What does ARPANET stand for?, Advanced research project agency network, Adam's Research of Paradoxes, Anomalies, Nullifications and Extraterrestrial Talent, Who controls the internet?, The Government, Google, Many independent operators, Jeff Bazos, 8 bits strung together =, Byte, Megabyte, Kilobyte, 1024 Bytes =, Byte, Megabyte, Kilobyte, 1024 kilobytes =, Byte, Megabyte, Kilobyte, What is bandwidth?, The distance a signal can travel, A rubber band, Bitrate, What does URL stand for?, Uniform Resource Locator, Unibrow reality longator, What does HTTP stand for?, Hypertext Transfer Protocol, e, What is HTTP?, Language used to communicate through servers, I'm so tired, What does HTML stand for?, Hypertext Markup Language, The end is never The end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is never, What are cookies?, HTTP cookies are small blocks of data placed on a user's device during a session, Tasty, What are Secure Sockets Layer (SSL) and Transport Layer Security (TLS)?, The SSL and TLS protocols enable two parties to identify and authenticate each other and communicate with confidentiality and data integrity, Please I'm so tired of typing, How do you know that SSL and TLS are active?, If you see a lock sign, I feel so braindead I can't think of creative alternate answers, What is a virus (sorry, I know we’re all sick of hearing about viruses!)?, A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code, ., What does DDOS stand for?, Denial-of-service attack, ., What is a DDOS?, a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users, ., What is a phishing scam?, a fraudulent message designed to trick a person into revealing sensitive information to the attacker, A phish related scam, 90% of the time a system gets hacked because of what?, Phishing attacks, E, What 4 steps can you take to avoid getting hacked?, Strong passwords, check for authentic web addresses, Install security updates, Don’t insta things you don’t trust, Bring a Phishing rod, bring bait bait, catch and release, avoid Phish police, , It approaches rapidly, ⑄, Start running., You can't run ≻ʘ), ⏧.
0%
Comp Sci thing
Del
Del
Del
af
Amarchesani97
CTE
CS
Rediger indhold
Trykke
Integrere
Mere
Tildelinger
Rangliste
Vis mere
Vis mindre
Denne rangliste er i øjeblikket privat. Klik på
Del
for at gøre det offentligt.
Denne rangliste er deaktiveret af ressourceejeren.
Denne rangliste er deaktiveret, da dine muligheder er forskellige fra ressourceejerens.
Indstillinger for gendannelse
Gameshow quiz
er en åben skabelon. Det genererer ikke resultater for en rangliste.
Log ind påkrævet
Visuel stil
Skrifttyper
Kræver abonnement
Indstillinger
Skift skabelon
Vis alle
Der vises flere formater, mens du afspiller aktiviteten.
)
Åbne resultater
Kopiér link
QR-kode
Slette
Gendan automatisk gemt:
?