Deck 1: Cyberspace, the Internet, and the World Wide Web

Full screen (f)
exit full mode
Question
______ is a global system of interconnected computer networks that are set up to exchange various types of data.

A) Cyberspace
B) The Internet
C) The World Wide Web
D) A computer network
Use Space or
up arrow
down arrow
to flip the card.
Question
______ is a service that can be accessed via the Internet.

A) Cyberspace
B) Internet
C) World Wide Web
D) Computer network
Question
The inventors of the Internet likely didn't consider ______ during its development.

A) free exchange of data
B) criminal abuse of the Internet
C) use as a research tool
D) open access to information
Question
Criminal knowledge that their efforts will likely lead to success because there are so many potential victims and so few barriers or oversight online best describes which Internet gateway to vulnerability?

A) time and space
B) anonymity/identity
C) lack of barriers to entry
D) asymmetries of cyberspace
Question
Which of the Internet gateways to vulnerability can be described as the computer code of the Internet?

A) 0s and 3s
B) 0s and 2s
C) 1s and 2s
D) 1s and 0s
Question
According to the text, the Internet was built to be a free and open access tool. Which of the following best represents this concept?

A) Napster
B) eBay
C) Amazon
D) Google
Question
______ is a weakness in a product that could allow an attacker to compromise the integrity, availability, or confidentiality of that product.

A) Security vulnerability
B) Cyber security
C) Computer virus
D) Cyber attack
Question
All of the following are layers of cyberspace except ______.

A) physical layer
B) social layer
C) information layer
D) logic layer
Question
Whereas in the past criminals had to physically approach their victims to carry out a crime, the Internet allows offenders to be in other states, or even continents, and still carry out the same crime. This best represents which of the following vulnerabilities of the Internet?

A) anonymity/identity
B) time and space
C) asymmetries of cyberspace
D) lack of barriers to entry
Question
______ is an interdependent network of information technology infrastructures including the Internet, telecommunications networks, and computer systems.

A) Cyberspace
B) Internet
C) World Wide Web
D) Computer network
Question
The Internet provides opportunities for criminals to cause significant damage with minimum resources. For example, in 2017, the WannaCry ransomware attack resulted in several billion dollars of damage. This best represents which vulnerability of the Internet?

A) time and space
B) anonymity/identity
C) asymmetries of cyberspace
D) 1s and 0s
Question
Countries concerned with controlling the flow of information and goods online would be most concerned with which of the following aspects of the Internet?

A) anonymity/identity
B) time and space
C) asymmetries of cyberspace
D) lack of barriers to entry
Question
The ______ layer of cyberspace is best described as where the platform nature of the Internet is defined and created.

A) physical
B) social
C) information
D) logic
Question
Which of the following best represents the contribution of IPS to the modern Internet?

A) smaller computers with greater capabilities
B) connected computers across university campuses
C) the first e-mail utility program
D) enabling data to be stored and moved as packets
Question
Development of the ______ resolved issues with hierarchical host names making it easier for the average person to access the Internet.

A) MILNET
B) DNS
C) IPS
D) ARPANET
Question
______ is a reference or navigation element in a hypertext document that offers direct access to another section of the same document or to another hypertext document that is on or part of a (different) domain.

A) Hyperlink
B) Hypertext
C) URL
D) Web browser
Question
Internet users generally struggle with identifying when their computer has been attacked. In order to quickly respond to a cyberattack on their system, a user would have to be able to overcome which of the following Internet threats?

A) time and space
B) anonymity/identity
C) lack of barriers to entry
D) 1s and 0s
Question
The ______ of the Internet might be a concern for parents regarding who their children may be talking to online.

A) anonymity/identity
B) time and space
C) asymmetries of cyberspace
D) lack of barriers to entry
Question
The opportunity to create new businesses and markets online best describes which aspect of Internet development?

A) operations and management
B) social
C) commercialization
D) e-mail
Question
Which layer of cyberspace includes the creation and distribution of information and interaction between users?

A) physical layer
B) social layer
C) information layer
D) logic layer
Question
It is possible to determine what a specific code will do from the code of 1s and 0s.
Question
The Internet refers to the virtual environment in which people communicate and interact with others.
Question
The Internet refers to hardware and software infrastructure that connects computers around the globe, whereas the World Wide Web refers to a service that can be accessed via the Internet.
Question
Identify and describe the five gateways to vulnerabilities for anyone who uses the Internet. Which of these do you think poses the greatest risk to Internet security? Justify your response by providing specific examples and comparing the threat to at least one other vulnerability.
Question
Which of the following is comparable to the address you would put on a letter to tell the postal service to deliver a letter to?

A) hyperlink
B) email address
C) URL
D) Internet
Question
A hypertext is a hyperlink embedded in words.
Question
Identify and describe the three aspects around the development of the Internet. Discuss the significance of each aspect including how each shaped the way we use the Internet today.
Question
Discuss the evolution of the Internet and cyberspace. Identify major developments and describe how each contributed to the Internet we have today.
Question
Which of the following represents a complete URL?

A) https://www.fbi.gov
B) fbi.gov
C) https:www.fbi.gov
D) www.fbi.gov
Question
Which of the following can be described as unidirectional, or that a user can link from their content to another website's content without asking for approval from the owner of the destination page?

A) hyperlink
B) email address
C) URL
D) Internet
Question
The physical layer of the cyberspace consists of physical devices such as PCs, networks, wires, grids, and routers.
Question
Criminals as well as average Internet users are good at hiding their identifying information online.
Question
Identify and describe the four layers of cyberspace. How do each of these contribute to the way people communicate with each other?
Question
Which of the following is NOT a characteristic of a URL?

A) two main components
B) resource name
C) protocol identifier
D) hypertext
Question
The Internet is built out of components that provide servicers for users, such as social media, content, shopping, etc.
Question
The information layer of cyberspace is where the platform nature of the Internet is defined and created.
Question
Define and differentiate cyberspace, the Internet, and the World Wide Web. In your discussion, explain the relationship and/or interdependency of each on the others.
Question
The Internet was originally built to be a free and open source, with minimal oversight.
Question
Which of the following defines the acronym URL?

A) Uniform Resource Link
B) Uniform Resource Locator
C) Uniform Record Locator
D) Uniform Record Link
Question
Hyperlinks have two main components: the protocol identifier and the resource name.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Cyberspace, the Internet, and the World Wide Web
1
______ is a global system of interconnected computer networks that are set up to exchange various types of data.

A) Cyberspace
B) The Internet
C) The World Wide Web
D) A computer network
B
2
______ is a service that can be accessed via the Internet.

A) Cyberspace
B) Internet
C) World Wide Web
D) Computer network
C
3
The inventors of the Internet likely didn't consider ______ during its development.

A) free exchange of data
B) criminal abuse of the Internet
C) use as a research tool
D) open access to information
B
4
Criminal knowledge that their efforts will likely lead to success because there are so many potential victims and so few barriers or oversight online best describes which Internet gateway to vulnerability?

A) time and space
B) anonymity/identity
C) lack of barriers to entry
D) asymmetries of cyberspace
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the Internet gateways to vulnerability can be described as the computer code of the Internet?

A) 0s and 3s
B) 0s and 2s
C) 1s and 2s
D) 1s and 0s
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
According to the text, the Internet was built to be a free and open access tool. Which of the following best represents this concept?

A) Napster
B) eBay
C) Amazon
D) Google
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
______ is a weakness in a product that could allow an attacker to compromise the integrity, availability, or confidentiality of that product.

A) Security vulnerability
B) Cyber security
C) Computer virus
D) Cyber attack
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
All of the following are layers of cyberspace except ______.

A) physical layer
B) social layer
C) information layer
D) logic layer
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
Whereas in the past criminals had to physically approach their victims to carry out a crime, the Internet allows offenders to be in other states, or even continents, and still carry out the same crime. This best represents which of the following vulnerabilities of the Internet?

A) anonymity/identity
B) time and space
C) asymmetries of cyberspace
D) lack of barriers to entry
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
______ is an interdependent network of information technology infrastructures including the Internet, telecommunications networks, and computer systems.

A) Cyberspace
B) Internet
C) World Wide Web
D) Computer network
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
The Internet provides opportunities for criminals to cause significant damage with minimum resources. For example, in 2017, the WannaCry ransomware attack resulted in several billion dollars of damage. This best represents which vulnerability of the Internet?

A) time and space
B) anonymity/identity
C) asymmetries of cyberspace
D) 1s and 0s
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
Countries concerned with controlling the flow of information and goods online would be most concerned with which of the following aspects of the Internet?

A) anonymity/identity
B) time and space
C) asymmetries of cyberspace
D) lack of barriers to entry
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
The ______ layer of cyberspace is best described as where the platform nature of the Internet is defined and created.

A) physical
B) social
C) information
D) logic
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following best represents the contribution of IPS to the modern Internet?

A) smaller computers with greater capabilities
B) connected computers across university campuses
C) the first e-mail utility program
D) enabling data to be stored and moved as packets
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
Development of the ______ resolved issues with hierarchical host names making it easier for the average person to access the Internet.

A) MILNET
B) DNS
C) IPS
D) ARPANET
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
______ is a reference or navigation element in a hypertext document that offers direct access to another section of the same document or to another hypertext document that is on or part of a (different) domain.

A) Hyperlink
B) Hypertext
C) URL
D) Web browser
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
Internet users generally struggle with identifying when their computer has been attacked. In order to quickly respond to a cyberattack on their system, a user would have to be able to overcome which of the following Internet threats?

A) time and space
B) anonymity/identity
C) lack of barriers to entry
D) 1s and 0s
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
The ______ of the Internet might be a concern for parents regarding who their children may be talking to online.

A) anonymity/identity
B) time and space
C) asymmetries of cyberspace
D) lack of barriers to entry
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
The opportunity to create new businesses and markets online best describes which aspect of Internet development?

A) operations and management
B) social
C) commercialization
D) e-mail
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
Which layer of cyberspace includes the creation and distribution of information and interaction between users?

A) physical layer
B) social layer
C) information layer
D) logic layer
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
It is possible to determine what a specific code will do from the code of 1s and 0s.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
The Internet refers to the virtual environment in which people communicate and interact with others.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
The Internet refers to hardware and software infrastructure that connects computers around the globe, whereas the World Wide Web refers to a service that can be accessed via the Internet.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
Identify and describe the five gateways to vulnerabilities for anyone who uses the Internet. Which of these do you think poses the greatest risk to Internet security? Justify your response by providing specific examples and comparing the threat to at least one other vulnerability.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is comparable to the address you would put on a letter to tell the postal service to deliver a letter to?

A) hyperlink
B) email address
C) URL
D) Internet
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
A hypertext is a hyperlink embedded in words.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
Identify and describe the three aspects around the development of the Internet. Discuss the significance of each aspect including how each shaped the way we use the Internet today.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
Discuss the evolution of the Internet and cyberspace. Identify major developments and describe how each contributed to the Internet we have today.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following represents a complete URL?

A) https://www.fbi.gov
B) fbi.gov
C) https:www.fbi.gov
D) www.fbi.gov
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following can be described as unidirectional, or that a user can link from their content to another website's content without asking for approval from the owner of the destination page?

A) hyperlink
B) email address
C) URL
D) Internet
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
The physical layer of the cyberspace consists of physical devices such as PCs, networks, wires, grids, and routers.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
Criminals as well as average Internet users are good at hiding their identifying information online.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
Identify and describe the four layers of cyberspace. How do each of these contribute to the way people communicate with each other?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is NOT a characteristic of a URL?

A) two main components
B) resource name
C) protocol identifier
D) hypertext
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
The Internet is built out of components that provide servicers for users, such as social media, content, shopping, etc.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
The information layer of cyberspace is where the platform nature of the Internet is defined and created.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
Define and differentiate cyberspace, the Internet, and the World Wide Web. In your discussion, explain the relationship and/or interdependency of each on the others.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
The Internet was originally built to be a free and open source, with minimal oversight.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following defines the acronym URL?

A) Uniform Resource Link
B) Uniform Resource Locator
C) Uniform Record Locator
D) Uniform Record Link
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
Hyperlinks have two main components: the protocol identifier and the resource name.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.