Exam 1: Cyberspace, the Internet, and the World Wide Web

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is comparable to the address you would put on a letter to tell the postal service to deliver a letter to?

(Multiple Choice)
4.9/5
(34)

Internet users generally struggle with identifying when their computer has been attacked. In order to quickly respond to a cyberattack on their system, a user would have to be able to overcome which of the following Internet threats?

(Multiple Choice)
4.8/5
(39)

Development of the ______ resolved issues with hierarchical host names making it easier for the average person to access the Internet.

(Multiple Choice)
4.8/5
(34)

The inventors of the Internet likely didn't consider ______ during its development.

(Multiple Choice)
5.0/5
(35)

Criminals as well as average Internet users are good at hiding their identifying information online.

(True/False)
4.8/5
(36)

According to the text, the Internet was built to be a free and open access tool. Which of the following best represents this concept?

(Multiple Choice)
4.9/5
(31)

Which of the following represents a complete URL?

(Multiple Choice)
4.7/5
(36)

Identify and describe the four layers of cyberspace. How do each of these contribute to the way people communicate with each other?

(Essay)
4.8/5
(41)

The opportunity to create new businesses and markets online best describes which aspect of Internet development?

(Multiple Choice)
4.8/5
(43)

It is possible to determine what a specific code will do from the code of 1s and 0s.

(True/False)
4.8/5
(39)

Which of the following defines the acronym URL?

(Multiple Choice)
4.8/5
(34)

Countries concerned with controlling the flow of information and goods online would be most concerned with which of the following aspects of the Internet?

(Multiple Choice)
4.9/5
(38)

The Internet is built out of components that provide servicers for users, such as social media, content, shopping, etc.

(True/False)
4.9/5
(37)

Which of the following is NOT a characteristic of a URL?

(Multiple Choice)
4.9/5
(39)

Which of the Internet gateways to vulnerability can be described as the computer code of the Internet?

(Multiple Choice)
4.9/5
(37)

Identify and describe the five gateways to vulnerabilities for anyone who uses the Internet. Which of these do you think poses the greatest risk to Internet security? Justify your response by providing specific examples and comparing the threat to at least one other vulnerability.

(Essay)
4.9/5
(35)

______ is a reference or navigation element in a hypertext document that offers direct access to another section of the same document or to another hypertext document that is on or part of a (different) domain.

(Multiple Choice)
4.9/5
(41)

Hyperlinks have two main components: the protocol identifier and the resource name.

(True/False)
4.9/5
(36)

The Internet was originally built to be a free and open source, with minimal oversight.

(True/False)
4.9/5
(36)

A hypertext is a hyperlink embedded in words.

(True/False)
4.8/5
(28)
Showing 21 - 40 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)