internet technology questions you can choose from
TRANSCRIPT
-
8/6/2019 Internet Technology Questions You Can Choose From
1/82
-
8/6/2019 Internet Technology Questions You Can Choose From
2/82
-
8/6/2019 Internet Technology Questions You Can Choose From
3/82
-
8/6/2019 Internet Technology Questions You Can Choose From
4/82
-
8/6/2019 Internet Technology Questions You Can Choose From
5/82
-
8/6/2019 Internet Technology Questions You Can Choose From
6/82
-
8/6/2019 Internet Technology Questions You Can Choose From
7/82
-
8/6/2019 Internet Technology Questions You Can Choose From
8/82
-
8/6/2019 Internet Technology Questions You Can Choose From
9/82
-
8/6/2019 Internet Technology Questions You Can Choose From
10/82
-
8/6/2019 Internet Technology Questions You Can Choose From
11/82
(C)HTML(D)Telnet
Which of the following is not a web browser:(A)Google Chrome(B)Opera
(C)Mozilla Firefox(D)Snow Leopard
The "[email protected]" is an example of a/anA. e-mail addressB. URLC. website
D. home page
Twitter is best described as ?A. A Social Networking siteB. A Video websiteC. An Email accountD. None of the above
What is the domain name of the URL : http://www.tstt.co.tt ?A. httpB. www.tstt.co.ttC. tsttD. co.tt
What ia a home page?A. A websiteB. Any page of a website
C. The first page when you open a browserD. A page full of homes
Which of the following can be sent or received using electronic mail?A. MoneyB. MP3 files
-
8/6/2019 Internet Technology Questions You Can Choose From
12/82
C. PackagesD. Letters
A. Computer SurveillanceB. Electronic EavesdroppingC. Industrial EspionageD. All of the Above
Select the browser from the following list.A. HotbotB. Internet explorer
C. FacebookD. Yahoo
The tapping into a communication channel to retrieve information is called:A. Electronic eavesdroppingB. Industrial espionageC. SurveillanceD. Piracy
A. Setting fire to a computer laboratoryB. LoggingC. HackingD. Encrypting
In a networking server environment what happens If your server fails ?A. Users unable to logon/Clients unable to communicate
Darius works as a data security analyst for a company that develops drugs. One month before the cdrug was launched, a generic drug was introduced by their competitor. The computer related crime tcommitted to allow the competitor access to the information needed to produce this generic drug is:
Which of the following actions is considered to be a computer crime?
-
8/6/2019 Internet Technology Questions You Can Choose From
13/82
B. Users logon locally /Clients communicateC. User and client can logonD. Clients able to logon/users unable to logon
All of the following can be completed using Internet banking exceptA. Paying credit card billB. Check account balanceC. Electronic Funds Transfer D. Withdrawing funds from your account
Which of the following can be classified as Electronic Fund Transfer?A. Paying cash for cell phoneB. Obtaining discount for video gameC. Buying a converse sneakers using cash
D. Buying a converse sneakers using credit card
A. Carnival charactersB. Carnival characters in T&TC. "Carnival characters in T&T"D. "Carnival characters" in T&T
Teleconferencing and Telemarketing are commonly used in today's society. State one advantage of both teleconferencing anA. Save time and travel costB. Less distraction of co-workersC. Shopping is easy and convenientD. Transactions are processed quickly and easily
What are CADD, CAE and CAM?A. Professional web design softwareB. GamesC. Engineering softwareD. Music production software
Which Professional would typically use a graphics tablet?
A student wants to get information on Carnival Characters in T&T. His initial search returned 100,000 hits. To improve the seafollowing key words will you use.
A. AccountantB. Legal SecretaryC. PhotographerD. Author
-
8/6/2019 Internet Technology Questions You Can Choose From
14/82
Which of the following is NOT a compiler:A. CobolB. DDXC. FortranD. Pascal
-
8/6/2019 Internet Technology Questions You Can Choose From
15/82
CATEGORY TAXONOMY LEVEL
4.1 Knowledge
4.1 Knowledge
4.1 Algorithmic Thinking
4.1 Knowledge
4.1 Knowledge
CURRICULUMOBJECTIVE
Internet
Technologies
Internet Technologies
Internet Technologies
Internet Technologies
Internet Technologies
-
8/6/2019 Internet Technology Questions You Can Choose From
16/82
4.1 Knowledge
4.1
4.1
4.1
4.1 Knowledge
4.3
Internet Technologies
Internet Technologies
Algorithmic Thinking
Internet Technologies
Algorithmic Thinking
Internet Technologies
Algorithmic Thinking
Internet Technologies
Internet Technologies
Algorithmic Thinking
-
8/6/2019 Internet Technology Questions You Can Choose From
17/82
4.3
4.3
4.3 Knowledge
4.3 Knowledge
4.3 Knowledge
4.3 Knowledge
Internet Technologies
Algorithmic Thinking
Internet Technologies
Algorithmic Thinking
Internet Technologies
Internet Technologies
Internet Technologies
Internet Technologies
-
8/6/2019 Internet Technology Questions You Can Choose From
18/82
4.3
4.3 Knowledge
4.3 Knowledge
4.3
4.3 Knowledge
4.3 Knowledge
Internet Technologies
Algorithmic Thinking
Internet Technologies
Internet Technologies
Internet
Technologies
Algorithmic
Thinking
Internet Technologies
Internet Technologies
-
8/6/2019 Internet Technology Questions You Can Choose From
19/82
4.5 Problem Solving
4.5 Knowledge
4.5 Knowledge
4.5 Knowledge
4.6 Knowledge
InternetTechnologies
InternetTechnologies
InternetTechnologies
InternetTechnologies
InternetTechnologies
-
8/6/2019 Internet Technology Questions You Can Choose From
20/82
4.6 Algorithmic Thinking
4.6 Algorithmic Thinking
4.6 Problem Solving
4.7 Problem Solving
4.7 Knowledge
4.9 Knowledge
InternetTechnologies
InternetTechnologies
InternetTechnologies
InternetTechnologies
InternetTechnologies
InternetTechnologies
-
8/6/2019 Internet Technology Questions You Can Choose From
21/82
(Glossary) Knowledgenot mentioned in the syllabus but they are taught to students Pg 71- K. Sk
InternetTechnologies
-
8/6/2019 Internet Technology Questions You Can Choose From
22/82
STIMULUS ANSWER
D. Wi Fi Hotspot
A. LAN
B. Fibre optics
A. LAN
B. Interconnecting computersand computer-equipment
over a large geographicalarea
-
8/6/2019 Internet Technology Questions You Can Choose From
23/82
D) Fibre optic cable
D) Bluetooth
D Upload
B. Token Ring
B. Hotspot
FTP is an acronym for File Transfer Portal
-
8/6/2019 Internet Technology Questions You Can Choose From
24/82
C. Mozilla Firefox
B. http://www.tstt.net.tt
A. Google
A Markup
A. FTP
(A)FTP
-
8/6/2019 Internet Technology Questions You Can Choose From
25/82
(D) Snow Leopard
A. e-mail address
A. A Social Networking site
B. www.tstt.co.tt
B. MP3 files
C. The first page when youopen a browser
-
8/6/2019 Internet Technology Questions You Can Choose From
26/82
D. All of the Above
B. Internet explorer
A. Electronic eavesdropping
C. Hacking
A. Users unable to logon/Clients unableto communicate
-
8/6/2019 Internet Technology Questions You Can Choose From
27/82
D. Withdrawing funds from your account
C. "Carnival characters in T&T"
A. Save time and travel cost
C. Engineering software
D. Buying a converse sneakers usingcredit card
C. Photographer
-
8/6/2019 Internet Technology Questions You Can Choose From
28/82
B. DDXeete)
-
8/6/2019 Internet Technology Questions You Can Choose From
29/82
QUESTION NUMBER
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
-
8/6/2019 Internet Technology Questions You Can Choose From
30/82
16
17
18
19
20
21
22
23
24
25
26
27
28
29
32
33
34
35
-
8/6/2019 Internet Technology Questions You Can Choose From
31/82
-
8/6/2019 Internet Technology Questions You Can Choose From
32/82
QUESTION
There are three types of area networks
Bluetooth is a type of wireless network.
LAN is a network that covers a wide geographical area.
A LAN is considered as a network in the same building only.
Simplex data transmission is from receiver to sender.
A hotspot is where Internet becomes readily available.
To gain access to the Internet you need a local ISP.
The Internet is owned by large organisations.
The Internet is a network of networks
The appropriate domain name for a government website is ".gov".
Movies and sounds can be inserted into power point slides.
Light is to Fibre-optics what electromagnetic waves is to wirelesscommunication
A modem carries data communications from one place to another in anetwork
It is possible for modern Bluetooth devices to have more than onesimultaneous point-to-point connection.
Bandwidth does not have a direct impact on the amount of data that canbe transmitted.
-
8/6/2019 Internet Technology Questions You Can Choose From
33/82
Another name for a seach engine is a web portal.
The Web is another name for the Internet
The internet protocol address is a 32 bit address.
Electronic Mail and Internet Relay Chat allows users to attach files.
Electronic mail allows messages to be stored.
Videos can be embedded on web pages.
Web pages are usually encoded in a special language called Hypertext Ma
Email is used for the sending and receiving of parcels.
URL stands for United Resource Location.
Attachments can be used to attach files to an email message.
Microsoft Internet Explorer is not a browser.
.org represents government bodies
Every computer on a network has its own IP address.
Data integrity is the same as data security
Robotics is not a form of artificial Intelligence.
Banking transactions cannot be completed online.
Working from home and communicating with office via the internet iscalled Telecommuting
Expert Medical Systems is an AI system that helps doctors answerquestions in the field of medicine.
-
8/6/2019 Internet Technology Questions You Can Choose From
34/82
-
8/6/2019 Internet Technology Questions You Can Choose From
35/82
CATEGORY TAXONOMY LEVEL ANSWER STIMULUS
4.1 TRUE
4.1 KnowledgeFALSE
4.1 Knowledge TRUE
4.1 Knowledge
4.1 Knowledge
TRUE
4.1 KnowledgeFALSE
4.1 FALSE
4.1 Knowledge FALSE
4.1 Knowledge FALSE
4.1 Knowledge TRUE
4.2 Knowledge TRUE
4.2 KnowledgeFALSE
4.2 Knowledge TRUE
4.3 Knowledge TRUE
4.3 Knowledge TRUE
CURRICULUMOBJECTIVE
Internet Technologies
Algorithmic Thinking
Internet Technologies
Internet Technologies
Internet Technologies
TRUE -LAN, MAN,WAN
Internet
TechnologiesInternet
Technologies
Internet Technologies
Algorithmic Thinking
Internet Technologies
Internet Technologies
Internet Technologies
Internet Technologies
Internet TechnologiesInternet
TechnologiesInternet
Technologies
Internet Technologies
-
8/6/2019 Internet Technology Questions You Can Choose From
36/82
4.3 Knowledge TRUE
4.3 Knowledge FALSE
4.3 Knowledge TRUE
4.3 TRUE
4.3 Knowledge TRUE
4.3 Knowledge TRUE
4.3 Knowledge FALSE
4.3 Knowledge FALSE
4.3 Knowledge FALSE
4.3 Knowledge TRUE
4.3 Knowledge FALSE
4.3 Knowledge TRUE
4.3 Knowledge TRUE
4.3 Knowledge TRUE
4.4 Knowledge FALSE
4.7 TRUE
4.7 Knowledge FALSE
4.8 FALSE
Internet TechnologiesInternet
Technologies
Internet TechnologiesInternet
TechnologiesAlgorithmic Thinking
Internet Technologies
Internet TechnologiesInternet
TechnologiesInternet
TechnologiesInternet
Technologies
Internet TechnologiesInternet
Technologies
Internet Technologies
Internet Technologies
Internet Technologies
Internet Technologies
Internet Technologies
Algorithmic Thinking
Internet Technologies
Internet Technologies
Algorithmic Thinking
-
8/6/2019 Internet Technology Questions You Can Choose From
37/82
6.25 Knowledge FALSE
6.25 Knowledge TRUE
Internet TechnologiesInternet
Technologies
-
8/6/2019 Internet Technology Questions You Can Choose From
38/82
-
8/6/2019 Internet Technology Questions You Can Choose From
39/82
16
17
18
19
20
21
22
23
24
-
8/6/2019 Internet Technology Questions You Can Choose From
40/82
26
27
28
29
30
31
32
33
34
35
36
37
38
39
-
8/6/2019 Internet Technology Questions You Can Choose From
41/82
40
41
42
43
44
45
-
8/6/2019 Internet Technology Questions You Can Choose From
42/82
46
47
48
49
50
51
52
53
54
-
8/6/2019 Internet Technology Questions You Can Choose From
43/82
55
56
57
58
59
60
61
62
-
8/6/2019 Internet Technology Questions You Can Choose From
44/82
-
8/6/2019 Internet Technology Questions You Can Choose From
45/82
67
68
69
70
71
72
73
75
76
77
78
-
8/6/2019 Internet Technology Questions You Can Choose From
46/82
80
-
8/6/2019 Internet Technology Questions You Can Choose From
47/82
QUESTION
It meaures the capactity of a communications channel
This technolgy is used in remote controls for televisions
Cables and signals together are known as
Name the device that allows you to connect to the internet.
What does the acronmy MAN means?
What is the function of a modem?
There are three types of LAN topologies. Name one.
What type of processing would an Airline Agency use when b
What is "Full Duplex" transmission?
A radio technology similar to Wi-Fi but only works over shortdistances
Students have access to a number of music storage devicessuch as MP3, MP4, iPod players which are small andportable. Name storage media used to save the music files.
TSTT can provide internet connection where there is nophysical phone line via their Blink Broadband subscription.What device must be plugged into your computer to haveaccess to this service?
What is the network topology where each node (networkdevice) has its own connection to the hub?
Data transmitted in both directions but not at the same timeis known as
Two security guards conversing over walkie-talkie is anexample of what type of communication mode?
-
8/6/2019 Internet Technology Questions You Can Choose From
48/82
What is the meaning of Simplex?
What is the purpose of a modem?
What is point -to -point transmission?
What type of transmission media does Wi-Fi use?
What does the acronym "MODEM" stand for
Name the transmission media that carries electric current atradio frequencies?
Name the transmission media carrying data using strands of glass and light.
The data transmission method used by TSTT Blinktechnology
Identify the data transmission media seen here in thephotograph.
-
8/6/2019 Internet Technology Questions You Can Choose From
49/82
Give one disadvantage of the Internet.
An extension to an intranet is known as
What do the acronym HTTP stand for?
What do the acronyms URL stand for?
What ia a fire-proof cabinet
Define the term File Transfer Protocol?
What is electronic commerce?
Name the protocol that most URL addresses use.
Mary ordered a phone online. She received the phone twoweeks after the order. Why is this classified as an e-commerce activity?
A method for distributing audio files that was first developedto support the Apple i-pod
A communication service used to chat with others by keyingin messages to one another and both your messages andreplies can be seen on screen.
In the video the term Electronic eavesdropping wasmentioned.What is electronic eavesdropping? (Websitelocation for video used is www.tscmvideo.com, see fromtime 1:18-2:00 )
To convert your mobile phone into an electroniceavesdropping device, modifications has to be made to thephone. Justify why software modifications are made.
John was caught with the two mobile phones shown in thevideo. He was charged with electronic eavesdropping.Discuss reason for the charge.
-
8/6/2019 Internet Technology Questions You Can Choose From
50/82
What is the URL in the web browser shown in the picture?
What do the following acronym stand for www?
What do the following acronyms stand for XHTML?
What is a webpage?
This website allows a user to create a blog. What is blog sho
What type of technology does Online chatting with Text,Voice and Video, such as iChat or Skype uses?
-
8/6/2019 Internet Technology Questions You Can Choose From
51/82
Securing data by encoding it with a special key is called?
Name one type of computer virus.
The type of data security represented in the picture shown.
The most common method of protecting data
A URL is broken down into three (3) parts by a web browser,what are these parts?
A protocol allowing you to have voice communicationthrough the Internet.
Name one measure that a person can implement to preventunauthorised access to his wireless internet connection.
have taken to prevent the competitor from gaining theinformation to produce the generic drug.
The pictures below illustrates a technology used to protectdata. Identify the technology.
-
8/6/2019 Internet Technology Questions You Can Choose From
52/82
A form of fraud where criminals pretend to be someone else
Mary ordered a phone online. She was contacted within 24hours to verify the order. State one reason why thecompany would asks Mary to verify the order.
What Information Technology application is best suited for
accessing cash from your bank account 24 hours a day?
What Information Technology application is best suited forshopping from your home?
Identity Theft is becoming prevalent in today's society. Whatis identity theft? (Website location for video used is "www.youtube.com/watch?v=YWnUmpQhiOw" see from time0 to 14sec. )
What TWO measures can be taken to prevent identity theft?(Website location for video used is "www.youtube.com/watch?v=YWnUmpQhiOw" see from time0 to 14sec.)
Discuss one implication of Identity Theft. (Website location
for video used is " www.youtube.com/watch?v=YWnUmpQhiOw" see from time 0 to 14sec.)
The type of computer crime where an employee is a spy tofind out all the confidential marketing information of thecompany.
-
8/6/2019 Internet Technology Questions You Can Choose From
53/82
What computer crime can be committed by the misuse of the information downloaded?
Teleconferencing and Telemarketing are commonly used intoday's society. State two hardware requirements that arecommon to both.
List One benefit of the wireless technology shown in thevideo for a visually impaired or blind person. (Website
location for video used is " www.youtube.com/watch?v=RxgcqgsU8ks" see from time 0 to 34sec.)
List two ways how this technology can improve the lifestyleof a visually impaired or blind person. (Website location forvideo used is " www.youtube.com/watch?v=RxgcqgsU8ks"see from time 0 to 34sec.)
-
8/6/2019 Internet Technology Questions You Can Choose From
54/82
Why do you think Robots are a preferred choice for employer
The computer applications acronym CADD stands for?
The computer applications acronym CAE stands for?
The computer applications acronym CAM stands for?
The video shows robots employing what type of software?
Identify the technology used in the video. (Website locationfor video used is "www.dvice.com/archives/2010/04/laundry-folding.php" see
from time 5 to 33sec.)
Identify an industry where this technology can be used, and justify why it is used there. (Website location for video usedis " www.dvice.com/archives/2010/04/laundry-folding.php"see from time 5 to 33sec.)
Describe two practical applications of this technology forphysically impaired persons. (Website location for video
used is " www.dvice.com/archives/2010/04/laundry-folding.php" see from time 5 to 33sec.)
A company is thinking about implementing telecommutingin its company. Justify the need for telecommuting.
A company is thinking about implementing telecommutingin its company. Name two hardware devices required fortelecommuting.
Employees working from home using a computer to connectand communicate with their companys computer is called?
-
8/6/2019 Internet Technology Questions You Can Choose From
55/82
A file _______ handles all the shared files and data.
-
8/6/2019 Internet Technology Questions You Can Choose From
56/82
CATEGORY TAXONOMY LEVEL
Internet Technologies 4.1 Knowledge
Internet Technologies 4.1 Knowledge
Internet Technologies 4.1 Algorithmic Thinking
Internet Technologies 4.1 Knowledge
Internet Technologies 4.1 Knowledge
Internet Technologies 4.1Algorithmic Thinking
Internet Technologies 4.1 Knowledge
Internet Technologies 5.1 Knowledge
Internet Technologies 4.1 Knowledge
Internet Technologies 4.1 Knowledge
Internet Technologies 4.1 Knowledge
Internet Technologies 4.1 Knowledge
Internet Technologies 4.1 Knowledge
Internet Technologies 4.1 Knowledge
Internet Technologies 4.1 Knowledge
CURRICULUMOBJECTIVE
-
8/6/2019 Internet Technology Questions You Can Choose From
57/82
Internet Technologies 4.1 Knowledge
Internet Technologies 4.1 Knowledge
Internet Technologies 4.1 Knowledge
Internet Technologies 4.1 Knowledge
Internet Technologies 4.1 Knowledge
Internet Technologies 4.1 Knowledge
Internet Technologies 4.1 Algorithmic Thinking
Internet Technologies 4.1 Problem Solving
Internet Technologies 4.1 Knowledge
-
8/6/2019 Internet Technology Questions You Can Choose From
58/82
Internet Technologies4.2 Knowledge
Internet Technologies 4.2 Knowledge
Internet Technologies 4.3 Algorithmic Thinking
Internet Technologies 4.3 Knowledge
Internet Technologies 4.3 Knowledge
Internet Technologies 4.3 Knowledge
Internet Technologies 4.3 Knowledge
Internet Technologies 4.3 Knowledge
Internet Technologies 4.3Algorithmic Thinking
Internet Technologies 4.3 Problem Solving
Internet Technologies 4.3 Knowledge
Internet Technologies 4.3 Knowledge
Internet Technologies 4.3 Knowledge
Internet Technologies 4.3 Knowledge
-
8/6/2019 Internet Technology Questions You Can Choose From
59/82
Internet Technologies 4.3 Knowledge
Internet Technologies 4.3 Algorithmic Thinking
Internet Technologies 4.3 Knowledge
Internet Technologies 4.3 Knowledge
Internet Technologies 4.3 Knowledge
Internet Technologies 4.3 Knowledge
-
8/6/2019 Internet Technology Questions You Can Choose From
60/82
-
8/6/2019 Internet Technology Questions You Can Choose From
61/82
Internet Technologies 4.5 Algorithmic Thinking
Internet Technologies 4.5 Knowledge
Internet Technologies 4.5 Knowledge
Internet Technologies 4.5 Knowledge
Internet Technologies 4.5 Knowledge
Internet Technologies 4.5 Algorithmic Thinking
Internet Technologies 4.5 Knowledge
Internet Technologies 4.5 Knowledge
-
8/6/2019 Internet Technology Questions You Can Choose From
62/82
Internet Technologies 4.5 Algorithmic Thinking
Internet Technologies 4.7 Algorithmic Thinking
Internet Technologies 4.7 Algorithmic Thinking
Internet Technologies 4.7 Algorithmic Thinking
-
8/6/2019 Internet Technology Questions You Can Choose From
63/82
Internet Technologies 4.7 Knowledge
Internet Technologies 4.7 Algorithmic Thinking
Internet Technologies 4.7 Problem Solving
Internet Technologies 4.7 Algorithmic Thinking
Internet Technologies 4.7 Knowledge
Internet Technologies 4.7 Knowledge
Internet Technologies 4.7 Knowledge
Internet Technologies 4.7 Analytical Thinking
Internet Technologies 4.8 Problem Solving
Internet Technologies 4.8 Algorithmic Thinking
Internet Technologies 4.8 Knowledge
-
8/6/2019 Internet Technology Questions You Can Choose From
64/82
Internet Technologies Knowledge
-
8/6/2019 Internet Technology Questions You Can Choose From
65/82
ANSWER
Bandwidth
Bluetooth
Infrared
Transmission media
Modem
Metropolitan area network.
Star Topology; ring topology; line or bus topology.
Real-time Processing
a Wi Fi Modem
Star network
Half-duplex
Data transmission in both directions at the same time.
Half Duplex
Use either flash memory or small hard drives to store hundredsand thousands of songs
A device that converts analogue signals to digital signals anddigital signals back to analogue signals.
-
8/6/2019 Internet Technology Questions You Can Choose From
66/82
Data that can be sent or received but not do both.
Is the process by which data is sent from one location to another.
Wireless transmission media
Coaxial Cable
Fibre-optic Cables
Broadband
Fibre-optic
Modulator/Demodulator
vice versa.
-
8/6/2019 Internet Technology Questions You Can Choose From
67/82
Extranet
Mary is buying merchandise/item over the internet
Pod-casting
Instant Messaging
HyperText Transfer Protocol
Uniform Resource Locator
A physical restriction used to secure on-site back-ups of data .
http-Hyper Text Transfer Protocol
There is an availability of a lot of inaccurate information; It maybe difficult to exactly what you need because of the volume of information available; Computer viruses can be easilydownloaded.
Electronic Eavesdropping is gaining unauthorised access to databeing transmitted by tapping data transmission channels.
Software modifications must be made because the phone has tobe programmed to receive a call from a specific number thatallows it to go into eavesdropping mode.
John was charged with electronic eavesdropping because he wasgaining access to information illegally.
A set of rules that govern the sending and receiving of files onthe internet.
The buying, selling, marketing and servicing of products andservices over computer network.
-
8/6/2019 Internet Technology Questions You Can Choose From
68/82
Web log
World Wide Web
Extensible Hypertext Markup Language
A collection of text and multimedia documents.
Voice Over Internet Protocol(VOIP)
http://www.google.tt/
http://www.google.tt/http://www.google.tt/ -
8/6/2019 Internet Technology Questions You Can Choose From
69/82
i. Protocol; ii. Domain server name; iii. File name
VOIP (Voice Over Internet Protocol)
Using a password
Encryption
File virus; Email virus; Trojan horses; Boot-sector virus.
Physical/fireproof vault or cabinet
Passwords
Biometric Systems Technology
formula files, distribute sensitive work among multiple workers,encrypt formula files.
-
8/6/2019 Internet Technology Questions You Can Choose From
70/82
ATM card/debit card
E-commerce
Identity theft
Industrial espionage
The company wants to ensure that Mary placed the originalorder.
Identity theft is stealing someone's personal information withouttheir permission or knowledge to commit fraud and other crimesfor financial gain.
Measures that can be taken to prevent identity theft are don'tgive out your personal information eg, password and pin numberrelating to your bank and credit card accounts, don't give outpersonal identification nos, such as driver's permit no andpassport number.
Identity is stolen and persons can gain access to your financial
accounts, use your data for illegal purposes, you can become aninvisible person who ceases to exist
-
8/6/2019 Internet Technology Questions You Can Choose From
71/82
-
8/6/2019 Internet Technology Questions You Can Choose From
72/82
Computer Aided Design and Drafting
Computer Aided Engineering
Computer Aided Manufacturing
CADD, CAM
Telecommuting
Robotics is the use of computer controlled machines in place of
humans to perform repetitive and dangerous tasks.
Can be used in the following industries automotive, spaceexploration, in biochemical plants and in scientific studies.Reason to perform repetitive and dangerous tasks
It can assist them with a number of household chores, aid with
safety,enable them to be more independent by improving theirmobility and communication.
They are preferred because Robots don't get sick, complain, takestrike action, get tired, perform with fewer errors than humans,can operate in extreme environments, can perform high precisiontasks.
reducing stress; Improves productivity; better organistion of personal time, promotes safety
Computer, modem, web cam, headphones, microphone,scanner/fax machine
-
8/6/2019 Internet Technology Questions You Can Choose From
73/82
Server
-
8/6/2019 Internet Technology Questions You Can Choose From
74/82
STIMULUS
-
8/6/2019 Internet Technology Questions You Can Choose From
75/82
http://www.techdigest.tv/Fibre-Optic-Cable.jpg
-
8/6/2019 Internet Technology Questions You Can Choose From
76/82
Electronic eavesdropping video
Electronic eavesdropping video
Electronic eavesdropping video
-
8/6/2019 Internet Technology Questions You Can Choose From
77/82
Screen Shot
Picture
-
8/6/2019 Internet Technology Questions You Can Choose From
78/82
Picture
Picture
-
8/6/2019 Internet Technology Questions You Can Choose From
79/82
I ent ty T e t V eo We s te ocat onfor video used is "www.youtube.com/watch?v=YWnUmpQhiOw" see from time 0 to14sec.)
Identity Theft Video (Website locationfor video used is "www.youtube.com/watch?v=YWnUmpQhiOw" see from time 0 to14sec.)
for video used is "www.youtube.com/watch?
v=YWnUmpQhiOw" see from time 0 to14sec.)
-
8/6/2019 Internet Technology Questions You Can Choose From
80/82
-
8/6/2019 Internet Technology Questions You Can Choose From
81/82
Robot folding clothes video(Websitelocation for video used is "www.dvice.com/archives/2010/04/laundry-folding.php" see from time 5 to
33sec.)
Robot folding clothes video(Websitelocation for video used is "www.dvice.com/archives/2010/04/laundry-folding.php" see from time 5 to33sec.)
Robot folding clothes video(Websitelocation for video used is "www.dvice.com/archives/2010/04/laun
dry-folding.php" see from time 5 to33sec.)
http://www.youtube.com/watch?v=adS
http://www.youtube.com/watch?v=adSYMbPw_oMhttp://www.youtube.com/watch?v=adSYMbPw_oM -
8/6/2019 Internet Technology Questions You Can Choose From
82/82