Jeopardy! Social and Ethical Issues in Networking with Host Lois
DESCRIPTION
Join host Lois for an engaging game of Jeopardy! focused on Social and Ethical Issues in Networking. Test your knowledge on various topics, including network vocabulary, types of networks, intrusion methods, and means of protection. Compete with fellow participants as you answer questions ranging from basic to advanced levels. This interactive session will enhance your understanding of crucial network concepts while having fun. Are you ready to challenge yourself and others in this exciting game of knowledge?
1 / 0
Télécharger la présentation
Jeopardy! Social and Ethical Issues in Networking with Host Lois
An Image/Link below is provided (as is) to download presentation
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.
Content is provided to you AS IS for your information and personal use only.
Download presentation by click this link.
While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
During download, if you can't get a presentation, the file might be deleted by the publisher.
E N D
Presentation Transcript
-
THIS
IS JEPARTY - Your
With
Host... LOIS - Social and Ethical Issues Intrusion Network Vocab pt. 2 Means of Protection Network Vocab Types of Networks 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500
- What is a client? A 100
- an application or system that accesses a remote service on another computer system, known as a server, by way of a network. A 100
- What is a server? A 200
- a computer that provides client stations with access to files and printers as shared resources to a computer network A 200
- What is a Sysadmin? A 300
- a person employed to maintain and operate a computer system and/or network. A 300
- What does U.P.S stand for? A 400
- An uninterruptible power supply A 400
- What does E.D.I stand for? A 500
- Electronic Data Interchange A 500
- What is a LAN network? B 100
- a local computer network for communication between computers, normally within the same building B 100
- What is a WAN network? B 200
- A network that includes computers spread across a large geographical distance, usually involving several cities, states or countries. B 200
- What is an Intranet? B 300
- A private website or portal, secured or password-protected, specifically designed for workers in an organization to conduct internal business. B 300
- What is the internet? B 400
- a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide B 400
- What type of network is used at KHS? B 500
- A LAN network B 500
- Logging into a network allows what social and ethical issue to take place? C 100
- What is Authenticity? C 100
- What social and ethical issue is presented if a hacker obtains confidential information from an unprotected network? C 200
- What is Security? C 200
- Many people argue that the ability to monitor users on a specific network is abusing this social and ethical issue… C 300
- What is Privacy and Anonymity? C 300
- DAILY DOUBLE DAILY DOUBLE Place A Wager C 400
- Any dramatic event anywhere in the world can be broadcasted almost instantly over the Internet, which social and ethical issue does this implement? C 400
- What is Globalization and cultural diversity C 400
- Communication protocols on a network such as the Internet implements which social and ethical issue? C 500
- What is Policies and Standards? C 500
- A firewall is designed to do what? D 100
- What is block unauthorized access? D 100
- What is a virus? D 200
- computer program that can copy itself and infect a computer D 200
- a programmer who breaks into computer systems in order to steal or change or destroy information D 300
- What is a Hacker? D 300
- the hacking of the telecommunication systems D 400
- What is “phreaking”? D 400
- Features that control access to shared resources D 500
- What is Access Permissions? D 500
- What is the Ethernet? E 100
- family of frame-based computer networking technologies for local area networks E 100
- What is “login”? E 200
- the process by which individual access to a computer system is controlled by identification of the user using credentials provided by the user. E 200
- a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource E 300
- What is passwords? E 300
- Commercial activity conducted via the Internet E 400
- What is e-commerce? E 400
- the activity of converting data or information into code E 500
- What is Encryption? E 500
- What is “SSL”? F 100
- Secure Sockets Layer: cryptographic protocols which provide secure communications on the Internet F 100
- To encryp something is to… F 200
- Put information into secure coding to protect from unauthorized access F 200
- What is the point of a password? F 300
- To authenticate and prove identity of a network user F 300
- What is the point of a firewall? F 400
- What is block unauthorized access? F 400
- Restricted access to the network is a type of what? F 500
- What is a type of security measure? F 500
- The Final Jeopardy Category is: The Bumps on a Log Click on screen to begin
- Who is the Head BUMP? Click on screen to continue
- The one and only lovable LOIS Click on screen to continue
- Thank You for Playing Jeopardy with the BUMPS ON A LOG ! Game Designed By C. Harr-MAIT
More Related