Midterms
Rank the Big 5 Tech Companies by Net Income from 2018 from highest to lowest.
1.Apple, 2. Alphabet (Google), 3. Facebook, 4. Microsoft, 5. Amazon
Sort the following events from first to last chronologically (earliest dates at top of sorted list), later dates lower in list below . The first one has been done for you. In January, 1983 the ARPANET standardizes on TCP/IP protocols adopted by the US Department of Defense (DOD) in 1982.
1.WorldWideWeb created at CERN for by Tim-Berners Lee with Robert Cailliau 2.Line Mode Browser released to allow more people access to WWW 3.NCSA Mosaic for Unix's X Window System created by Marc Andreessen led team at University of illinois at Urbana-Champaign 4.Microsoft and Macintosh versions of Mosaic released by at University of illinois at Urbana-Champaign 5.Jim Clark forms Mosaic Communications Corporation with Marc Andreesen
In 2018, Apple derived what percentage of its revenue from iPhone Sales?
62.8%
Which of the following is the correct Document Type Definition for HTML 5?
<!DOCTYPE html>
Which hyperlink below displays the linked text "Meditation" that opens an HTML file meditation.html which is located in the same folder as the HTML file the links are contained in?
<a href="http://www.meditation.com">home/meditation.htm<a/>
Which of the following correctly defines a web page's title?
<title=John's Guitar: Homepage</title>
Which HTML statements below best represents the list items Toledo and Riverside as being bulleted items? The ellipses "..." represent other list items: Dallas or Anaheim and Wichita. (not in order)
<ul>...<li>Toledo</li><li>Riverside</li>...</ul>
HTML
A language to describe content and structure of a document that uses tags
Which if the following is not specifically provided for using a VPN client.
Ability to change one's password.
In 2018, which of the Big 5 Tech Companies drew the largest percentage of their revenue, by geography, from the U.S.?
Amazon
In 1993, Jeff Bezos argued what about replacing traditional services with a Web based service?
As the Web was still in its infancy, a traditional service is probably more desirable than its Web-based substitute business.
CERN
Birthplace of World Wide Web
NCSA
Birthplace of the Mosaic Browser
Why do most people willingly share information about themselves online (as presented in lecture?
Create an online persona, nothing to hide
Which of the following is not a true statement?
Data extortion does not pressure organizations, like hospitals, for payment, whereas ransomware attacks typically do.
According to Lanier, random or unpredictable feedback is never more engaging than perfect feedback in which rewards are given for desired behavior and penalties are given for undesirable behavior.
FALSE
Companies that were early to market like Microsoft with Windows and Office reached a billion users for their products faster than more recent companies like Facebook with Facebook and WhatsApp.
FALSE
Facebook testified to Congress in 2018 that unregistered users of FB have complete control over their facial recognition data.
FALSE
For an embedded/internal CSS style rule, <style> is used as an attribute of an HTML element.
FALSE
The European General Data Protection Regulation only affects European citizens in their interactions with online companies.
FALSE
A VPN client will prevent a website host from uniquely identifying a user's device when they visit that website.
False
For the study on Canadian undergrads, students who identified as female were more likely than their male counterparts to reveal their home address.
False
For the study on Canadian undergrads, students who identified as female were more likely than their male counterparts to reveal their political views.
False
Ivan Pavlov set up a methodical system, in which caged animals got treats in a purely isolated mechanical action.
False
Using a VPN allows for anonymous browsing.
False
Which of the following statements about CSS precedence is false? ("higher" means rule applies)
Inline style rules have lower precedence than internal CSS.
Which individual first described a globally interconnected set of computers that would provide ready access to data and programs from anywhere?
J.C.R. Licklider
URL
Location of web resource or document
Which two companies would be considered the most influential, historically, in the area of personal computing?
Microsoft, Apple
Which of the following is not an example of the "network effect" as described by Jaron Lanier with regards to social media.
Mike owns a pizza restaurant in San Diego. He has accounts on several social media services that advertise his weekly specials.
Which of the following was not a charge made against Google in their EU case in 2018 and Microsoft in their 1998-2002 legal case with regards to Anti-Trust?
Misused user data and violation of user privacy rights.
Jaron Lanier argues in Ten Arguments... that the core process that allows social media companies to make money is **behavior ** ------ . Answer one word in all lowercase letters and no spaces.
Modification
Which modern web browser is the descendant of Mosaic web browser and later Netscape Navigator?
Mozilla Firefox
The European General Data Protection Regulation designates users' personal data by default to be handled under which of the four categories below that were presented in class?
No Uses
Which category of personal information use calls for - information to be deleted when the store is finished with it, because there is no further need for it.
No Uses
Which category of personal information use calls for - store can use it for other purposes, but only if you approve the use
Opt In
W3C
Oversees development standards and guidelines for WWW
For the study on Canadian undergrads, what type of info were students least likely to disclose?
Political Views
HTTP
Protocol for transmission of web pages
What was the year to year change in growth rate for Amazon Online Store from Q1 (Jan., Feb. and Mar.) for 2019 and 2020?
Q1 2020 growth half as much as Q1 2019
In the attack on Vastaamo Health in Finland, what didn't the attack involve?
Ransom demanded to decrypt user data
Which is not a suggested precaution a user should take take to protect themselves from a malware attack? Choose the best answer.
Sync all their devices (phone, laptop, desktop)
The European General Data Protection Regulation restricts companies from making consent a condition for service.
TRUE
What is the market cap for a company?
The current stock price for a company's stock times the number of outstanding shares (available for purchase).
Which groups of statements below are all TRUE, with regards to the body, head, title, meta elements.
The head element contains the title and meta elements. The body contains the html element. The html and body elements occur in sequence. First comes the html element followed by the body.element.
Which of the following was given as the reason why privacy is important?
The right of people to choose freely and under what circumstances and to what extent they will reveal themselves, their attitude, and their behavior to others.
Which of the following was the definition for privacy given in class?
The right of people to choose freely and under what circumstances and to what extent they will reveal themselves, their attitude, and their behavior to others.
What actual product did Amazon inventory at their own warehouses at the time of Jeff Bezos interview in the video??
The top selling books and CDs.
For a browser to display *Hello World!** with the opening and closing heading level 1 tags, the developer should? <h1>Hello World!<h1/>
Use entity encodings for "less than" and "greater than" symbols. Since they are special characters that are reserved as part of HTML.
Which individual below was part of the group of researchers in Leonard Kleinrock's lab at UCLA that on October 29, 1969 made the first transmission on ARPANET between UCLA and SRI (Stanford Research Institute)?
Vint Cerf
The first GUI (Graphical User Interface) browser for the web was___
WorldWideWeb
Choose the term below that is not suitable to substitute into blank space for the hyperlink. <a href="-----">linked content<a/>
_blank
Which value for target attribute in a hyperlink opens the linked document in a new window or tab.
_blank
Choose the correct CSS style from below for the image. \border radius/
border-radius: 50px 100px 100px 50px;
What does the CSS property color represent?
foreground color
Which of the following is not a valid value for the blank space between the opening and closing quotations below? <img src="------"
images/weather/clouds.html
For a website, what file name is used (typically) for the homepage, default page, or landing place for a website?
index.html
What is a markup language?
language that describes the content and structure of a document by tagging different elements.
What statement is false with regards to privacy?
privacy is an inalienable right provided by US Constitution
What is a CSS declaration composed of?
property name, property value
What were the two main reasons Facebook provides as motivation for users to enable facial recognition functionality for their service (from NY Times article, used in menu items on FB)?
protect impersonation of you, screen reader to state when you are in photo
Which of the following malware is known to lock a device so the user cannot operate it, then encrypts the data? Typically the attack is on vital infrastructure to coerce victims to pay to return device control and data back in unencrypted format.
ransomware
URL stands for **resource locator**. Fill in the blank. Use all lower-case letters and no spaces.
uniform
Which of the following malware doe not attach itself to legitimate code or a document from the host, but can spread through replication?
worm