widely agreed upon set of rules that standardize communication between machines
What is Protocol?
Sharing a friend's song with permission is considered to be s _ _ _
safe
Illegal copying and selling of DVDs and CDs is called...
Piracy
A Creative Commons license lets people use an entire piece of work for educational purposes. True or False?
What is True
What is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet?
Caesar Cipher
The Internet is non-existent in the developing world
What is False?
Multiple paths exist between any two points
What is redundancy?
In a database, columns and rows correspond to
What is attributes and records?
Confidentiality, Availability, and Integrity are?
What is the CIA Triad?
What you need to look for is you are to use a credit card online...
Encryption or being certified secure.
Makes sure that each request is forwarded to its intended recipent
What is a router?
Protocol that defines the structure of the internet address and assigns a unique address to every device on the internet
What is IP or Internet Protocol?
Answer the following modulo math problem.
35 mod 6
What is 5?
Protocol allows for sending multiple packets between two computers by checking all packets arrived and they can be put back together in a proper order
What is TCP?
A company's server is flooded with data until it can no longer cope with volume, rendering the server unreachable.
What is DDoS?
network connecting individual networks
What is the Internet?
A responsible way to use other people's work is to:
What is give credit to the creator.
Ability to provide data transmission even when some connections between routers have failed
What is fault-tolerant routing?
_________ is someone who sees cyberbullying happening, but does nothing to help.
Brute force and letter frequency analysis
Time it takes for a bit to travel from a sender to a receiver
What is latency?
Felecia discovers that she can log into her teacher’s online gradebook and changes her grades.
Which part of the CIA triad was broken?
Saar sets a password to gain access to his phone. His little brother figures it out and gets into his apps.
Which part of the CIA triad was broken?
What is confidentiality?
small part of digital message, and metadata about the message, including where it came from and where it is going
What is a packet?
Penetration testing for a company
What is legal hacking?