Java Games: Flashcards, matching, concentration, and word search.

Web Tech Computer Security TEST REVIEW

Basic Communication, Computer Security, Copyright, Internet Protocols

AB
What are some effective Listening Tips?make eye contact, lean forward and show interest, but DON'T interrupt, multitask while listening or finish other’s sentences for them
How much of a song can be used under fair use guidelines?10%, but not more than 30 seconds
stands for Internet Service ProviderISP
What are the 4 C’s of Communication?Completeness, Conciseness, Correctness, Clarity
Copying material word for word and claiming that it is yours is called:Plagiarism
HTML _____________.contains invisible tags that tell the Web browser how a page should be displayed on a monitor.
examples include Excite, Google, BingSearch engine
Good communication requires both expressing information and receiving information. What are 4 skills needed to effectively communicate?Speaking, Writing, Listening, Observing
Each Web page has its own _______ which uniquely identifies it.URL
contains a feature that allows you to bookmark favorite websitesBrowser
What is the purpose of using emoticons in e-mail messages?They express the emotional tone of the message
HTTP stands for ___________.hypertext transfer protocol
Which are the general Rights given to copyright owners?To reproduce, distribute, or make derivatives of the work or perform and display the work publicly
How much of a video can be used under fair use guidelines?10%, but not more than 3 minutes
The copyright for a work by a single author lasts ____ years after the author’s death.70
data that has been translated into a secret code for security reasonsEncrypted
What is Copyright?The exclusive privilege that allows an author or owner to print, sell, publish, etc. his or her own work.
The rules of courtesy that we use while on the Internet are referred to as ___________.Netiquette
What are the 5 components of the Internet?Email, Usenet, FTP, Telnet, WWW
a program errorBug
the fact that if humans enter incorrect data into a computer, the computer will generate incorrect resultsGarbage-in, garbage out (GIGO)
the practice of breaking computer security measures designed to prevent unauthorized access to a computer systemHacking
the unauthorized copying of a copyrighted computer programSoftware Piracy
data that has been translated back into regular text after being encrypted for security reasonsDecrypted
contains tags that are used when a browser creates Web pagesHTML
used to log onto a remote host computerTelnet
;-) is an exampleEmoticon
the fastest growing part of the InternetWWW
a computer program that acts as a time bomb and can destroy the contents of a hard or floppy discVirus
www.msnbc.com is an exampleURL
allows users to move files from one site to anotherFTP
controlling access to a computer by using means such as fingerprint, voice matching, retinal scanning.Biometric Security
a computer program that can prevent the infection of a computer by known virusesVaccine
contains e-mail, Usenet, File Transfer Protocol, Telnet and the World Wide WebInternet
Be prepared to identify examples of Sabotage, theft of Service, Property Crimes and Financial Crimes.Yes, I will be prepared!



This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities