Capstone Jeopardy Internet Appendix Chapter 1 Digital Explosion Chapter 2 Naked in the Sunlight Chapter 3 Ghosts in the Machine Chapter 4 Needles in the.

Slides:



Advertisements
Similar presentations
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
Advertisements

Capstone Jeopardy Chapter 5 Secret Bits Chapter 6 Balance Toppled Chapter 7 You Can’t Say That on the Internet Chapter 8 Bits in the Air Chapter 4 Needles.
Chapter 3 Internet. Physical Components of the Internet Servers Networks Routers.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Networking Support In Java Nelson Padua-Perez Chau-Wen Tseng Department of Computer Science University of Maryland, College Park.
COS/PSA 413 Day 17. Agenda Lab 8 write-up grades –3 B’s, 1 C and 1 F –Answer the Questions!!! Capstone progress report 2 overdue Today we will be discussing.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 The Internet, Intranets, and Extranets Chapter 7.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
* The Internet’s genesis - Defense Department project to create a network that could survive a nuclear conflict * The first users - Government agencies.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Forensic and Investigative Accounting
Computer Concepts 2014 Chapter 7 The Web and .
Cisco Discovery Working at a Small-to-Medium Business or ISP CHAPTER 7 ISP Services Jr.
Laudon & Laudon: Canadian Edition
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
What Is the Internet? A network of networks, joining many government, university and private computers together and providing an infrastructure for the.
How Web Servers and the Internet Work by by: Marshall Brainby: Marshall Brain
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
IT Introduction to Information Technology. The Internet & World Wide Web Began in 1969 with the ARPANET (Advanced Research Project Agency Network)
Network Services Networking for Home & Small Business.
CS 1308 Computer Literacy and the Internet. Exam Format  Approximately 120 Total Points  70 Points Multiple Choice  25 Points True or False  10 Points.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Technology vocabulary slides assignment. Application Definition : A program or group of programs designed for end users. Application software can be divided.
Follow the Data Data (and information) move from place to place in computer systems and networks. As it moves it changes form frequently. This story describes.
The System Unit What is the motherboard?  Also called the system board  Main circuit board in the system unit  Contains many electronic components.
Communication, Networks, The internet and the Worldwide Web.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Exam Format  130 Total Points  10 Points Short Answer  15 Points Fill in the Blank  25 Points T/F  60 Points Multiple Choice  20 Points Matching.
IP BROS Presentation by: Amen Ahmed. Mario and Luigi are here to help us find our way through the internet. Mario will act as our browser and Luigi will.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Copyright © 2007 Pearson Education, Inc. Slide 3-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Third Edition.
Marwan Al-Namari Week 5. Responsible for delivering packets between endpoints over multiple links Physical Link Network Transport Application.
Internet Architecture and Governance
The Internet The History and Future of the Internet.
Presented by Rebecca Meinhold But How Does the Internet Work?
TCP/IP (Transmission Control Protocol / Internet Protocol)
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Jeopardy ProtocolsPartsPrograms General Internet HTML Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
Web Server.
Unit 2 - Hardware Networking. What is a network? A computer network is essentially a connection between two or more computers. This connection can be.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Wednesday, August 7 th 2013 By the Improvisors.  An Internet Protocol (IP) address is a protocol rule which contains the address of a digital device.
Revision Unit 1 – The Online World Online Services Online Documents Online Communication Cloud Computing The Internet Internet Infrastructure Internet.
Basics of the Domain Name System (DNS) By : AMMY- DRISS Mohamed Amine KADDARI Zakaria MAHMOUDI Soufiane Oujda Med I University National College of Applied.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
COMPUTER NETWORKS Hwajung Lee. Image Source:
HOW THE INTERNET WORKS. Introduction : The internet has brought revolutionary changes Has become a medium for interaction and information Can access to.
Network Layer 1. OSI network layer  OSI model layer 3  TCP/IP model Internet layer Application Presentation Session Transport Network Data link Physical.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Internet Protocol Version4 (IPv4)
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
1 ** THE INTERNET ** Large, worldwide collection of networks that use a common protocol to communicate with each other A network of networks.
Outline History of Internet Internet Properties TCP/IP IP Address Domain Name Internet Infrastructure Server and Clients 2.
Chapter 5 Network and Transport Layers
Introduction to Technology Infrastructure
Slides taken from: Computer Networking by Kurose and Ross
CS 1308 Exam I Review.
Working at a Small-to-Medium Business or ISP – Chapter 7
Introduction to Technology Infrastructure
Working at a Small-to-Medium Business or ISP – Chapter 7
Chapter 1: Introduction
Topic 5: Communication and the Internet
Working at a Small-to-Medium Business or ISP – Chapter 7
Follow the Data Data (and information) move from place to place in computer systems and networks. As it moves it changes form frequently. This story.
Counting, Conversion & Koans
Presentation transcript:

Capstone Jeopardy Internet Appendix Chapter 1 Digital Explosion Chapter 2 Naked in the Sunlight Chapter 3 Ghosts in the Machine Chapter 4 Needles in the Haystack

Internet Appendix for 10 A postcard is an analogy for what Internet component?

Appendix for 10 Answer: IP packet Why?

Internet Appendix for 20 points How is a URL (e.g, converted to an IP address?

Internet Appendix for 20 Answer: Local DNS, Domain Name Server, contacted if necessary it will ask other DNS servers including.com server.

Internet Appendix for 30 points How does your home computer get assigned an IP address?

Internet Appendix for 30 points Answer: Your Internet Service Provider (ISP) dynamically “leases” your computer an IP address from the block in its domain.

Internet Appendix for 40 points What is at the “core” of the Internet?

Internet Appendix for 40 Answer: Interconnected routers owned by the telecommunication companies and gov’ts that pass along IP packets using the IP protocol.

Internet Appendix for 50 points The Internet hourglass showed 5 layers from application to physical media. From application on down name an example at each layer.

Internet Appendix for 50 Answer: Web Phone SMTP HTTP TCP UDP IP Wire Fiber Radio

Ch. 1 Digital Explosion for 10 points How was Tanya Rider found 8 days after her car crashed into a ravine near Seattle?

Ch. 1 Digital Explosion for 10 points From her last cell-phone ping to the nearest tower. Police could only accessed cell-phone records when they became suspicious of her husband.

Ch. 1 Digital Explosion for 20 points Why is technology neither good nor bad?

Digital Explosion for 30 points What is Moorse’s Law?

Digital Explosion for 30 points Answer: Moorse’s Law: The density of integrated circuits seems to double every couple of years. Leading to exponential growth of main memory sizes and processing power.

Digital Explosion for 40 points Give an example of Koan 3: There Is Want in the Midst of Plenty

Digital Explosion for 40 points Answers Paper Dr. files not accessable via computer Search engine might not find digital file on web Other?

Digital Explosion for 50 points List 5 of the 7 Koans

Digital Explosion for 50 points Answer Koans: 1: It’s all just bits2: Perfection is Normal 3: There is want in the midst of plenty 4: Processing is power 5: More of the same can be a whole new thing 6: Nothing goes away 7: Bits move faster than thought

Naked in the Sunlight for 10 points What’s the difference between a digital “footprint” and digital “fingerprint”?

Naked in the Sunlight for 10 points Answer Footprints – we know we leave Fingerprints – we leave unintentionally

Naked in the Sunlight for 20 points Give a usage of the Radio Frequency Identification Tag (RFID)?

Naked in the Sunlight for 20 points Answer Electronic door key, toll-booth pass, pet or livestock identification, inventory aid, etc.

Naked in the Sunlight for 30 points In Oct. 2007, what did the British national tax agency loose?

Naked in the Sunlight for 30 points Answer Two disk drives containing national insurance numbers and banking information for 40% of all British population.

Naked in the Sunlight for 40 points Given an example of how the Digital Explosion allows us to “Connect the Dots”

Naked in the Sunlight for 40 points Answer MA Group Ins. Commission (GIC) de- identified insurance claims data Enron s

Naked in the Sunlight for 50 points What do the terms “Big Brother” and “Little Brother” refer to with respect to privacy?

Naked in the Sunlight for 50 points Answer Big Brother is the government (“1984”) Little Brother is your neighbor or any individual using the Internet to check up on you.

Ghosts in the Machine for 10 points What type of “metadata” is associated with a word processor document?

Ghosts in the Machine for 20 points How are images stored on the computer?

Ghosts in the Machine for 20 points Answer A sequence of pixels with each pixel consisting of a Red #, Green #, and Blue # (RGB value).

Ghosts in the Machine for 30 points What is “steganography”?

Ghosts in the Machine for 30 points Answer Steganography is the art of sending secret messages in imperceptible ways

Ghosts in the Machine for 40 points If you delete a file and execute an “Empty Trash” command, why might the content’s of the file still be recovered?

Ghosts in the Machine for 40 points Answer Blocks from a deleted file are removed from the Operating Systems file structure and put on the OS’s list of unused disk blocks. This blocks typically contain their “deleted” information until they are overwritten, so the file might be able to be covered.

Ghosts in the Machine for 50 points Why did the Digital Domesday Book last only 15 years not 900 years like the paper version?

Ghosts in the Machine for 50 points Answer The digital format of the specialized 12-inch disks were obsolete and forgotten so Digital Domesday Book could not be read. (eventually was reversed engineered)

Needles in the Haystack for 10 points What make the early Internet more like a library?

Needles in the Haystack for 10 points Answer Universities and Big Businesses mostly posted information which was organized by categories

Needles in the Haystack for 20 points In the following search engine steps, where is the dividing line between the background vs. the foreground steps? 1. Gather information 2.Keep copies 3.Build an index 4.Understand the query 5.Determine the relevance of each possible result to the query 6.Determine the ranking of the relevant results 7.Present the results

Needles in the Haystack for 20 points The dividing line between the background vs. the foreground steps: 1. Gather information 2.Keep copies 3.Build an index 4.Understand the query 5.Determine the relevance of each possible result to the query 6.Determine the ranking of the relevant results 7.Present the results

Needles in the Haystack for 30 points What’s the difference between a sponsored and an “organic” search result?

Needles in the Haystack for 30 points Answer A sponsored search result is pay-for- placement advertisement while an “organic” search result is one found through the search engines normal process

Needles in the Haystack for 40 points Why do search engines track individual search histories?

Needles in the Haystack for 40 points Answer Search engines track an individual’s search history because knowing about you can improve your search quality. USA PATRIOT Act requires search engine provides to provide search history under certain circumstances.

Needles in the Haystack for 50 points What percentage of the Chinese version of Google on 10,000 English test words resulted in censored responses?

Needles in the Haystack for 50 points Answer 9% of the responses were censored