Midterm 3 Flashcards

(118 cards)

1
Q

What is the most widely used video sharing service?

A

YouTube (2005) (2013 = 18% of all internet traffic)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the most widely used streaming service?

A

Netflix (1997). It is the largest movie and TV show streaming company in the world whose traffic accounts for over 30% of all Internet traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do video sharing sties earn much of their revenues?

A

Through advertising.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is streaming?

A

To play video directly from the Internet in a web browser or other app without ever storing the video on a device. (In 2014, streamed video accounted for more than half of all Internet traffic)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Smart TV’s?

A

Small inexpensive boxes to stream movies from home WiFi to a TV. Smart TVs have evolved so that they can connect to a home’s WiFi network and thus directly stream movies. Examples of smart TVs are Apple TV, Google Chromecast, Roku, and Amazon Fire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a wiki?

A

a website that enables collaborative development of content (comes from the Hawaiian word for quick.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the best known example of a wiki?

A

Wikipedia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a crowdsourcing site?

A

an approach to developing content that involves having the users (the “crowd”) be the contributors, rather than using highly-paid professionals. Wikipedia’s crowdsourcing approach not only enables Wikipedia to be free, but also has led to far more articles than found in professionally-produced encyclopedias.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What free online encyclopedia is considered the predecessor to Wikipedia?

A

Nupedia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is the quality of Wikipedia articles?

A

Generally, articles on widely-read subjects seem to evolve into good quality articles via refinement by the large number of users.
For some articles, especially lesser-read articles (which likely would not have had entries in a professional encyclopedia), quality can indeed vary tremendously, and such articles are often incomplete also.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the most widely-used social networking site?

A

Facebook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Facebook?

A

a site focused on connecting friends who share items like photos, videos, thoughts, invitations to events, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When was Facebook developed?

A

2004

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When did Facebook become available to anyone over the age of 13 with an email address?

A

2006

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Twitter?

A

a social network site whose users send and read short 140-character messages called “tweets”. The 140-character limit came originally from that limit imposed on cell phone text messages, where early tweets were sent/read.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When was Twitter established?

A

2006

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is LinkedIn?

A

a social networking site intended primarily for professionals to share background and qualifications with other professionals and with companies, akin to an online resume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

LinkedIn’s revenues are not primarily from advertising. So more than 50% of LinkedIn’s revenues in 2013 came from what?

A

Companies paying to have access to lists of users, typically for recruiting purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is store and forward?

A

When you get an email it is stored somewhere on a server and by contacting that server the email will get forwarded to you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is IMAP?

A

a common protocol for retrieving email messages via the Internet. An IMAP server’s name commonly starts with imap, as in imap.gmail.com.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is SMTP?

A

an Internet protocol for sending email. An SMTP server’s name commonly starts with smtp, as in smtp.gmail.com.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is cc (carbon copy)?

A

indicates additional recipients: People to whom the email isn’t directly intended to, but who may want/need to see the email anyways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is bcc (blind carbon copy)?

A

indicates additional recipients whose email addresses will not be revealed to any other recipients (neither the To, cc, or bcc recipients).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a thread?

A

a group of email having the same subject. (there is also a date based ordering)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
50%-90% of all emails sent are what?
Spam
26
What is a filter and a spam filter?
a filter is an automatic tool that monitors incoming email and takes a specified action and a spam filter automatically archive email into a spam folder.
27
What is a text message (aka SMS)?
a short message sent among cell phone users.
28
What are the character limitations on text messaging?
A text message containing characters from the Latin alphabet is limited to 160 characters. A text message containing characters from other alphabets, such as Chinese, Arabic, or Cyrillic is limited to 70 characters.
29
What is a vacation message for email?
many emails support this form of filter wherein any incoming emails will automatically receive a reply containing a user specified message, such as “Auto-reply: I am away from email until July 23.”
30
How are text messages sent?
A text message is transmitted via the cellular network. The text message is sent from the user’s cell phone to the nearest cell tower, and then to an SMSC (short message service center)
31
What is MMS (multimedia messaging service)?
a popular method used to send multimedia-based text messages containing text, pictures, video, and audio. MMS enabled cell phones are backwards compatible and support both MMS and SMS text messages.
32
What are SMS-based text messages limited to?
Text
33
What is cloud storage?
the storage of files on remotely-located servers, with those files being managed by apps via the web.
34
What are the advantages of Cloud storing over storing files solely on a local computer drive?
Local storage is limited. Moving lesser-used files to cloud storage, such as large video files, can make room in local storage for more regularly-used files. Files on cloud storage can serve as a backup. A backup is a copy of a file kept in case the local version is accidentally damaged or lost. Files on cloud storage can be accessed by various user devices and from various locations.
35
What is an example of a web based application?
Google docs, and you can share these docs among other users
36
What are electronic/digital footprints?
Not just information the user intentionally posts online. The footprint consists of all the information that user posts or that others post about the user, the hidden data attached to those posts by the services used, the record of a user's online activities, and also the inferences that can be drawn from putting that collective information together.
37
What are the different ways that information can be collected about you?
An Internet connection transmits the sender's IP address along with the info the user sends, such as an email or a request to view a webpage. Websites and apps store the address, and other info like where a user's mouse spends time on a webpage. An app on a mobile phone may communicate location data back to a server, or a camera app may embed location information in an image.
38
What is an IP Address?
An address assigned by your ISP that is different or can change depending on what network you are connected to. Sent to web sites when you surf
39
What is metadata?
extra information that describes data, like location information for image data, or author information for a word processing document. EXIF is a common image format that include metadat.
40
How can information be collected even when you're not on the Internet?
Credit Card usage, turning on the TV, going to the doctor
41
What is a MAC Address?
A "serial number" for your device that generally does not change. Not sent to web sites but is sent to ISP when you connect to its network.
42
How can you prevent or minimize your information footprint?
Check privacy settings that can typically be turned off: Location services (which provide GPS information about current location), Metadata in images, and sharing contact information with third parties.
43
What do information resellers do?
Collect information, use data mining, and sell information to targeted advertising who choose advertisement for you that you are most likely to click on and spend money on.
44
Do Incognito and browsing mode really protect your privacy?
Not really because advanced users who use an anonymization proxy to cover the IP address may still have uniquely identifiable information leak through, such as a browser configuration, cookies, or the information the user submits upon request.
45
What is one example why being anonymous on the Internet is nearly impossible?
A user's IP address may be transmitted along with a web browser's configuration, which can be combined to uniquely identify a user.
46
What is data mining?
an advanced technique that can analyze language usage, faces, locations, and other items to match a unique individual.
47
What is Identity Theft?
The deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.
48
How does Identity Theft occur?
Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number without their permission, to commit fraud or other crimes.
49
What is the most common form of identity theft?
Financial identity theft
50
What are other examples of identity theft?
Criminal identity theft, child identity theft, synthetic identity theft.
51
What are some ways of obtaining personal information?
Dumpster diving, theft (pick pocketing, etc.), hacking, phishing.
52
What is encryption?
Encryption scrambles plaintext into a cyphertext to prevent unauthorized users from accessing the information.
53
What wifi encryption should you always use?
WAP2 wifi encryption because it is the most recent one.
54
How can you tell a web page is secure?
https
55
What are phishing emails?
emails fraudulently ask users to provide sensitive account information by posing as legitimate companies.
56
What email third party is a common protocol involving encryption that is the best?
PGP
57
What percent of employers are using social-media and search engines to research job candidates?
40%
58
Companies are most likely to have a security breach from where?
Employees or authorized users, not outsiders like hackers.
59
What is a security breach?
a case of unauthorized computer access
60
What is a hack?
a malicious security breach done by unauthorized access.
61
What are the most common forms of a breach?
Hacks
62
What is a security hole, or vulnerability?
an aspect of a computer that can be used to breach security, aka bugs in a computer..
63
What is a virus?
a program that runs on a user's computer without permission, and spreads itself to other computers, often via email.
64
What is a worm?
A self-replicating stand-alone program (does not need a host file) that automatically tries to copy itself to other computers on a network. The first internet worm (1988) affected 10% of the Internet.
65
What is the most common ways in which viruses are transmitted?
Email and download
66
Why should anti-virus software be kept up to date?
Because there's always new viruses being released
67
What is spam?
unsolicited mass email, perhaps advertising prescription drugs for sale, or further spreading the virus.
68
What are DOS attacks?
It is achieved by submitting huge numbers of access requests simultaneously to one website, which overloads that site's web server, thus preventing legitimate requests from being handled (those requests are denied service).
69
What are botnets?
large groups of infected computers, controlled without a user's knowledge, to perform tasks such as sending spam.
70
What are trojan horses?
malware that a user installs believing the software to be legitimate, but the software actually has a malicious purpose.
71
What is adware?
malware that displays advertisements to the user, commonly in a web browser
72
What is spyware?
malware that collects information from a computer without the user's knowledge.
73
What is an example of spyware?
keystroke loggers that log each key you type so they have your passwords.
74
How do viruses work?
A virus is a self-replicating code attached to a program (i.e. host). When program runs, virus is executed and transmitted to other computers when an infected program is opened as an email attachment (most common), downloaded from the internet, or copied from a USB.
75
How does spamming occur?
Spamming is illegal in many countries so if a spammer sent millions of emails from one computer, email companies might block that computer, and authorities might find the spammer. Instead, a spammer instructs thousands of infected computers to send the spam emails.
76
What is malware?
short for malicious software, it is undesired software that is typically installed without a user's knowledge and typically bad for the computer or user.
77
What is the objective of malware?
doing damage, selling products, spying, and more
78
Where is malware most common?
In desktop and server machines (in 2014 an estimated 1/3 had malware).
79
Where is malware less common?
smartphones and tablets because they have newer OS'es created with security in mind from day one and controlling how apps are installed using an app store where applications must first be approved, such approval including checking for malicious code. A smartphone/tablet user who only downloads apps from the device's official app store typically has almost no malware issues.
80
What is the most common form of account security?
Passwords
81
What makes a good password?
The longer the password the better and having special characters
82
What type of verification is becoming more common?
Two-step verification which is much safer
83
What is an example of two-step verification?
Typing your password and then receiving a code on your phone that you must type in as well
84
What are biometrics?
Devices that need body data to verify identity and grant access.
85
What is phishing?
Most common type of phishing occurs with email. It involves sending out a bunch of emails that look official and from a legit company that try to get you to divulge information that you should not. Essentially it's a scam that baits a user to share sensitive information like a password or credit card number.
86
What is spear phishing?
A more targeted form of phishing. Involves targeted emails sent out to higher individuals in a company (Ex. VPs getting an email that seems to be from the President to get account info, etc)
87
What is the nigerian scam (aka 419 scam)?
Where a scammer establishes contact with an individual to help with a business transaction like transferring money out of a country, for which the individual will supposedly receive a large payment.
88
What is salami slicing?
When a scammer only steals a small amount from someone so that they don't notice but they do it for multiple people which accumulates to a large profit.
89
What is the craiglist scam?
an Internet scam where a seller receives an email from a buyer offering to buy an item. The buyer pays by check (or money order) and requests immediate shipment of the item. The seller deposits the check and sends the item, but in a few weeks the seller is notified of insufficient funds to cover the check which in expensive for them because the bank will make them pay for it. The seller has no means to get back the sent item.
90
Spam accounts for how much of all emails in the world?
Over half of all emails in the world.
91
What is pump-and-dump?
A scam o stock market manipulation scheme where someone buys a bunch of stock in a company then puts out false information about the company to falsely promote it in order to pump the prices up (artificial inflation). Then that someone sells before the company finds out that fake news has been spread and the stock tanks after the announcement of the fake news and the people who bought lose money. The person has pumped up the prices and then dumped their shares in time and keeps the money they got.
92
What is the CAN-SPAM law and is it effective?
a law that allows unsolicited marketing email but requires such email to have an unsubscribe mechanism. Religious and political messages are exempt, as are companies having an existing relationship with a person. This law is not effective.
93
What is cryptography?
involves converting a message into an unreadable form (encryption), and converting that message back into a readable form (decryption), using secret conversion techniques that only the sender and intended receiver known.
94
What is symmetric-key cryptography?
The sender and the receiver use the same key for encryption and decryption.
95
What is public key cryptography?
A form of cryptography that uses two keys: a public key the sender uses to create encrypted messages, and a mathematically-related private key that the receiver can use to decrypt messages encrypted by that public key. Essentially if you want people to send you messages, you give out your public key. Someone uses your public key to send you a message. You're the only one who has your private key, so you're the only one that can decrypt it.
96
What is PGP?
The most commonly used encryption program for email that allows you to use public key encryption on your emails and etc. (Pretty Good Privacy)
97
What is a key?
A number or text string used to encrypt or decrypt messages.
98
What is distributed DoS (aka DDoS)?
A DoS attack that uses multiple (distributed) computers. DoS attacks are commonly accomplished with multiple computers part of a botnet that are infected to simultaneously access the target website.
99
What is hacktivism?
the use of computer networks to promote a social or political cause.
100
What is offshoring?
a type of outsourcing where the work is moved overseas in foreign countries where labor is cheaper.
101
What is outsourcing?
a common business term referring to company A using company B to do work that might otherwise have been done by the company A's employees.
102
What is crowdsourcing?
getting work done via a community of web users. It usually relies on free contributions by the crowd.
103
What are the advantages to crowdsourcing?
lower cost, scale (the more users, the more work that can be done), and quality (crowdsourced products could potentially be higher quality due to having many people working on it).
104
What are the top three examples of crowdsourcing?
Wikipedia, Yelp/TripAdvisor, and Kickstarter
105
What is crowdfunding?
a type of crowdsourcing where you ask for help and hope the crowd donates a little bit.
106
What is E-commerce?
The conducting of business transactions on the web.
107
What are the three common categories of e-commerce?
B2C (Business-to-consumer), C2C (Consumer-to-consumer), and B2B (Business-to-business).
108
What is B2C (Business-to-consumer)?
A company, like Amazon, sells goods/services directly to people.
109
What is likely the best-known e-commerce category?
B2C (Business-to-consumer)
110
What is C2C (Consumer-to-consumer)?
A company, like eBay, enables people to sell goods/services to each other.
111
What is likely the second best-known e-commerce category?
C2C (Consumer-to-consumer)
112
What is B2B (Business-to-business)?
A business sells goods/services to another business.
113
When was Amazon, one of the best-known B2C e-commerce companies, started?
2004, formerly a simple online book seller.
114
When was eBay, one of the best-known C2C e-commerce companies, started?
1995, to mainly support online auctioning of used goods, but today selling new and used items in auction or non-auction format.
115
What is Alibaba?
A large Chinese e-commerce company that started as B2B in 1999 to connect manufacturers with overseas buyers, then introduced C2C similar to eBay, adn B2C similar to Amazon.
116
What is Ergonomics?
The science of designing things for easy safe use by people. Essentially the design and study of how people interact with their work place environment and what the health implications are.
117
What is the most common ergonomic injury?
Carpal tunnel syndrome
118
What is carpal tunnel syndrome?
when a nerve in the wrist becomes compressed, causing pain, numbness, and tingling in the hand, arm, or shoulder. Can be caused by repetitive typing.