What does ARPANET stand for?, Advanced research project agency network, Adam's Research of Paradoxes, Anomalies, Nullifications and Extraterrestrial Talent, Who controls the internet?, The Government, Google, Many independent operators, Jeff Bazos, 8 bits strung together =, Byte, Megabyte, Kilobyte, 1024 Bytes =, Byte, Megabyte, Kilobyte, 1024 kilobytes =, Byte, Megabyte, Kilobyte, What is bandwidth?, The distance a signal can travel, A rubber band, Bitrate, What does URL stand for?, Uniform Resource Locator, Unibrow reality longator, What does HTTP stand for?, Hypertext Transfer Protocol, e, What is HTTP?, Language used to communicate through servers, I'm so tired, What does HTML stand for?, Hypertext Markup Language, The end is never The end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is never, What are cookies?, HTTP cookies are small blocks of data placed on a user's device during a session, Tasty, What are Secure Sockets Layer (SSL) and Transport Layer Security (TLS)?, The SSL and TLS protocols enable two parties to identify and authenticate each other and communicate with confidentiality and data integrity, Please I'm so tired of typing, How do you know that SSL and TLS are active?, If you see a lock sign, I feel so braindead I can't think of creative alternate answers, What is a virus (sorry, I know we’re all sick of hearing about viruses!)?, A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code, ., What does DDOS stand for?, Denial-of-service attack, ., What is a DDOS?, a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users, ., What is a phishing scam?, a fraudulent message designed to trick a person into revealing sensitive information to the attacker, A phish related scam, 90% of the time a system gets hacked because of what?, Phishing attacks, E, What 4 steps can you take to avoid getting hacked?, Strong passwords, check for authentic web addresses, Install security updates, Don’t insta things you don’t trust, Bring a Phishing rod, bring bait bait, catch and release, avoid Phish police, , It approaches rapidly, ⑄, Start running., You can't run ≻ʘ), ⏧.
0%
Comp Sci thing
Zdieľať
Zdieľať
Zdieľať
vytvoril(a)
Amarchesani97
CTE
CS
Upraviť obsah
Tlač
Vložiť
Viac
Úlohy
Rebríček
Zobraziť viac
Zobraziť menej
Tento rebríček je v súčasnosti súkromný. Kliknite na
Share
, aby bol verejný.
Tento rebríček bol vypnutý vlastníkom prostriedku.
Tento rebríček je vypnutý, pretože vaše možnosti sa líšia od možností vlastníka prostriedku.
Vrátiť možnosti
Televízny kvíz
je šablóna s možnosťou rozšírenia. Nevytvára skóre pre rebríček.
Vyžaduje sa prihlásenie
Vizuálny štýl
Písma
Vyžaduje sa predplatné
Možnosti
Prepnúť šablónu
Zobraziť všetky
Pri prehrávaní aktivity sa zobrazia ďalšie formáty.
)
Otvorené výsledky
Kopírovať odkaz
QR kód
Odstrániť
Obnoviť automaticky uložené:
?