cs6

¡Supera tus tareas y exámenes ahora con Quizwiz!

For a website, what file name is used (typically) for the homepage, default page, or landing place for the website? a. main.html b. index.html c. home.html d. default.html e. None of the above.

index.html

The height and width attributes for an image element represent what units of measure? a. DPI (dots per inch) b. PPI (pixels per inch) c. pixels d. mm (millimeters)

pixels

What does a DNS server do?

translates human-readable domain to numeric IP address. ex. www.google.com to 216.58.193.206

which type of sites were most heavily visited by students with laptops in class?

"Social media sites were the most-frequently visited sites during class, and importantly these sites, along with online video sites, proved to be the most disruptive with respect to academic outcomes."

Give the 2 reasons (as presented in lecture), most people disclose personal information.

- Follow the "nothing to hide, nothing to fear," principle. (G. Marx, 1996; Viseu, Clement, & Aspinall, 2004) - People voluntarily disclose information online to create online presence or persona Defined as information revelation behaviors (Gross & Acquisti, 2005)

Give the personal information definitions for the following four classes of data sharing between and individual, a company, and a third party.

- No Uses. The information ought to be deleted when the store is finished with it (for example, when the payment has cleared), because there is no further need for it. - Approval or Opt-In. The store can use it for other purposes, but only if you approve the use. - Objection or Opt-Out. The store can use it for other purposes, but not if you object to a use. - No Limits. The information can be used any way the store chooses.

What is a backdoor on a computer? What malicious program is known the installation of backdoors. Be brief, but explain clearly and completely.

- The back door gives another user access to a system, and possibly allows confidential or personal information to be compromised. - Trojan horses typically create a backdoor.

List three ways a user can protect themselves from malware, as presented in lecture and the slides.

- anti-virus software - set-up admin password - turn-on automatic updates

List 3 methods for increasing the strength of a password. Clearly number each item.

1. Expand number of possible characters for each position in password. For example passwords composed of {a-z, A-Z, 0-9} are harder to guess than passwords composed of {a-z, A-z}. 2. Increase password length: a longer password is harder to guess. 3. Use two factor authentication, e.g., sends a single use code to phone. This code and individual's password to must be validated to login.

What is Guy Kawasaki's 10-20-30 rule. What main concern does it address, with regards to giving presentations?

10-20-30 Rule (Guy Kawasaki) 10 slides - the optimal number for presentation 20 minutes - longest time you should speak 30 point font - smallest font size use

What is the age at which companies do not need specific consent (opt-in) harvest individual's data, according to the California Consumer Privacy Act of 2018? a. 18 b. 19 c. 16 d. 17 e. None of the above

16

CSS was first introduced as a standard in what year? a. 2001 b. 1999 c. 1996 d. 1990 e. None of the above.

1996

How many unique IP addresses does IPv4 provide for? a. 4 billion (approx) b. 4 trillion (approx) c. 255 * 4 d. 340,282...

4 billion (approx)

Researchers at Michigan St. found that students who participated in the laptop use study spend how much time on non-academic activities? a. 40% b. 40 min out of 90 min class c. 35 min out of 90 min class d. 35%

40%

Which of the following is correct HTML code for a heading with the largest font? a. <h1>TITLE</h1> b. <head>TITLE</head> c. <heading>TITLE d. <h5>TITLE</5> e. None of the above

<h1>TITLE</h1>

Give an embedded style sheet rule to make each of the following h2 headings have a color of red. Do not worry about making the text bold. Also, show your style rule for h2 is located in the appropriate HTML element outside of the <body>...<\body>.

<head> h2 { color:red;} </head>

Which block of HTML code below correctly implements an image element that displays happy.png. a. <image src="happy.png" height="420" width="420"> b. <img height="420" width="420">"happy.png"</img> c. <img src="happy.png" height="420" width="420"> d. <img src="happy" height="420" width="420"> e. None of the above.

<img src="happy.png" height="420" width="420">

How is an external style sheet linked to an HTML file? a. <link rel="stylesheet" href="color.css"> b. <style rel="stylesheet" href="color.cc"> c. <link style="color.css"> d. <style>link <href="color.css"> e. None of the above.

<link rel="stylesheet" href="color.css">

Give the HTML code for the bulleted list below with bold course abbreviations and course numbers. - cs006 - econ107 - econ134 - econ135

<ul> <li><b>CS 006:</b></li> <li><b>ECON 107:</b></li> <li><b>ECON 134:</b></li> <li><b>ECON 135:</b></li> </ul>

What does Jaron Lanier describe tribalism as in his book, Ten Arguments for Selecting your Social Media Account Now?

A switch that toggles between solitary wolf and wolf-pack.

Which of the following is NOT provided for by the California Consumer Privacy Act of 2018? a. The bill would require a business to make disclosures about the information and the purposes for which it is used. b. The bill would grant a consumer the right to request deletion of personal information. c. The bill would authorize businesses to offer financial incentives for collection of personal information. d. The bill would require a business to provide this information in response to a verifiable consumer request. e. All are provided for in the legislation.

All are provided for in the legislation.

Why would European Union regulation on US companies matter to US consumers? a. Many large US tech companies have international offices. b. Companies tend to meet the most restrictive regulations faced. c. US consumers are likely to demand same protections as European consumers. d. All of the above. e. None of the above.

All of the above.

What is the order of software versions, from least to greatest, for reliability and functionality? a. Alpha, beta, commercial release b. Beta, Alpha, commercial release c. Commercial release, alpha, beta d. Commercial release, beta, alpha e. None of the above.

Alpha, beta, commercial release

When the European Union privacy legislation that was written? a. April, 2016 b. May 25, 2018 c. April 25, 2018 d. May 25, 2016 e. None of the above.

April, 2016

B2B

Business to Business ex. staples

B2B2C

Business to Business to Consumer ex. amazon

B2C

Business to Consumer ex. target

What does CSS stand for? a. Captcha Style Sheets b. Container Style Sheets c. Concise Style Sheets d. Cascading Style Sheets e. None of the above.

Cascading Style Sheets

C2C

Consumer to Consumer ex. ebay, craigslist

If the following style rule declaration resided in and external CSS file that was linked to the current HTML file, how would one "override" the background color to grey, using inline style sheets. Provide only the opening tag for the header. header { margin-left: auto; margin-right: auto; width: 100%; background-color:#dde4f0; text-align: center; border-bottom: 4mm ridge #1f66ad; box-shadows: 25px -5px #800060; }

Declare style rule at a high precedence level, internal (embedded) CSS or inline CSS.

What does DNS stand for?

Domain Name System (server)

If a user sets up and administrator password, then by default all new security updates will be applied automatically, after password verification. a. TRUE b. FALSE

FALSE

Microsoft offers only a minimal amount of software support (critical security updates) for Windows 7 in January 2019. a. TRUE b. FALSE

FALSE

Apple temporarily disabled what class of apps that Facebook used? a. Dining and ride-share apps only. b. FB internal iOS apps that use an enterprise certificate (license) c. All FB internal apps that use an enterprise certificate (license) d. FB internal apps: WhatsApp, FB, Instagram, and Snapchat.

FB internal iOS apps that use an enterprise certificate (license)

What was key violation did Apple used to justify disabling internal Facebook apps? a. Facebook snooped on teenagers b. Facebook violated the enterprise certificate agreement. c. Facebook bad-mouthed Apple in previous press releases. d. None of the above.

Facebook violated the enterprise certificate agreement.

Apple earned parity in market share for operating systems with Microsoft shortly after the two companies came into existence. a. TRUE b. FALSE

False

Microsoft's first commercial product operating system was Windows 1. a. TRUE b. FALSE

False

The combined value of the 4 largest companies in the world in May of 2018 was approximately as large as the GDP for China, Brazil, and India. a. TRUE b. FALSE

False

List three specific non-academic activities students were reported to have participated in on their laptops during class.

From the article, "... Participants spent almost 40 min out of every 100- min class period using the internet for nonacademic purposes, including social media, checking email, shopping, reading the news, chatting, watching videos, and playing games.

What is the European Union privacy legislation that was recently enacted called? a. User Data Protection Act b. General Data Protection Act c. General Data Protection Regulation d. General Protection Data Regulation e. None of the above.

General Data Protection Regulation

By market cap, on May 2018, what were the 4 most valuable companies on the planet earth? a. Google (Alphabet), Apple, Amazon, Microsoft b. Google (Alphabet), Apple, Amazon, Facebook c. Google (Alphabet), Amazon, Microsoft, Samsung d. Google (Alphabet), Amazon, Microsoft, AT&T e. None of the above

Google (Alphabet), Apple, Amazon, Microsoft

Which version of HTML are we using in CS006 this term? a. XML b. XHTML5 c. HTML d. HTML5 e. None of the above.

HTML5

What does HTML stand for? a. Hypertext Markup Language b. Higher Text Markup Language c. Hyperlink Markup Language d. None of the above.

Hypertext Markup Language

Explain the difference between the World Wide Web and the Internet.

Internet is a collection of connected networks. WWW are the URL-based web resources linked by hypertext (HTTP, HTML) accessible via a browser.

When did Steve Jobs introduce the iPhone? a. Jan 9, 2010 b. Jan 9, 2007 c. June 27, 2004 d. June 27, 2007

Jan 9, 2007

The California Consumer Privacy Act of 2018 was signed into law by the Governor of California when? a. Not signed until January 2020 b. June 28, 2018 c. June 28, 2017 d. January 1, 2017 e. None of the above.

June 28, 2018

Which of the following protocols allows for designation of an attachment's file type? a. SMTP b. MIME c. POP d. IMAP

MIME

Who co-developed the Mosaic web browser and later went on to co-found Netscape? a. Tim Berners-Lee b. Marc Andreessen c. Bill Gates d. Robert Cailliau

Marc Andreessen

When a program such as McAfee SiteAdvisor marks a particular URL as "safe" with a green check mark, how is this verified? a. The URL is checked against a list of reputable companies. b. McAfee SiteAdvisor previously opens link to check if safe c. McAfee SiteAdvisor keeps a score for each site d. None of the above.

McAfee SiteAdvisor previously opens link to check if safe

If you received an e-mail indicating you needed to update your google password. Which of following links (contained in the body of the e-mail) would you assume navigates to a legitimate update password webpage? a. https://account.google.com b. http://googleaccount.com c. https://googleaccount.com d. https://tinyurl.com/2tx e. None of the above.

None of the above.

Which of the following is NOT true for a computer virus? a. Malicious b. Replicates c. Attaches to a host program d. Can lie dormant e. None of the above.

None of the above.

It was recently revealed that Facebook was using what app to snoop on users? a. Facebook Research VPN b. FB VPN c. Onova Protect app (Also Accepted) d. Onova VPN e. None of the above.

Onova Protect app (Also Accepted)

What does POP stand for? What does IMAP stand for? What do these protocols provide for? What distinguishes them from one another?

POP (post office protocol) current POP3. It receives and downloads message from incoming mail server. IMAP (internet message access protocol). It receives message from incoming mail server. Leaves message on server.

Who was the engineer that conceived one of the Internet's building blocks-- packet switching-- while working at the Rand Corporation in 1960? a. Vint Cerf b. Paul Baran c. Leonard Kleinrock d. Marc Andreessen e. Tim Berner's-Lee

Paul Baran

For the study on Canadian undergrads, what type of information were students more least likely to disclose? a. Age b. Political Views c. First Name d. Last Name

Political Views

How did students, who used laptops in class, perform on exams? a. About the same as students with no laptop use. b. Much better as students with no laptop use. c. Poorer than students with no laptop use. d. None of the Above.

Poorer than students with no laptop use

Give the definition of privacy as presented in the lecture slides.

Privacy: The right of people to choose freely under what circumstances and to what extent they will reveal themselves, their attitude, and their behavior to others.

The first significant internet attack came on November 2, 1988, in the form of the so called Morris Worm, created by a Cornell graduate student named Robert Tappan Morris. What is Robert Tappan doing today? a. 30 years to life b. Works for the IRS c. Author of Sci-Fi novels d. Professor in Computer Science at MIT

Professor in computer science at MIT

What are the two main component of a URL? Give an example domain that uses https. Then able each of the two main components of the URL.

Protocol Identifier: http://example.com (http, Hypertext Transfer Protocol) Resource Name: https://example.com (resource name is example.com)

E-commerce was not practical until what occurred? a. SSL allowed for secure ads b. SSL provided for secure transactions c. Immediate account deductions for purchases using SSL d. Immediate account return payments using SSL

SSL provided for secure transactions

What does SSL stand for? a. Secure Sockets Layer b. Security Servers Layer c. Stable Servers Location d. Stable Sortings Layer

Secure Sockets Layer

What does SMTP stand for? What is it a protocol for?

Simple Mail Transfer Protocol, it is a protocol for outgoing email protocol.

What is spyware?

Spyware collects personal information about users. It does so without user consent.

Who was the CEO of America Online? a. Steve Jobs b. Steve Case c. Steve Ballmer d. Jeff Bezos

Steve Case

Both a web browser and web server are programs that run at the application layer of the OSI model. a. TRUE b. FALSE

TRUE

FB CEO Mark Zuckerberg was asked the following as part of his congressional testimony (in follow-up written testimony) for Senate Committee on the Judiciary, Senate Committee on Commerce, Science, and Transportation: "Does Facebook offer individuals, whether registered users or not, any opportunity to not be subject to facial-recognition technology or to have data collected using facial-recognition technology deleted?" a. TRUE b. FALSE

TRUE

In HTML5, a stand-alone, or self-contained element, is referred to as a void element. a. TRUE b. FALSE

TRUE

SSL provides for encrypted client-server communication. a. TRUE b. FALSE

TRUE

If a style rule for <h2> is specified in both the <head> of and HTML file, and in the style attribute of an <h2> tag, what will be rendered in a web browser? a. The style declaration specified in the <head>. b. Any style declaration of <h2> defined in an external CSS file linked in <head>. c. The style declaration in the <h2> tag. d. None of the above.

The style declaration in the <h2> tag.

In 1991, CERN, one of the world's largest physics laboratories, based in Geneva, produced the World Wide Web. Who is known as the inventor or the World Wide Web? a. Vint Cerf b. Paul Baran c. Leonard Kleinrock d. Marc Andreessen e. Tim Berners-Lee

Tim Berners-Lee

What is the purpose for a "sandbox" in terms of antivirus malware testing? Choose the best answer. a. To provide an isolated environment to open and investigate suspicious files. b. To provide a development environment to implement malware. c. To provide a development environment search for brand new malware. d. None of the above.

To provide an isolated environment to open and investigate suspicious files.

What does TCP stand for?

Transmission Control Protocol

What two universities connected two of the first IMP ("interface message processors") packet switch machines to a network connection to communicate across becoming the first two "nodes" on ARPANET? a. UCLA, UCSB b. UTAH, STANFORD c. UCLA, STANDFORD d. UCSB, UTAH

UCLA, STANFORD

Which 4 universities connected first on ARPANET? a. UCSB, UCR, MIT, HARVARD b. UCLA, UCSB, UTAH, STANFORD c. UCLA, UCSD, UTAH, STANFORD d. UCSB, UCLA, MIT, HARVARD

UCLA, UCSB, UTAH, STANFORD

What does URL stand for?

Uniform Resource Locator

Who invented the use of the '@' symbol to separate the name of the recipient from the machine and the machine (server) that recipient is on? This is used to this day for email. a. Vint Cerf b. Paul Baran c. Leonard Kleinrock d. Marc Andreessen e. Tim Berner's-Lee

Vint Cerf

What organization sets the standards for HTML and its related languages? a. World Wide Web Consortium b. World Internet Society c. ASCII (American Standard Code for Information Interchange) d. ICANN (Internet Corporation for Assigned Names and Numbers) e. None of the above.

World Wide Web Consortium

What are two ways you could improve the diagram below, to it more appropriate for a professional setting, with regards to clip art?

a. Do not use cloud image with Zeus b. Do not use server image with cartoon figurines

List three of the categories for the 7 Deadly Sins of PowerPoint Presentation by Joseph Sommerville. Briefly describe what each category warns against.

a. Slide Transitions And Sound Effects - distracts, timing can be off, misaligned b. Standard Clipart - often familiar, miss the point or non-specific to use, appear amateurish, cliché c. Presentation Templates - see standard clipart (more subtle), eventually everyone sees them, overdone d. Text-Heavy Slides - be concise, limit sentence to phrases e. The "Me" Paradigm - Material looks good on laptop, not on big screen, careful for fonts, screen resolution f. Reading - summarize print, talk should support text g. Faith in Technology - have backup plans: connectors, no web, no sound, no projector

Which of the following is NOT true for a computer worm? a. malicious b. replicates c. attaches to a host program d. exploits security vulnerabilities on systems e. None of the above.

attaches to a host program

Which HTML element (section) contains text and elements that display in the web page directly? a. head b. body c. title d. html e. None of the above

body


Conjuntos de estudio relacionados

Module #6 - Consumer and Producer Surplus

View Set

Management Information Systems: Chapter 3 Information Systems, Organizations, and Strategy

View Set

Seleccionar/ write a question 2.2

View Set

Lifepac History & Geography 1002 Test

View Set

Філософія Рівень1

View Set

BEC 4 Information System and communication 357

View Set