These are the three physical ways that computer send information in the form of binary data.
What are Electricity, Light, and Radio Waves?
Which of the following is the most dangerous if it was leaked the public?
A. A computer's IP address
B. A user's public key used for encryption
C. The IP address of the Root of the DNS
D. A user's browser cookies
D. A user's browser cookies.
These contain all of your auto-filled entries, including passwords and credit card numbers.
The idea that information should be available online for free; products that are this are available for anyone to use or view the code for free.
What is open source?
This is the number of bones in the human body. (If nobody is exact, closest answer wins)
What is 206?
This is the type of computer that receives and processes requests, then sends the requestor the information needed.
What is a server?
This is the name of the organization who designs protocol and and format changes for the internet.
What is the IETF? (The internet engineering task force)
A cyber attack where a server is flooded with traffic to prevent users for accessing the server for its intended purpose.
What is a DDoS attack? (Distributed Denial of Service)
Which of the following is a benefit of using a brick and mortar store over online shopping?
A. Users can see product reviews as they shop.
B. Users can compare an item to other similar items before they buy.
C. There is no wait time between purchasing an item and using it.
D. Users can check the price change to see if it is a fair price.
C. There is no wait time between purchasing an item and using it
What is "metadata"?
Metadata is information about a packet that is stored as part of the packet itself. It includes the IP address of where it came from, the IP address of where it is doing, the packet size, and the packet order.
This is the ability of a system to continue operating without interruption in the event of the failure of one or more of its components.
What is "fault tolerant"?
BONUS: What makes the Internet fault tolerant?
What does URL stand for?
Uniform Resource Locator.
Choose all that apply. Which of these is an unsafe online activity:
A. Directly typing an IP address to reach www.codehs.com
B. Buying a used video game by emailing your credit card number to the previous owner
C. Clicking a link in an email to reset your password
D. Following an email instructions to call the phone number on the back of your debit card
B. Buying a used video game by emailing your credit card number to the previous owner [Never share your credit card information with an individual]
C. Clicking a link in an email to reset your password [these links can easily lead to a similar looking site that will steal your info]
The gulf between those who have ready access to computers and the internet, and those who do not.
What is the digital divide?
This is the highest grossing film of all time. (as of Jan 2024)
What is Avengers: Endgame?
The capacity of data transfer in a system, aka the speed of data transfer. It is measured by bitrate.
What is bandwidth?
This is the system that allows a user to type in a URL to arrive at that site's IP address
Domain Name System (or DNS) - using the Root, then Top Level Domain, Second Level Domain, and Subdomain servers to narrow down the IP address.
These are used to verify the ownership of encrypted keys used in secure communication.
What is a digital certificate / certificate authorities?
The non=profit organization that offers free pre-licensing agreements between artists and users.
What is Creative Commons or CC?
This fruit is the most popular and consumed worldwide.
What is a tomato?
This is the common use term for the series of underwater cables that transfer data across continents.
What is the "backbone of the internet"?
An IPv4 address has 32 bits, so there are 232 (over 4 billion) possible IPv4 addresses. An IPv6 address has 128 bits (96 additional bits per address).
How many more addresses are possible by switching from IPv4 to IPv6?
296 more addresses will be available!
(That's about 8 followed by 28 zeros)
Briefly explain how Public Key Encryption works when a sender computer wants to message a receiver computer.
(don't race, everyone who gets this right will earn points)
Every computer has 2 keys. A public key used for encryption, and a private key that decrypts that encryption.
1. Sender encrypts message with Receivers Public key.
2. Message gets sent to the Receiver. Nobody else can read it since nobody has the private key needed to decrypt it.
3. Receiver uses their private key to decrypt the message.
This is the name of the law that protects copyright holders from online theft in the form of illegally distributing music, videos, images, etc.
What is the Digital Millennium Copyright Act, or DMCA?
Answer in 2 parts:
Philosophically, the internet is _______.
Physically, the internet is ______.
Philosophically, the internet is making information and knowledge open and accessible to ALL.
Physically, the internet is a network of smaller networks.