Published using Google Docs
Big Idea 6 - Student Created Assignment
Updated automatically every 5 minutes

Big Idea 6a: The Internet - (Sample Compiled Questions)

Instructions

  1. Watch the corresponding video set before answering the questions.  Each page of the assignment covers a different pair of videos.  They overlap each other by 1 video per page to reinforce the concepts.
  2. Label the true/false questions in whatever way is convenient to you and highlight your multiple choice.
  3. Read but do NOT complete the Short Answer questions.  If you do not know the answer to the question, it is something you should consider studying on your own.
  4. We will mark this assignment in class.


Videos 2 & 3

True/False

  1. A group of 8 bits is called a byte
  2. 1000 bytes is called a terabyte
  3. IP address is defined as identification for new devices connecting to the internet

Short Answer

4. Explain the way in which the DNS system is flawed

5. Explain the three different ways you can send information

6. Explain the ways in which IPS addresses are hierarchically set up

Multiple Choice: 

7. Information can be communicated between devices through (1)electricity, (2)light, (3)radio, (4)email and (5)SMS

  1. 1,3 and 4 only
  2. 1,2, and 3 only
  3. 4 and 5 only
  4. 1,2,3,4 and 5

8. DNS stands for:

  1. Domain name system
  2. Digital nervous system
  3. Data not shown
  4. Drunk n’ Stupid(band)

9. DNS spoofing is an example of what?

  1. Driving dangerously
  2. Creating software
  3. Receiving data
  4. Hacking DNS


Videos 3 & 4

True/False

10. Traditional IP Addresses (IPV4) are 32 bits long.

11. On the internet, information goes directly from the source of information to where the info was requested.

12. Gopher organizes information on the Internet using a system of menus.

Short Answer

13. Give an analogy for what an internet router is and what do they transport?

14. What does TCP stand for? What does it do?

15. What does it mean for the Internet to be fault tolerant? What does it promote?

Multiple Choice

16. IPV6 has how many bits in each IP address?

        a)64

        b)32

        c)128

        d)256

17.What is the minimum amount of connections a basic computer must have to other       computers to operate in a network?

           a)1

        b)32

        c)3

        d)0

18. What is the amount of IP addresses available in an IPv6 address?

a)340 undecillion

b)4.3 billion

c)112 septillion

d)170 nonillion


Videos 4 & 5

True or False

19. Information is transferred between devices on the internet through direct, dedicated connections

20. Paths can change in the midst of a computer to computer conversation

21. HPML is the markup language used for web pages

Short Answer

22. Let’s say you have a very large image that you want to send to a friend. How do routers get your packets to their destination?

23. What does the TCP stand for and what does it do?

24. How do websites remember your identity for future access?

Multiple Choice

25. What does HTTP stand for?

  1. How Toes Transform Pros
  2. Hypertext Transfer Protocol
  3. Hypertext Transfer Procedure

26. How are internet interactions secured?

  1. Really good locks
  2. Using cookies
  3. With SSL and TLS

27. More routers become more reliable because of what concepts?

  1. Fault tolerance and abstraction
  2. TCP and Packets
  3. Redundancy and Fault Tolerance


Videos 5 & 6

True/False

28. Symmetric encryption is used by most computers today

29. Cryptography has a mathematical foundation

30. The Domain name system (DNS) is entirely secure

Short Answer (worth 2 marks each)

31. What are CAs and why are they important?

32. What is different between symmetric and asymmetric encryption?

33. Why does a website with a lot of different images take longer to load and what kind of request is being sent to load the images?

34. What does DNS stand for, and what does it do to make accessing a web page easier?

Multiple Choice

35. Which of the following does TCP/IP NOT do?

  1. communicate between network devices on the Internet
  2. identifies how data should be broken down into packets
  3. manage the sending & receiving of web files
  4. use the client/server model of communication

36. What does HTTP stand for?

  1. Hypertext transfer protocol
  2. Hypotext transfer protocol
  3. Hypertext transport protocol
  4. Hypotext transport protocol

37. Which of these is NOT an attribute of Asymmetric or public key encryption?

  1. Slows down a hacker from decrypting the data
  2. Easy for a person to decipher by hand
  3. In today’s world a 256 bit key is usually used
  4. In a few hundred years most of today’s encryptions will be solvable by a computer in seconds


Videos 6 & 7

True or False Questions

38. In Caesar Ciphers, shifting each digit a different amount is a more effective encryption that shifting them the same amount.

39. Using a longer key essentially makes it more difficult to create an encrypted message.

40. Symmetric Encryptions are encryptions that utilize the same key to encrypt and decrypt a message.

41. The next world war could likely be fought with computers used to shut down national water supplies, energy grids, and transportation systems.

42. People who commit Cyber crimes always fit a particular profile and motivation.

43. More often than not, hackers succeed the most by taking advantage of unintentional decisions made by people using a software.

Short Answer Questions

44. In a Caesar Cipher, why would shifting each digit by the same amount be an ineffective method of encryption?

45. Explain why it is so difficult to decrypt an encryption that utilizes a 256 bit key.

46. Describe the function of Asymmetric Encryptions and explain why it is preferably utilized by computers.

Multiple Choice Questions

47. The Caesar Cipher is shifted by how much: Rolk oy ngxj → Life is hard

  1. 6
  2. 8
  3. 3
  4. 5

48. One security protocol that protect internet users when browsing the web is

  1. Secure Socket Layer
  2. Security Safety Locks
  3. Transfer Lock Security
  4. Tracking Layer Safety

49. The encryption method that involves the sender and receiver utilizing the same key for encryption and decryption is

  1.  Asymmetric encryption
  2. Caesar Cipher
  3. Symmetric encryption
  4. Hashing

50. What is not an activity that a Cybercriminal would do when attacking you?

  1. Creating Software Viruses that could be downloaded unintentionally during a software update.
  2. Confronting you in person disguised as a government official to trick you into meeting their demands.
  3. Causing a DDoS Attack to shut down your internet connection using multiple computers all at once.
  4. Creating Phishing scam emails in an attempt to trick you into sharing sensitive information.

51. How many requests can a computer handle without being overloaded?

  1. Trillions of requests
  2. Millions of requests
  3. Billions of requests
  4. Quadrillions of requests

52. Once a Virus has  been installed on your computer, it cannot:

  1. Steal of Delete Any of Your Files.
  2. Control any of your other Program.
  3. Allow someone else to remotely control your computer.
  4. Allow the hacker to also access your Smartphone.


Video 7

True/False

53. Cyber vulnerability and scams only occur due to software programs.

54. A computer Virus can work much like a human virus, infecting one and slowly spreading among others.

55. Malicious software can be used to shut down water supplies, power grids, and transport systems

Short Answer

56. What is Phishing and what does the hacker gain? /2

57. What is a Botnet and what does the hacker gain from it? /2

58. What are two ways of protecting yourself from viruses or other malicious software? /2

Multiple Choice

59. DDOS stands for:

  1. Digitally Disrupted Other Software
  2. Distributed Denial Of Service
  3. Decoding Data Or Services
  4. Dealing Damage On servers

60. The highest chance of having a device hacked is:

  1. Unintentional Decision by User
  2. Hacker breaks through firewall
  3. Flaws in software
  4. Leaving device unmanned

61. A computer with a virus can:

  1. Steal / Delete Files
  2. Control Programs
  3. Remotely control Device
  4. All of the above