Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Baran: Internet

        Help!  

Question
Answer
Command and Control Version   The net is a product of the Cold War; internet was initially built to protect national security in the face of nuclear attack  
🗑
The global network of innterconnected computers that communicate freely and share and exchange information is called   Internet  
🗑
The "Father of the Computer" was   Charles Babbage; englishman (1836) produced designs for a "computer" that could conduct algebraic computations using stored memory and punch cards for input and output  
🗑
The first electronic digital computer was....... and was developed by the British during WWII to help break the German's secret code   Colossus  
🗑
Computers that reduce information to a code made up of the digits 1 and 0 for storage and manipulation are said to use a..... code   Binary  
🗑
The first "full service" electronic computer..... was based on the work of Iowa State university's John V. Atanasoff and introduced by scientisits John Mauchly and John Presper Eckert of the University of Pennsylvania in 1946   ENIAC  
🗑
The first succesful commercial computer, used by the Census Bureau in 1951 was   UNIVAC  
🗑
In 1962...... of the Rand Corporation proposed a packet-switching system that would allow the military to maintain command over its missiles and planes in the event of a nuclear attack. It is the basis of what we know today as the Internet.   Paul Baran  
🗑
Computers that link individual personal computer users to the Internet are called   hosts  
🗑
The development of the ......... (with its small size, absence of heat, and low cost) made personal computers possible   semiconductor  
🗑
The Apple II personal computer was developed by   Steve Jobs and Steohen Wonzniak  
🗑
The "networks of networks" consisting of LANs (Local Area Networks-- networks connetcing to or more computers, usually within the same building) and WANs (Wide Area Networks-- networks that connect several LANs in different loctions) is called me   Internet  
🗑
Websites that function as online communities of users are called   Social Networking sites  
🗑
A ...... is a personal Web Journal that comments on the news and provides links to stories that back up the commentary with evidence   Blog  
🗑
The most well know and arguably more effective..... web sit is MoveOn.org   activist  
🗑
The abailabilty of trustworthy ...... -- coding and decoding--- technologies that make online use of credit and bank card numbers, addresses, social security numbers, and other sensitive information safer for both seller and buyer has made Int. a Bus. plc   encryption  
🗑
Proponents of Internet freedom see its..... as providing protection for unpopular expression; proponents of greater Internet control see it as the Internets greatest danger   anonymity  
🗑
According to long-time New York columnist AJ Liebling, freedom of the press is guaranteed to   Those who own the presses  
🗑
According to MArshall McLuhan, the computer is an extension of our....   central nervous system  
🗑
McLuhan's idea that new communication technologies will permit people to become increasingly involved in one anothers lives is his concept of....   Uniform Resource Locator (URL)  
🗑
The widening disparity between the communication technology haves and have-nots is referred to as   the technology gap  
🗑
The lack of technological access among people of color, the poor, the disabled, and those living in rural areas is called the...   Digital Divide  
🗑
Time Bernes- Lee developed the hypertext transfer protocol (HTTP)   True  
🗑
When people go online, the click streams they leave provide them with privacy protection   False  
🗑
There is little doubt that municipal WI-FI is a fundamental right that should be available to all citizens   False  
🗑
Operating Systems   part of BIll Gates and Paul Allen; software that tells the computer how to work, people no longer had to know sophisticated operating languages to use computers  
🗑
ISPs   Internet Service Providers, companies that offer Internet connections at monthly rates depending on the kind and amount of access needed  
🗑
What is the heart of the web?   protocolos that defines its use-- the World Wide Web uses hypertext transfer protocols (HTTP) to transport files from one place to another  
🗑
Search Engines   software that allows users to navigate the Net simply by entering a search word and point and clicking at the results  
🗑
How is the Internet's "audience" different than other mediums?   Internet has users, not audience-- can be viewing and creating content at the same time  
🗑
Why is technology a double-edged sword?   technology alone cannot create new worlds or ways of seeing them; we use tech. to do these things; the power resides in us to either use it for good or bad  
🗑
Global Village   McLuhan; the idea that the new communication technologies will permit people to become increasingly involved in one another lives  
🗑
What is one major concern with the Internet and Porn?   protecting children; therefore government in-placed filters in schools  
🗑
What does privacy mean in today's internet world?   the right to maintain control over own own data  
🗑
Every online act leaves a "digital trail" making possible easy.... or the massive collection of and distillation of consumer data   dataveillance  
🗑
1974 Federal Privacy Act   restricting governments' ability to collect and distribute information about citizens  
🗑
Information Gap   those without the requisite technology will have diminished access to the information it makes available-- they will suffer from a form of technologically imposed censorship  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: eroberts093