This is a timed quiz.
You have 30 minutes to complete the 26 questions in this quiz.
"Time Sharing" was a strategy in the 90's to provide access to computers for many expert users.
Which was the influence of Cold War in the history of Internet?
The Cold War provided the resources needed to build Internet.
The Cold War concentrated the nations to get strategic advantages.
The Cold War improved the international relationships.
The Cold War ordered east and west in a different way.
None of above.
What is a Mainframe?
A powerful computer used over the Internet.
A computer that brings the opportunity to work simultaneously to a hundreds of users.
A computer that saves information in the Internet.
All of the above.
In which decade Internet was called like that, and start running?
None of the above.
What is a Server?
Is a special computer connected to a network.
Is a special computer connected directly to the Internet.
Is a special computer disconnected to a network.
What is an Internet Protocol Address? (I.P. Address)
Is an unique identifier to connect a device to a network.
Is a piece of hardware important to connect to the Internet.
Is a number to identify a specific group of computers in the Internet.
What is an I.S.P.?
It is a special computer designed to browse the internet.
It is a company to save information in the client computers connected to the Internet.
It is a company that provides the service to connect client computers to the Internet.
Which is the purpose that represents the functionality of the Web 1.0?
Which is the purpose that represents the functionality of the earlier versions to the Internet?
Which is the purpose that represents the functionality of the Web 2.0?
Which is the purpose that represents the functionality of the Web 3.0?
To connect devices.
To communicate people.
To share information.
To provide useful information about user.
The user role in Web 1.0 was a Information consumer.
The user role in Web 2.0 is Information producer.
The main purpose in Web 3.0 is to learn about the user information to provide better information to him.
Which of the following sentences related with the image are not true:
A repeated behavior leads to create an habit.
Our habits are based on our beliefs.
Our behavior is leaded by our emotions.
The first step to reach an habit, is to create a belief.
is the sending of sexually explicit digital images, videos, text messages, or emails, usually by cell phone.
means that an adult is getting to know and befriending a child with the intention of sexually abusing it.
is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
is an attempt to exploit a computer system or a private network inside a computer.
is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
A hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security.
A hat hacker is a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
What is Netiquette?
Rules of etiquette that apply when communicating over computer networks, especially the Internet.
Rules of etiquette that apply when people use communications devices.
Common guidelines include being courteous and precise, and avoiding cyber-bullying and obey copyright laws.
If you write using is considered to be shouting.
Another netiquette rule could be: Do not reveal your sensitive online.
What is Malware?
Is a special kind of hacker that uses malicious intentions to attack information systems.
Is an specific computer virus that attacks the computer like a trojan horse.
Is an specific software which is designed to disrupt, damage, or gain authorized access to a computer system.