Question
click below
click below
Question
Normal Size Small Size show me how
Baran: Internet
Question | Answer |
---|---|
Command and Control Version | The net is a product of the Cold War; internet was initially built to protect national security in the face of nuclear attack |
The global network of innterconnected computers that communicate freely and share and exchange information is called | Internet |
The "Father of the Computer" was | Charles Babbage; englishman (1836) produced designs for a "computer" that could conduct algebraic computations using stored memory and punch cards for input and output |
The first electronic digital computer was....... and was developed by the British during WWII to help break the German's secret code | Colossus |
Computers that reduce information to a code made up of the digits 1 and 0 for storage and manipulation are said to use a..... code | Binary |
The first "full service" electronic computer..... was based on the work of Iowa State university's John V. Atanasoff and introduced by scientisits John Mauchly and John Presper Eckert of the University of Pennsylvania in 1946 | ENIAC |
The first succesful commercial computer, used by the Census Bureau in 1951 was | UNIVAC |
In 1962...... of the Rand Corporation proposed a packet-switching system that would allow the military to maintain command over its missiles and planes in the event of a nuclear attack. It is the basis of what we know today as the Internet. | Paul Baran |
Computers that link individual personal computer users to the Internet are called | hosts |
The development of the ......... (with its small size, absence of heat, and low cost) made personal computers possible | semiconductor |
The Apple II personal computer was developed by | Steve Jobs and Steohen Wonzniak |
The "networks of networks" consisting of LANs (Local Area Networks-- networks connetcing to or more computers, usually within the same building) and WANs (Wide Area Networks-- networks that connect several LANs in different loctions) is called me | Internet |
Websites that function as online communities of users are called | Social Networking sites |
A ...... is a personal Web Journal that comments on the news and provides links to stories that back up the commentary with evidence | Blog |
The most well know and arguably more effective..... web sit is MoveOn.org | activist |
The abailabilty of trustworthy ...... -- coding and decoding--- technologies that make online use of credit and bank card numbers, addresses, social security numbers, and other sensitive information safer for both seller and buyer has made Int. a Bus. plc | encryption |
Proponents of Internet freedom see its..... as providing protection for unpopular expression; proponents of greater Internet control see it as the Internets greatest danger | anonymity |
According to long-time New York columnist AJ Liebling, freedom of the press is guaranteed to | Those who own the presses |
According to MArshall McLuhan, the computer is an extension of our.... | central nervous system |
McLuhan's idea that new communication technologies will permit people to become increasingly involved in one anothers lives is his concept of.... | Uniform Resource Locator (URL) |
The widening disparity between the communication technology haves and have-nots is referred to as | the technology gap |
The lack of technological access among people of color, the poor, the disabled, and those living in rural areas is called the... | Digital Divide |
Time Bernes- Lee developed the hypertext transfer protocol (HTTP) | True |
When people go online, the click streams they leave provide them with privacy protection | False |
There is little doubt that municipal WI-FI is a fundamental right that should be available to all citizens | False |
Operating Systems | part of BIll Gates and Paul Allen; software that tells the computer how to work, people no longer had to know sophisticated operating languages to use computers |
ISPs | Internet Service Providers, companies that offer Internet connections at monthly rates depending on the kind and amount of access needed |
What is the heart of the web? | protocolos that defines its use-- the World Wide Web uses hypertext transfer protocols (HTTP) to transport files from one place to another |
Search Engines | software that allows users to navigate the Net simply by entering a search word and point and clicking at the results |
How is the Internet's "audience" different than other mediums? | Internet has users, not audience-- can be viewing and creating content at the same time |
Why is technology a double-edged sword? | technology alone cannot create new worlds or ways of seeing them; we use tech. to do these things; the power resides in us to either use it for good or bad |
Global Village | McLuhan; the idea that the new communication technologies will permit people to become increasingly involved in one another lives |
What is one major concern with the Internet and Porn? | protecting children; therefore government in-placed filters in schools |
What does privacy mean in today's internet world? | the right to maintain control over own own data |
Every online act leaves a "digital trail" making possible easy.... or the massive collection of and distillation of consumer data | dataveillance |
1974 Federal Privacy Act | restricting governments' ability to collect and distribute information about citizens |
Information Gap | those without the requisite technology will have diminished access to the information it makes available-- they will suffer from a form of technologically imposed censorship |