Big Idea 6a: The Internet - (Sample Compiled Questions)
Instructions
Videos 2 & 3
True/False
Short Answer
4. Explain the way in which the DNS system is flawed
5. Explain the three different ways you can send information
6. Explain the ways in which IPS addresses are hierarchically set up
Multiple Choice:Â
7. Information can be communicated between devices through (1)electricity, (2)light, (3)radio, (4)email and (5)SMS
8. DNS stands for:
9. DNS spoofing is an example of what?
Videos 3 & 4
True/False
10. Traditional IP Addresses (IPV4) are 32 bits long.
11. On the internet, information goes directly from the source of information to where the info was requested.
12. Gopher organizes information on the Internet using a system of menus.
Short Answer
13. Give an analogy for what an internet router is and what do they transport?
14. What does TCP stand for? What does it do?
15. What does it mean for the Internet to be fault tolerant? What does it promote?
Multiple Choice
16. IPV6 has how many bits in each IP address?
        a)64
        b)32
        c)128
        d)256
17.What is the minimum amount of connections a basic computer must have to other    computers to operate in a network?
      a)1
        b)32
        c)3
        d)0
18. What is the amount of IP addresses available in an IPv6 address?
a)340 undecillion
b)4.3 billion
c)112 septillion
d)170 nonillion
Videos 4 & 5
True or False
19. Information is transferred between devices on the internet through direct, dedicated connections
20. Paths can change in the midst of a computer to computer conversation
21. HPML is the markup language used for web pages
Short Answer
22. Let’s say you have a very large image that you want to send to a friend. How do routers get your packets to their destination?
23. What does the TCP stand for and what does it do?
24. How do websites remember your identity for future access?
Multiple Choice
25. What does HTTP stand for?
26. How are internet interactions secured?
27. More routers become more reliable because of what concepts?
Videos 5 & 6
True/False
28. Symmetric encryption is used by most computers today
29. Cryptography has a mathematical foundation
30. The Domain name system (DNS) is entirely secure
Short Answer (worth 2 marks each)
31. What are CAs and why are they important?
32. What is different between symmetric and asymmetric encryption?
33. Why does a website with a lot of different images take longer to load and what kind of request is being sent to load the images?
34. What does DNS stand for, and what does it do to make accessing a web page easier?
Multiple Choice
35. Which of the following does TCP/IP NOT do?
36. What does HTTP stand for?
37. Which of these is NOT an attribute of Asymmetric or public key encryption?
Videos 6 & 7
True or False Questions
38. In Caesar Ciphers, shifting each digit a different amount is a more effective encryption that shifting them the same amount.
39. Using a longer key essentially makes it more difficult to create an encrypted message.
40. Symmetric Encryptions are encryptions that utilize the same key to encrypt and decrypt a message.
41. The next world war could likely be fought with computers used to shut down national water supplies, energy grids, and transportation systems.
42. People who commit Cyber crimes always fit a particular profile and motivation.
43. More often than not, hackers succeed the most by taking advantage of unintentional decisions made by people using a software.
Short Answer Questions
44. In a Caesar Cipher, why would shifting each digit by the same amount be an ineffective method of encryption?
45. Explain why it is so difficult to decrypt an encryption that utilizes a 256 bit key.
46. Describe the function of Asymmetric Encryptions and explain why it is preferably utilized by computers.
Multiple Choice Questions
47. The Caesar Cipher is shifted by how much: Rolk oy ngxj → Life is hard
48. One security protocol that protect internet users when browsing the web is
49. The encryption method that involves the sender and receiver utilizing the same key for encryption and decryption is
50. What is not an activity that a Cybercriminal would do when attacking you?
51. How many requests can a computer handle without being overloaded?
52. Once a Virus has  been installed on your computer, it cannot:
Video 7
True/False
53. Cyber vulnerability and scams only occur due to software programs.
54. A computer Virus can work much like a human virus, infecting one and slowly spreading among others.
55. Malicious software can be used to shut down water supplies, power grids, and transport systems
Short Answer
56. What is Phishing and what does the hacker gain? /2
57. What is a Botnet and what does the hacker gain from it? /2
58. What are two ways of protecting yourself from viruses or other malicious software? /2
Multiple Choice
59. DDOS stands for:
60. The highest chance of having a device hacked is:
61. A computer with a virus can: