broadband modem
Broadband Technologies
-
Integrated Services Digital Network (ISDN) is a broadband service for voice and digital data.
-
Cable Internet: Internet access via coaxial cables used for TV signal transmission.
-
DSL: Internet connection through standard telephone lines.
-
Leased lines are dedicated lines for Internet to ISPs, businesses, etc.
-
Fibre to the Home (FTTH) uses optical fibres for data transmission to homes.
-
Wireless broadband provides speeds similar to wired, including Mobile Broadband, Wi-MAX, Satellite Broadband, and Wi-Fi.
-
Mobile broadband: Wireless Internet via mobile phone, USB modem, tablets, etc.
-
Wi-MAX (Worldwide Interoperability for Microwave Access) offers wireless Internet up to 50 km.
-
Satellite broadband provides Internet connectivity through a satellite.
-
Internet connection sharing allows multiple computers to use one connection via LAN, Wi-Fi, or Li-Fi.
-
Internet services: WWW, e-mail, search engines, social media, etc.
-
World Wide Web (WWW) is a system of interlinked hypertext documents accessed via the Internet.
Web Browsers
- Web browser software retrieves, presents, and navigates web pages (e.g., Chrome, Explorer, Firefox, Opera, Safari).
Web Browsing Procedure
-
Browser requests IP address from ISP's DNS
-
Server returns IP address
-
Browser makes a TCP connection to the server
-
Browser sends a GET request for the file
-
The server returns the file
-
Search engines: Websites designed to help find information, using web crawlers (spiders/robots).
-
Search engine functioning: Web crawlers find keywords on web pages and store them with URLs, creating an index, then displaying a list of URLs when a topic is searched.
-
Email is digital message exchange over the Internet.
-
Email sections: "To" (recipient), "Cc" (secondary), "Bcc" (tertiary), Subject, Content, Attachments.
Email Functioning
- Sender composes message using email client/webmail
- Sender uploads message to SMTP (Simple Mail Transfer Protocol) server
- Message traverses the Internet
- Message arrives at receiving server and is placed in recipient's mailbox
- Recipient's email checks for new messages and downloads it
- Recipient reads the message
Email Advantages
- Email's advantages include speed, ease of use attachments, environmentally friendly, easy reply and cost effectiveness
Types of Social Media
- Social media types are internet forums, social blogs, micro blogs, wikis, social networks and content communities
- Internet forums are for online discussions via posted messages (e.g., Ubuntu Forum).
- Social blogs are informational websites with reverse chronological posts (e.g., Blogger, WordPress).
- Microblogs allow short sentences/images/videos exchange (e.g., Twitter).
- Wikis enable users to add/edit content for collaborative documents (e.g., Wikipedia).
- Social networks allow personal web pages and connecting with friends (e.g., Facebook, LinkedIn).
- Content communities organize and share content like photos, videos, etc. (e.g., YouTube, Flickr).
- Advantages of Social media: brings people together, plans and organizes events, business promotion and enhances business skills
- Limitation of social media includes intrusion to provacy, addiction and spreading rumours
Malware
- Computer virus attaches itself to other programs, spreading without knowledge and interfering with computer operations.
- Computer worm is standalone malware that replicates to spread to other computers.
- Trojan horse appears useful but damages once installed/run.
- Spams: Unsolicited emails sent to promote a product or service.
- Hacking is manipulating network connections.
Ethical Hacking
- Ethical hacking performed by "white hats" to test and secure vulnerabilities
- Criminal hacking ("black hats") breaks into networks to destroy data
- "Grey hat hackers" act illegally to identify vulnerabilities
Network Attacks
- Denial of Service (DoS) attacks a web server, forcing a restart.
- Phishing attempts to acquire information by impersonating original websites and creating misleading websites (spoofing).
- Man-in-the-middle attack secretly intercepts and modifies messages; use HTTPS/SFTP for secure transactions.
- Firewall provides network security, denying malicious data.
- Antivirus programs detect, cure and remove viruses by scanning known viruses.
- Cookies are small text files websites create that remember usernames, preferences, etc, that can be used as spyware.
- Mobile computing is computing and data transmission while in motion, using devices like laptops, tablets, and smartphones.
- 1G mobile phones were analog with basic voice.
Generations of Communication
- 2G networks were digital , introducing picture messages and MMS.
- 3G networks offered multimedia combining voice and data.
- 4G (LTE) provides ultra-broadband Internet access with high speeds and quality images/videos.
- Mobile communication technologies include SMS, MMS, GPS, and smart cards.
- SMS is a text messaging service (up to 160 characters).
- MMS sends multimedia content.
GPS
- GPS is a satellite navigation system for locating positions.
- Smart cards store/transact data.
- Advantages of using Secure, intelligent and convenient smart cards.
- Mobile Operating System manages hardware, multimedia, Internet (e.g., Android, iOS, BlackBerry OS, Windows Phone).
- Android (Linux-based) is for touch screen devices, developed by Android Inc. (founded by Andy Rubin in 2003) and acquired by Google in 2005.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore Internet characteristics, broadband technologies, and security. Identify components for connecting to the Internet and security measures.