CS 101 Midterm 2
Business-to-consumer commerce
, or B2C, is the electronic sale or exchange of goods and services from the companies directly to the public, or end users (e.g., online banking, online shopping, online stock trading).
Wired connections in your home
- Ethernet - standard for linking all devices in a LAN - HomePNA- Uses existing telephone wiring and jacks - Homeplug- Uses existing home electrical lines
Types of Spyware:
-Adware, or pop-up generator, is a kind of spyware that tracks web surfing or online buying so that marketers can send you targeted and unsolicited pop-up and other ads. -Browser hijackers change settings in your browser without your knowledge, often changing your browser's home page and replacing it with another web page. - Search hijackers intercept your legitimate search requests made to real search engines and return results from phony search services designed to send you to sites they run. - Key loggers, or keystroke loggers, can record each character you type and transmit that information to someone else on the Internet, making it possible for strangers to learn your passwords and other information.
High-speed modems More expensive but available in cities & most towns
-DSL line (uses reqular phone lines) - T1 line — very expensive: Generally used by large organizations (Traditioonal trunck line, fiber optic or copper, carries 24 normal telephone circuits) - Cable modem (Tv cable system/ w/ internet connection)
Intranets, extranets, VPNs = use the Internet as their base
-Intranets: use infrastructure and standards of the Internet and the web, but for an organization's internal use only. -Extranets: similar to intranets but allows use by selected outside entities, such as suppliers. -VPNs (virtual private networks): use a public network (usually the Internet) plus intranets and extranets to connect an organization's various sites) but on a private basis, via encryption and authentication; regular Internet users do not have access to the VPN's data and information. All use firewalls for security, a system of hardware and/or software that protects the system from intruders.
Connecting: To connect to the Internet you need:
1. An access device (computer with modem) 2. A means of connection (phone line, cable hookup, or wireless) 3. An Internet service provider (ISP)
Web Search Tools 1. Individual Search Engines 2. Subject Directories 3. Metasearch Engines: 4. Specialized Search Engines
1. Individual Search Engines: Compile their own searchable databases on the web -You search by typing keywords and receiving "hits" -Examples are Ask, Bing, Google, and Yahoo! 2. Subject Directories: Created and maintained by human editors, not electronic spiders -Allow you to search for information by selecting lists of categories or topics - Example sites are Beaucoup!, LookSmart, Open Directory Project, and Yahoo! Directory 3. Metasearch Engines: Allows you to search several search engines simultaneously -Examples are Yippy!, Dogpile, Mamma, MetaCrawler, and Webcrawler 4. Specialized Search Engines: Help locate specialized subject matter, such as info on movies, health, jobs -Examples are Career.com. WebMD, Expedia, U.S. Census Bureau
Digital televisions
: uses a digital signal (not analog) --Is clearer and less prone to interference than analog Interactive TV: Lets you interact with the show you're watching Internet TV: Television distributed via the Internet, viewable on computers and mobile devices Internet-Ready TV: TVs with broadband modems allow viewers to watch TV shows as well as go online to browse, get news, stream movies, view photos, etc.
Browsers:
A browser is software that gets you to websites and their individual web pages and displays the content in such a way that the content appears mostly the same regardless of the computer, operating system, and display monitor. Examples = Internet Explorer Mozilla FireFox Apple Macintosh's Safari Google's Chrome Microsoft's Bing
Tablets:
A general-purpose computer contained in a single panel; it is a combination of smartphone and laptop computer with wireless connections, a 7- to 12-inch multitouch screen, and a virtual screen. -Platforms (OS): iPad, Android, Windows RT - E-readers are better than tablets for reading e-books in terms of price, screen quality, simplicity and portability.
portals: Web portals: Starting points for finding information
A portal is gateway website that offers a broad array of resources and services, online shopping malls, email support, community forums, stock quotes, travel info, and links to other categories Examples: Yahoo!, Google, Bing, Lycos, and AOL
URL:
A website's unique address- A character string that points to a specific piece of information anywhere on the web
Which of the following is NOT a type of long-distance wireless two-way communication device? A. Bluetooth B. CDMA C. 1Ganalog cellular phone D. 2G digital cell phone
A. Bluetooth
____ is the process of altering readable data(plain text) into an unreadable form A. Encryption B. Decryption C. Biometrics D. Rootkit
A. Encryption
A(n) _____ uniquely identifies each computer and device connected to the internet. A. IP address B. web pages C. URL D. protocol
A. IP address
___ TV uses a digital signal (series of 1s and 0s ) and is much clearer and less prone to inference than analog TV A. digital B. interactive C. standard D. All the above
A. digital
The quality of a song on a digital audio player is determined by the____ A. sampling rate B. file transfer rate C. Zoom rate D. resolution
A. sampling rate
Forging of an email sender name so that the message appears to have originated from someone or somewhere other than the actual source is called ________. A. spoofing B. phishing C. pharming D. spyware
A. spoofing Using fake email sender names so the message appears to be from a different source, so you will trust it. --If you don't know the sender, don't open it.
When you are connecting to the internet, during authentication you must provide a(n) ____ and password A. user name B. POP C ISP D. protocol
A. user name
Network components; linking devices Hosts and Nodes: Packets: Protocols:
All networks have several things in common: wired = twisted-pair, coaxial cable, fiber-optic cable wireless = infrared, microwave, radio, Wi-Fi, satellite Hosts and Nodes: Client/server network has a host computer, which controls the network; a node is any device attached to the network. Packets: fixed-length blocks of data for transmission, reassembled after transmission. Protocols: set of conventions, or rules, governing the exchange of data between hardware and/or software components in the network; built into the hardware or software you are using.
Multimedia
Allows you to get images, sound, video, and animation -May require a plug-in, player, or viewer -Examples: Flash, RealPlayer, QuickTime Multimedia Applets: Small programs that can be quickly downloaded and run by most browsers -Java is the most common Applet language Animation: The rapid sequencing of still images to create the appearance of motion Video & Audio: Downloaded completely before the file can be played, or
Web logs made by various users that are accessible to others are called A. Real-time chat B. Blogs C. Telnet D. email
B. Blogs
The devise that sends and receives computer data over regular phone lines is a A. T1 line B. Modem C. Satellite D. POTS
B. Modem For data transmission over telephone lines and cables, modems are needed to convert analog data into digital data that computers can use.
The Iphone is a cellphone with a microprocessor, display screen, memory, and built in modem so it's a ___ A. PDA B. Smart phone C. PMP D. 2G phone
B. Smart phone
The line most commonly used by corporate government, and academic sites is ___ A. DSL B. T1 C. Cable D. satellite
B. T1 - T1 line — very expensive: Generally used by large organizations
Any device that is attached to a network is referred to as a ____. A. server B. node C. host D. router
B. node
A device that joins multiple wired and/or wireless networks in a home office is a ___ A. node B. router C. bridge D. gateway
B. router
Which of the following is NOT a way to spread a virus? A. Flash drive B. scanning a picture C. email attachments D. downloading video games
B. scanning a picture
A botmaster uses Malware to hijack thousands of computers and control them remotely; the controlled computers are called_____ A. robots B. zombies C. worms D. Trojan horses
B. zombies
B2B
B2B is business-to-business e-commerce. Samsung selling TVs to target
Generally, a very high speed Internet connection is referred to as ____ A Dial up B. bandwidth C. Broadband D. Physical
C. Broadband
Which of the following is NOT a type of wireless communications media? A. Infrared transmission B. Satellite C. Coaxial D. Microwave radio
C. Coaxial
The subject words of the topic you wish to find while using a search engine is called the___ A. directory B URL C. Keyword D. search
C. Keyword
The wired or wireless method of connecting a computer to the internet is called a A. Breadband B. Wifi C. Physical connection D. Dial-up line
C. Physical connection
A network that covers a wide geographical area is called a ___ A. LAN B. MAN C. WAN D. HAN
C. WAN
The move toward a more social, collaborative interactive, and responsive web is called ___. A. Web 3.0 B. broadcasting C. Web 2.0 D. webcasting
C. Web 2.0
A location on the Internet is called a A. network B. user ID C. domain D. browser E. web
C. domain
Which of these is NOT a network topology? A. ring B. bus C. hub D. star
C. hub
To access a newsgroup, a(n) ____ program is needed A. browser B. applet C. newsreader D. Chat
C. newsreader
A camera, either film or digital, that automatically adjusts settings such as exposure and focus is a ___ camera. A. wide angle B. single lens reflex C. point and shoot D. none of those
C. point and shoot
• How does it work: The Internet is basically a huge network that connects hundreds of thousands of smaller networks. Central to this arrangement are client/server networks
Client: computer requesting data or services Server or host computer: central computer supplying data or services requested of it
Metropolitan area network (MAN
Communications network covering a city or a suburb. Many cellphone systems are MANs
Wide area network (WAN):
Communications network that covers a wide geographic area, such as a country or the world. Most long-distance and regional telephone companies are WANs. WANs are used to connect local area networks. The best example of a WAN is the Internet.
Local area network (LAN):
Connects computers and devices in a limited geographic area, such as one office, one building, or a group of buildings close together. LANs are the basis for most office networks, and the organization that runs the LAN owns it. WANs and MANs generally use a common carrier—a telecommunications company that hires itself out to the public to provide communications transmission services—for at least part of its connections. - A home area network is a LAN
A type of wire communications technology used to connect equipment in a home network is___ A Ethernet B. HomePNA C. HomePlug D. Any of the above
D. Any of the above
Which of the following is NOT a type of Malware? A. Worm B. Virus C. Trojan horse D. Denial-of-service attack
D. Denial-of-service attack
A specific web address for specific information is called an A. home page B. Webpage C. hyperlink D. URL
D. URL A website's unique address- A character string that points to a specific piece of information anywhere on the web
PMPs are mostly of two types, music and media players but much of what they can do can also be done on _____ A. Tablets B. Smartphones C. laptops D. all of those
D. all of those
If you want to email a term paper and need to keep its formatting, you would send it as an ____ A. URL B. Instant message C. text message D. attachment
D. attachment
Which of these wireless transmission types is limited to line-of-sight communications? A. broadcast radio B. broadband C. wi-fi D. microwave
D. microwave
Networks are structures in two principle ways: Client/server and ____ A. intranets B. host/slave C. Extranets D. peer- to- peer
D. peer- to- peer
Adware is also called A. cookies B. Spam C. aggregator D. pop up generator
D. pop up generator
In the email address [email protected], Kim_Lee is the A. domain B. URL C. site D. user ID E. location
D. user ID
Cyberthreats
Denial of Service Attack: Consists of making repeated requests of a computer or network device, thereby overloading it and denying access to legitimate users. Zombies & Bots: A botmaster uses malware to hijack hundreds to many thousands of computers and is able to remotely control them all, including the ability to update the malware and to introduce other programs such as spyware. Hijacked computers are called zombies. A botnet (robot network) is a network of computers in which each computer has been implanted with instructions to wait for commands from the person controlling the botnet. Ransomware: A botnet may be used to install ransomware, which holds the data on a computer or the use of the computer hostage until a payment is made. Ransomware encrypts the target's files, and the attacker tells the victim to make a payment of a specified amount to a special account to receive the decryption key. - A troll is a person who posts intentionally offensive, incendiary, or off-topic comments online, to upset people= aren't necessarily destructive, but they can be disruptive on online comment boards. - Malicious hackers break into computers for malicious purposes. -Thieves may be a company's employees or suppliers or professionals
Digital vs. analog
Digital convergence is the gradual merger of computing and communications into a new information environment, in which the same information is exchanged among many kinds of equipment, using the language of computers. Digital: Computers use digital signals—0s and 1s, off and on Analog: Humans' vision operates in analog mode. -But analog data can be converted into digital form. Even though digital data is not as exact as analog data, it is easier to manipulate.
Wireless basics; what you already know
Electromagnetic spectrum of radiation is the basis of all telecommunications signals, wired and wireless. - Radio-frequency (RF) spectrum is the part of the electromagnetic spectrum that carries most communications signals. Bandwidth: range (band) of frequencies that a transmission medium can carry in a given period of time Narrowband (voiceband): used for regular telephone communication Broadband: For high-speed data and high-quality audio and video; wide band of frequencies
Cookies:
Every time you load a particular website, the browser sends the cookie back to the server to notify the website of your previous activity. - But cookies can be used to gather information about you and your browsing habits and history; this information can be used without your consent.
Bandwidth
Expresses how much data can be sent through a communications channel in a given amount of time. However you connect to the Internet, the bandwidth will determine the speed of your connection.
Modems:
For data transmission over telephone lines and cables, modems are needed to convert analog data into digital data that computers can use. --Modem is short for modulate/demodulate. Modems modulate (convert) a computer's digital data to analog data, transmit it, then demodulate (reconvert) it back to digital data for the receiving computer.
Communicating Handshaking & Authentication: Protocols: Packets
Handshaking & Authentication: Connecting to your ISP's point of presence (POP) --Handshaking—fastest transmission speed established --Authentication—correct password & user name Protocols: The set of rules a computer follows to electronically transmit data. TCP/IP (Transmission Control Protocol/Internet Protocol) is the Internet protocol Packets: Fixed-length blocks of data for transmission, determined by TCP/IP --Data transmissions are broken up into packets and re-assembled at destination (the IP—Internet Protocol— address)
Broadband
High-speed connections.
Pharming:
Implanting malicious software on a victim's computer that redirects the user to an impostor web page even when the individual types the correct address into his or her browser. -Use websites with URLs that begin with "https://"
Web 3.0
In Web 3.0, information will be computer-generated with less human interaction required to discover and integrate that information. Two ideas might form the basis for Web 3.0 — semantic markup and a personal browser. Semantic markup: Data interchange formats that will allow machines to understand the meaning — or "semantics"— of information on the web.
Internet service providers (ISPs
Local, regional, or national organization that provides access to the Internet for a fee — Comcast, Charter, AT&T. A company that connects you through your communications line to it's server, which connects you to the internet, is a(n) ISP
Discussion groups
Mailing Lists: One-way (to make announcements) or two-way (for discussions) email subscription lists Newsgroups: Giant electronic bulletin board for written discussions about specific subjects To participate you need a newsreader program Message Boards: Special-interest discussion groups without newsreaders -A collection of messages on a particular topic is called a thread
Modems
Narrowband (Dial-Up Modem): Low speed but inexpensive - Dial-up connection — use of telephone modem to connect to Internet (used mostly in rural areas on Telephone Modems- internal/external MAX speed - 56KBS POTS, or plain old telephone system)
Network benefits and types
Network: system of interconnected computers, telephones, and/or other communications devices that can communicate with one another and share applications and data. Benefits of Networks Share peripheral devices, such as printers, scanners, disk drives Share software Share data and information Better communications Accessing databases Centralized communications Security of information, because of improved backup systems
search services & search engines:
Organizations that maintain databases accessible through websites to help you find information on the internet Examples: portals like Yahoo! and Bing, plus Google, Ask.com, Gigablast - Search services maintain search engines—programs that users can use to ask questions or use keywords to find information - Databases of search engines are compiled using software programs called spiders (crawler, bots, agents)
Personalization
People can do many things, customized just for them con: Having many personalized devices leads to multitasking, which can lead to "absent presence" and nonfocus
Connecting Point of Presence (POP): Internet Exchange Point (IXP): Internet Backbone: Internet 2:
Point of Presence (POP):A collection of modems and other equipment in a local area Internet Exchange Point (IXP): A routing computer at a point on the Internet where several connections come together Internet Backbone: High-speed, high-capacity data transmission lines, usually fiber optic Internet 2: Cooperative university/business education and research project
Portable media players (PMPs):
Portable media players include music players, media players, and some mobile phones. -are portable devices that play digital audio, video, and/or image files.
Portability:
Pros: Devices that enable phone, texting, and email access from anywhere, portable digital music, GPS, and convenient cheap digital photos that allow people to remain connected even while on the move Cons: Bombardment by texts and phone calls; intrusiveness; time wasters. Lack of face-to-face contact can lead to misinterpretations
Automatic delivery of information
Push technology: Software that automatically downloads information to personal computers. Webcasting: Sending users customized text, video, audio on regular basis. RSS newsreaders (RSS aggregators): Programs that scour the web, sometimes hourly, sometimes more frequently, and pull together in one place "feeds" from several websites. RSS is based on XML, or extensible markup language, a web-document tagging and formatting language that is an advance over HTML and that two computers can use to exchange information. Blogs (weblogs) are frequently updated sites on the web intended for public consumption that contain a writer's observations, opinions, images, and links to other websites. Podcasting: Internet radio or similar Internet audio program delivered via RSS feed to a subscriber to be played back on computer or digital audio device.
Phishing:
Sending forged email directing recipient to fake website. Purpose: to entice people to share personal or financial data. Fake website looks like real website, such as a bank's.
Baseband:
Slow type of connection that allow only one signal to be transmitted at a time.
Snooping & spam
Snooping: Email is not private Spam: Electronic Junk Mail
File transfer protocol (FTP):
Software standard for transferring large files between computers, including those with different operating systems - You can download using your web browser or FTP client programs, such as Fetch, Cute, FileZilla, and SmartFTP
Topology: star, ring, bus, tree, mesh
Star - all nodes are connected through a central network switch Ring - all nodes are connected in a continuous loop Bus - all nodes are connected to a single wire or cable Tree - a bus network of star networks Mesh - messages sent to the destination can take any possible shortest, easiest route to reach its destination. There must be at least two paths to any individual computer to create a mesh network. (Wireless networks are often implemented as a mesh, and the Internet is a mesh.)
Digital cameras
Take video and photographs and digitally converts the analog data by recording images via an electronic image sensor (they do not require film). -Point-and-shoot digital camera: Automatically adjusts settings such as exposure and focus - Single-lens reflex (SLR) digital camera: Uses a reflecting mirror to reflect the incoming light so the viewfinder shows what the lens is framing
Digital convergence:
The combining of several industries - computers, communications, consumer electronics, entertainment, and mass media - through various devices that exchange data in digital form -Pros: Increased convenience of devices; more affordable; more functions -Cons: Multiple features that compromise the primary feature, no single feature works optimally & Security risks are increasing
Media (medium) = twisted pair wire, coaxial cable, fiber optic cable
The means of interchanging or transmitting and receiving information Twisted-Pair Wire (dial-up connections): 2 strands of insulated copper wire twisted around each other(slow) Coaxial Cable: Insulated copper wire wrapped in a metal shield and then in an external plastic cover Fiber-optic cable: Dozens or hundreds of thin strands of glass or plastic that transmit pulses of light, not electricity (very fast)
The Web - brought multimedia to the Internet:
The web and the Internet are not the same; the web is multimedia-based, and the Internet is not. The Internet is the infrastructure that supports the web.
Societal effects of digital TV
Time shifting: Changing when you watch TV Space shifting: Changing where you watch TV Content shifting: Changing the nature of TV programs Video on demand (VOD or VoD) consists of a wide set of technologies that enable viewers to select videos or TV programs from a central server to watch when they want, rather than when TV programmers offer them
Email:
Two ways to send & receive email: 1. Email Program: Enables you to send email by running email software on your computer that interacts with an email server at your Internet access provider -Examples: Microsoft Outlook, Apple Mail 2. Web-Based Email: You send and receive messages by interacting via a browser with a website Advantage: You can easily send and receive messages while traveling, using any computer or equipped mobile device Disadvantages are ads and email hacking -Examples: Yahoo! Mail and Gmail (Google)
what you can do about it? Malware
Use antivirus software, and keep it current Install a firewall to monitor network traffic and filter out undesirable types of traffic and undesirable sites • Don't use the same password for multiple sites Don't give out any password information Use robust passwords: Install antispyware software Use encryption, the process of altering readable data into unreadable form to prevent unauthorized access
Telephony:
Uses the Internet to make phone calls via VoIP(Voice over Internet Protocol)
Spoofing
Using fake email sender names so the message appears to be from a different source, so you will trust it. --If you don't know the sender, don't open it.
Malware---How they spread; Time bomb: Logic bomb Email bomb
Via e-mail attachments By sharing infected disks and flash drives By clicking on infiltrated websites By downloading infected files from websites Through infiltrated Wi-Fi hotspots From one infected PC on a LAN to another Time Bomb: malware programmed to "go off" at a particular time or date. Logic bomb: is "detonated" when a specific event occurs; for example, all personnel records are erased when an electronic notation is made that a particular person was fired. Email bombs: overwhelm a person's email account by surreptitiously subscribing it to dozens or even hundreds of mailing lists
Malware
Viruses: Deviant program that hides in a file or a program on a disk, flash memory drive, in an e-mail, or in a web link and that causes unexpected effects such as destroying or corrupting data. Usually attached to an executable file that you must run or open (to activate the virus). Worms: A program that copies itself repeatedly into a computer's memory or disk drive. Trojan Horses: Programs that pretend to be a useful program such as a free game or a screensaver but that carry viruses or malicious instructions that damage your computer or install a backdoor or spyware. --Backdoors and spyware allow others to access your computer without your knowledge. Rootkits: In many computer operating systems, the "root" is an account for system administration. A "kit" is the malware secretly introduced into the computer. A rootkit gives an attacker "super powers" over computers; for example, the ability to steal sensitive personal information. Blended Threats: A more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses, and other malware into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and also spread an attack. Blended threats are designed to use multiple modes of transport such as email, flash drives, networks, and so on.
Web 2.0
Web 2.0 : refers to the web viewed as a medium in which interactive experience, in the form of blogs, wikis, forums, social networking, and so on, plays a more important role than simply accessing information. The move toward a more social, collaborative, interactive, and responsive web; has led to the "social web," giving rise to: -Social networking sites - Media-sharing sites: - Social-network aggregators: Collect content from all of a user's various social network profiles into one place, then allow him or her to track friends and share other social network activities (e.g., Mugshot, Readr).
Kbps means how many bits per second? a. 1 billion b. 1 thousand c. 1 million d. 1 hundred e. 1 trillion
b. 1 thousand
E-commerce: (electronic commerce):
conducting business activities online E-commerce has led to showrooming, the phenomenon in which shoppers browse for products in stores, only to buy them from an online rival, frequently at a lower price.
Three major trends in information technology continue to be
convergence, portability, and personalization.
Spyware :
is software surreptitiously installed on your computer via the web. -Spyware hides on your PC/device and captures information about what is on the it, such as keystrokes and passwords
Network architecture Client/server:: Peer-to-peer (P2P):
o Client/server: Consists of clients, which are computers that request data, and servers, which are computers that supply data. A computer with a domain name is called a(n) server . o Peer-to-peer (P2P): All computers on the network are "equal" and communicate directly with one another, without relying on servers.
Wireless communications
o Long-distance: one-way: -GPS (Global Positioning System) - One-way Pagers: radio receivers that receive data sent from a special radio transmitter o Long-distance: two-way - 1G: First-Generation Cellular Service - 2G: Second-Generation Cellular Service - 3G: Third-Generation Cellular Service: Broadband technology - 4G: Fourth-Generation Cellular Service - LTE (Long Term Evolution): an international standard widely adopted in the United States and several countries in Europe and Asia. o Short-range: two-way - Local Area Networks: include wifi - Personal Area Networks: Bluetooth, ultra wideband, and wireless USB - Home Automation networks o Short-range for your home -Bluetooth: Short-range wireless standard to link cellphones, computers, and peripherals at distances usually up to 33 ft. -Ultra Wideband (UWB) - Wireless USB: USB is the most used interface on PCs -- Insteon: Combines electronic power line and wireless technology -- ZigBee: Entirely wireless sensor technology -- Z-Wave: Entirely wireless power-efficient technology
http html:
o http: Protocol Used to Access World Wide Web o html: Set of instructions used to specify document structure, formatting, and links to other documents on the web Hypertext links connect one web document to another - The "markup" language used in writing and publishing web pages
Consumer-to-consumer commerce
or C2C, is the electronic sale or exchange of goods and services between individuals (e.g., auctions).
satellites: Wireless:
satellites: Transmits data between satellite dish and satellite orbiting earth. - requires internet acccess provider with 2 way transmission wireless: Transmits data wirelessly up to 54 Mbps for 300 - 500 feet from access point (hotspot)
Malware :
that can harm a computer system, a common danger being viruses. - A virus is a rogue program that migrates through the Internet or via operating systems and attaches itself to different programs that spread from one computer to another, leaving infections. --- The principal defense is to install antivirus software, which scans a computer to detect viruses and, sometimes, to destroy them.