What are IP addresses?
IP addresses are unique codes that identify computers connected to the Internet.
A Computer Virus is…
A piece of malicious computer code.
Spyware is…
A computer virus with the purpose of tracking the target’s activity and information on the computer.
Ransomware is…
A computer virus which disables a computer or system until the victim pays a ransom.
15 mod 4
3
Give an Example of an IP address.
172.11.100
What is a router? What does it do?
A router is a specialized computer on a network that directs packets by finding IP addresses and determining the fastest routes between computers.
What is a firewall? How do they work?
A firewall is a set of rules for what kind of information can enter a computer and from what sources.
What is the command prompt, where do you find it, and what does it do?
In Windows operating systems, the Command Prompt is a program that emulates the input field in a text-based user interface screen with the Windows graphical user interface (GUI). It can be used to execute entered commands and perform advanced administrative functions
A Hacker is…
A person who designs malicious code.
Who assigns IP addresses?
Internet service providers assign IP addresses.
Compare an IP address and an IP packet.
An IP address tells IP packets where to go, and IP packets contain the information.
Differentiate between these 3 kinds of connection (Wi-Fi, DSL/Cable, or Fiber Optic) and tell which is best and why?
Wi-Fi is a wireless connection that sends information through radio waves. DSL send electrical signals over copper wires. Fiber optic cables send pulses of light to transmit information. DSL and fiber optic require wired connections to take full advantage of them. Wi-Fi is a wireless connection which is convenient but can create a bottleneck for the DSL or fiber optic Internet connection.
What is encryption? Who uses it and where is it used on the Internet?
Encryption is the transformation of meaningful data to a cipher. All computers on the Internet encrypt and decrypt information to keep all communication secure between end-points on networks.
What are the licenses used to provide access to materials on the web? How do they differ?
Licenses are issued to web hosts. The DNS involves a check for the validity of the license to avoid phishing attacks.
Why we don’t have to memorize IP addresses?
Too Difficult for the human brain. We remember the URL's.
How are IP addresses organized?
A discussion of standards and naming organization hierarchies. IPv4 and IPV6
What is cache poisoning, and what is its effect?
Cache poisoning involves switching the IP address-domain translation cache so that users are directed to spoof sites.
What is a protocol? Why are protocols important?
A protocol is a rule that machines computers follow to ensure reliability and efficiency.
Define and explain Net neutrality.
Net neutrality is the concept that Internet service providers should only facilitate people’s connection to the Internet and not control what content they access or vary the quality of their access based on the content they access.
What is used in place of the IP address? Give an Example.
Domain Names and Example: www. google.com
What is the purpose of the Domain Name System? How does it work?
DNS is a set of protocols that translates domain names into IP addresses so users can communicate with each other over the network.
Define bandwidth and latency. What does it mean when we say packets are limited by bandwidth and latency?
Bandwidth is the number of packets that can be sent in a chain at once, and latency quantifies the delay between the sending and receiving of the packets.
What is TCP/IP? What does it do or impact?
TCP/IP is the set of protocols that dictates how packets are sent and routed across the Internet.
Define and explain Internet censorship.
Internet censorship is carried out by Internet service providers or governments. They can restrict user’s access to certain websites, or even remove content they find problematic from the Internet altogether.