Netiquette
Censorship and Privacy
Email
Hacking, Piracy, and Viruses
Authenticity
100
Network etiquette, the etiquette of cyberspace.
What is Netiquette?
100
One of the main issues with the Internet today.
What is censorship and privacy?
100
The year that the project called SNDMSG was assigned to Ray Tomlinson.
What is 1971?
100
Files or programs with malicious code that infect your computer and can do anything from open your disk drives to deleting all your files.
What are viruses?
100
It is almost impossible to determine this on the Internet.
What is legitimacy?
200
The information-carrying capacity of the wires and channels that connect everyone in cyberspace.
What is bandwidth?
200
The result of the activity of many organizations, governments, and Internet service providers when they want to control internet use.
What are privacy issues?
200
Tomlinson invented this sign that is used in emails.
What is the "@" sign?
200
Similar to viruses but are more difficult to get rid of.
What are worms and trojans?
200
This helps you evaluate whether or not a site is accurate or not.
What is the URL?
300
The sign that is used to replace inappropriate language on the internet.
What is an asterisk filler?
300
Files that keep track of the places you visit on the web.
What are Internet cookies?
300
Unsolicited email sent to a number of people at the same time.
What is spam?
300
The year the "Slammer" virus, often known as the most destructive virus of all time.
What is 2003?
300
On a URL link/website, this will help you determine whether you should trust the information provided or not.
What is the suffix?
400
People do this to express a strongly held opinion without holding back any emotion.
What is flaming?
400
Looks for cookies that contain sensitive information likes PINS (codes) and passwords and extract them from your computer.
What are packet sniffers?
400
An email where a scammer sends which appears to be sent from a bank.
What is a phishing email?
400
Illegal downloading of music, videos and movies.
What is piracy?
400
Scholarly research should have this provided posted electronically as they would on the printed page.
What is a credential?
500
There are wizards in this, experts in every office, and system administrators in every system.
What are MUD's (multi-user dungeons)?
500
It is imperative to change these in order to avoid the capture of it by different sources (identity fraud/theft).
What are passwords?
500
Problems arise when this is attached to an email, it can release a code infecting one's computer.
What is a virus?
500
In 2003 there was this many of pirated music albums that were sold.
What is one billion?
500
Typically, if this is provided somewhere on the page (be it an article or whatever) the information is valid/legitmate.
What is a copyright statement and/or permission to reprint?