1 / 0

THIS

THIS. IS. JEPARTY. Your. With. Host. LOIS. Social and Ethical Issues. Intrusion. Network Vocab pt. 2. Means of Protection. Network Vocab. Types of Networks. 100. 100. 100. 100. 100. 100. 200. 200. 200. 200. 200. 200. 300. 300. 300. 300. 300. 300. 400. 400. 400.

rigg
Download Presentation

THIS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. THIS

    IS JEPARTY
  2. Your

    With

    Host... LOIS
  3. Social and Ethical Issues Intrusion Network Vocab pt. 2 Means of Protection Network Vocab Types of Networks 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500
  4. What is a client? A 100
  5. an application or system that accesses a remote service on another computer system, known as a server, by way of a network. A 100
  6. What is a server? A 200
  7. a computer that provides client stations with access to files and printers as shared resources to a computer network A 200
  8. What is a Sysadmin? A 300
  9. a person employed to maintain and operate a computer system and/or network. A 300
  10. What does U.P.S stand for? A 400
  11. An uninterruptible power supply A 400
  12. What does E.D.I stand for? A 500
  13. Electronic Data Interchange A 500
  14. What is a LAN network? B 100
  15. a local computer network for communication between computers, normally within the same building B 100
  16. What is a WAN network? B 200
  17. A network that includes computers spread across a large geographical distance, usually involving several cities, states or countries. B 200
  18. What is an Intranet? B 300
  19. A private website or portal, secured or password-protected, specifically designed for workers in an organization to conduct internal business. B 300
  20. What is the internet? B 400
  21. a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide B 400
  22. What type of network is used at KHS? B 500
  23. A LAN network B 500
  24. Logging into a network allows what social and ethical issue to take place? C 100
  25. What is Authenticity? C 100
  26. What social and ethical issue is presented if a hacker obtains confidential information from an unprotected network? C 200
  27. What is Security? C 200
  28. Many people argue that the ability to monitor users on a specific network is abusing this social and ethical issue… C 300
  29. What is Privacy and Anonymity? C 300
  30. DAILY DOUBLE DAILY DOUBLE Place A Wager C 400
  31. Any dramatic event anywhere in the world can be broadcasted almost instantly over the Internet, which social and ethical issue does this implement? C 400
  32. What is Globalization and cultural diversity C 400
  33. Communication protocols on a network such as the Internet implements which social and ethical issue? C 500
  34. What is Policies and Standards? C 500
  35. A firewall is designed to do what? D 100
  36. What is block unauthorized access? D 100
  37. What is a virus? D 200
  38. computer program that can copy itself and infect a computer D 200
  39. a programmer who breaks into computer systems in order to steal or change or destroy information D 300
  40. What is a Hacker? D 300
  41. the hacking of the telecommunication systems D 400
  42. What is “phreaking”? D 400
  43. Features that control access to shared resources D 500
  44. What is Access Permissions? D 500
  45. What is the Ethernet? E 100
  46. family of frame-based computer networking technologies for local area networks E 100
  47. What is “login”? E 200
  48. the process by which individual access to a computer system is controlled by identification of the user using credentials provided by the user. E 200
  49. a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource E 300
  50. What is passwords? E 300
  51. Commercial activity conducted via the Internet E 400
  52. What is e-commerce? E 400
  53. the activity of converting data or information into code E 500
  54. What is Encryption? E 500
  55. What is “SSL”? F 100
  56. Secure Sockets Layer: cryptographic protocols which provide secure communications on the Internet F 100
  57. To encryp something is to… F 200
  58. Put information into secure coding to protect from unauthorized access F 200
  59. What is the point of a password? F 300
  60. To authenticate and prove identity of a network user F 300
  61. What is the point of a firewall? F 400
  62. What is block unauthorized access? F 400
  63. Restricted access to the network is a type of what? F 500
  64. What is a type of security measure? F 500
  65. The Final Jeopardy Category is: The Bumps on a Log Click on screen to begin
  66. Who is the Head BUMP? Click on screen to continue
  67. The one and only lovable LOIS Click on screen to continue
  68. Thank You for Playing Jeopardy with the BUMPS ON A LOG ! Game Designed By C. Harr-MAIT
More Related