What does ARPANET stand for?, Advanced research project agency network, Adam's Research of Paradoxes, Anomalies, Nullifications and Extraterrestrial Talent, Who controls the internet?, The Government, Google, Many independent operators, Jeff Bazos, 8 bits strung together =, Byte, Megabyte, Kilobyte, 1024 Bytes =, Byte, Megabyte, Kilobyte, 1024 kilobytes =, Byte, Megabyte, Kilobyte, What is bandwidth?, The distance a signal can travel, A rubber band, Bitrate, What does URL stand for?, Uniform Resource Locator, Unibrow reality longator, What does HTTP stand for?, Hypertext Transfer Protocol, e, What is HTTP?, Language used to communicate through servers, I'm so tired, What does HTML stand for?, Hypertext Markup Language, The end is never The end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is neverThe end is never, What are cookies?, HTTP cookies are small blocks of data placed on a user's device during a session, Tasty, What are Secure Sockets Layer (SSL) and Transport Layer Security (TLS)?, The SSL and TLS protocols enable two parties to identify and authenticate each other and communicate with confidentiality and data integrity, Please I'm so tired of typing, How do you know that SSL and TLS are active?, If you see a lock sign, I feel so braindead I can't think of creative alternate answers, What is a virus (sorry, I know we’re all sick of hearing about viruses!)?, A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code, ., What does DDOS stand for?, Denial-of-service attack, ., What is a DDOS?, a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users, ., What is a phishing scam?, a fraudulent message designed to trick a person into revealing sensitive information to the attacker, A phish related scam, 90% of the time a system gets hacked because of what?, Phishing attacks, E, What 4 steps can you take to avoid getting hacked?, Strong passwords, check for authentic web addresses, Install security updates, Don’t insta things you don’t trust, Bring a Phishing rod, bring bait bait, catch and release, avoid Phish police, , It approaches rapidly, ⑄, Start running., You can't run ≻ʘ), ⏧.
0%
Comp Sci thing
Ibahagi
Ibahagi
Ibahagi
ni
Amarchesani97
CTE
CS
I-edit ang Nilalaman
I-print
Naka-embed
Higit pa
Mga Assignment
Leaderboard
Magpakita pa
Huwag gaanong magpakita
Ang leaderboard na ito ay kasalukuyang pribado. I-click ang
ibahagi
upang gawin itong pampubliko.
Ang leaderboard na ito ay hindi pinagana ng may-ari ng aktibidad.
Hindi pinagana ang leaderboard na ito dahil ang iyong mga pagpipilian ay naiiba sa may-ari ng aktibidad..
Ibalik ang Opsyon
Gameshow na Pagsusulit
ay isang bukas na template. Hindi ito bumubuo ng mga marka para sa isang leaderboard.
Kailangan maglog-in
Estilo ng visual
Mga Font
Kailangan ang subscription
Mga pagpipilian
Magpalit ng template
Ipakita lahat
Mas marami pang format ang lilitaw habang nilalaro ang aktibidad.
)
Buksan ang mga resulta
Kopyahin ang link
QR code
Tanggalin
Ibalik ng awtomatikong pag-save:
?