ISTM 210- Phinney Exam 3 HTML

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/265

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

266 Terms

1
New cards

What is HTML?

the language you use to create a web site

2
New cards

What is HTML an acronym for?

hypertext markup language

3
New cards

What is an HTML document?

a file that contains your website content and HTML formatting instructions

4
New cards

What is an HTML tag?

specifies the formatting and presentation of information on a web site

5
New cards

What are HTML tags used for?

to identify elements of an HTML document

6
New cards

What are fundamental components of the document's structure?

elements

7
New cards

Example of an element?

head, title, paragraphs, list, tables

8
New cards

What do HTML tags consist of?

9
New cards

What do tags come in?

pairs

10
New cards

Every HTML document should contain?

certain standard HTML tags

11
New cards

heading tag, where n is replaced with number 1-6

12
New cards

How many header sizes are there?

6

13
New cards

What is the largest size header?

1

14
New cards

What is smallest size header?

6

15
New cards

paragraph

16
New cards

unordered list (bullets)

17
New cards

ordered list (numbers)

18
New cards

  • list item

    19
    New cards


    hard line break

    20
    New cards


    horizontal rule

    21
    New cards

    anchor tag

    22
    New cards

    What is the purpose of an anchor tag?

    to link to other documents

    23
    New cards

    What replaces the file name in Text ?

    the path and filename of the target document

    24
    New cards

    What replaces the text in Text ?

    the text to serve as the hyperlink in the document

    25
    New cards

    How do you specify email address in href attribute?

    replace "http://" with "mailto:"

    26
    New cards

    What tag do you use to make your background an image?

    (replace filename with the name of the background image)

    27
    New cards

    What tag do you use to add a picture?

    28
    New cards

    What is different about the img tag?

    it does not have a beginning and ending tag

    29
    New cards

    What are the attributes for the tag

    src="filename"

    border="size"

    align="position"

    width="size"

    height="size"

    30
    New cards

    What does the src= do?

    when inserting an image, it allows you to specify the filename of the image

    31
    New cards

    What does border= do when it comes to inserting images?

    specifies if the border is included in the picture

    32
    New cards

    What does align= do when it comes to inserting images?

    specifies the alignment of the of the picture

    33
    New cards

    What does width= do when it comes to inserting images?

    specifies the width of the picture in percent or pixels

    34
    New cards

    What does height= do when it comes to inserting images?

    specify the height of the picture in percent or pixels

    35
    New cards

    What tags insert a table?

    must define beginning and end of table

    36
    New cards

    What two tags are used in inserting data into the table?

    defines each row in table

    defines each cell in row

    37
    New cards

    What does border= do when it comes to creating a table?

    specifies a border for the table

    38
    New cards

    What does border size 0 mean?

    no border

    39
    New cards

    What country was attacked (cyber warfare)?

    Estonia

    40
    New cards

    What are DOS attacks?

    denial of service

    mess up websites to where they can't be used

    41
    New cards

    Whose websites were attacked in the Estonia hack?

    government, banks, schools in Estonia

    42
    New cards

    What are bot nets?

    computers that are set up with malicious software to bombard or overload websites

    43
    New cards

    Security issues aren't a matter of ___ but ___

    if, when

    44
    New cards

    What is computer security?

    concerned with risk management, confidentiality, integrity, and the availability of electronic information that is processed and stored in a computing system

    45
    New cards

    What is risk management?

    the recognition, consequences, and assessment of risk to a computer system

    46
    New cards

    What is Phinney's definition of risk management?

    managing the risks of something happnening

    47
    New cards

    What are hackers?

    people who attempt to invade or disable a computer's security measures and steal their resources, disrupt computer systems

    48
    New cards

    What is another word for hackers?

    hacktivist

    49
    New cards

    What is a hacktivist?

    disrupt system of something they don't like

    50
    New cards

    Why do hackers hack?

    it's a challenge, sometimes money is involved

    51
    New cards

    What do businesses do to take advantage of the Internet?

    set up Intranets

    52
    New cards

    What is the key aspect of an Intranet?

    privacy

    53
    New cards

    What are Intranets guarded by?

    firewalls, hardware, and software that keep unauthorized users out

    54
    New cards

    What are firewalls?

    specialized hardware and software that work together to ensure that only authorized personnel and employees within a business can use its Intranet

    55
    New cards

    What are computer viruses?

    files that reproduce by making copies of themselves within a computer's memory, storage, or network

    56
    New cards

    What are computer viruses also known as?

    metamorphic viruses

    57
    New cards

    What is the goal of experimental malware?

    to combat malware, not pranks or vandalism

    58
    New cards

    What are worms?

    like viruses but of not need to attach itself to an existing file to spread

    59
    New cards

    How do worms work?

    send copies of themselves to other parts of the network without user knowledge or intervention

    60
    New cards

    How do worms harm the computer system?

    by slowing down system's performance, erasing files, and damaging physical hardware

    61
    New cards

    How do trojan horses work?

    they seem harmless and wait for a computer event (particular action or date) to spread and unleash malware

    62
    New cards

    What is a proxy server?

    special security computer that communications in or out of an Intranet pass through as a precaution to protect from any external threats

    63
    New cards

    What is the default deny rule?

    standard security practices set in that inly network connections that are permitted are the ones that have been explicitly allowed

    64
    New cards

    What is the default allow rule?

    all traffic is allowed unless it has been specifically blocked

    65
    New cards

    What is ransomware?

    disrupts things and holds you for ransom

    66
    New cards

    What kind of business did Phinney say experienced ransomware?

    a hospital

    67
    New cards

    What happened to the hospital?

    they were hacked and had to pay ransom to get data back

    they were disrupted for a whole, doctors couldn't get to records

    68
    New cards

    What would have happened if the hospital had a backup plan?

    they wouldn't have had to pay the ransom

    69
    New cards

    What is the most common way bad stuff gets into the system?

    email

    70
    New cards

    Who is the weakest link in business security?

    employees

    71
    New cards

    What should you assume about all emails?

    all emails are guilty (bad) until proven innocent

    72
    New cards

    What should you do if an email is suspicious?

    forward it to the help desk

    73
    New cards

    What university's employees are more educated about security and have an incredible IT staff?

    TAMU

    74
    New cards

    Who plays an important role in protection?

    people, employees should be aware of what's going on

    75
    New cards

    What is spyware?

    a computer program installed covertly and secretly monitors a user's keystrokes and behavior

    watches what you're doing on the computer

    76
    New cards

    What is adware?

    more irritating than malicious, usually installed covertly and automatically display or download advertising to a computer

    77
    New cards

    What is adware's formal name?

    advertising-supported software

    78
    New cards

    What is spamming or junk mail?

    the abuse of an email sustain to arbitrarily send typically millions on unsolicited bulk messages

    79
    New cards

    What is a DOS?

    denial of service attack, attempts to make a compute for any of its resources unavailable to its users

    80
    New cards

    What is keylogging?

    when a user sings into a computer work station where a malicious software covertly records its keystrokes

    81
    New cards

    What is keylogging a part of?

    spyware

    82
    New cards

    What is the goal of antivirus software?

    attempts to identify, prevent, and eliminate computer viruses and malware

    examines computer files and matches them to known viruses stored in database

    83
    New cards

    What are two of the more popular antivirus softwares?

    Symantics Corporation's Norton Antivirus

    McAfee's VirusScan

    84
    New cards

    What are system patches?

    online updates that protect their user's operating systems

    85
    New cards

    Does the Cloud eliminate the need to back up files?

    Cloud backs it up for you, but not everything is on the Cloud

    86
    New cards

    What is a strong password?

    longer in length than ordinary passwords

    87
    New cards

    What is a passphrase?

    a memorable strong password

    88
    New cards

    What is internet fraud?

    a broad term that refers to any fraudulent activity that occurs in an online setting

    89
    New cards

    What is identity theft?

    the crime of assuming another's identity for economic gain

    90
    New cards

    What is click fraud?

    a program that automatically clicks on advertising networks ads, typically randomly, for profit

    fakes how many clicks on an ad you have

    91
    New cards

    What are purchase scams?

    simply when an unscrupulous merchant does not deliver goods or services already paid for online

    92
    New cards

    What is phishing?

    a legitimate looking, socially engineered email attempting to deceptively gain private information

    93
    New cards

    What does the term socially engineered mean?

    they know enough about you to mislead you

    94
    New cards

    What is privacy?

    the ability of an individual to keep their personal information out of public view

    95
    New cards

    What is computer privacy?

    an expectation of remaining anonymous while using a computer system or network

    96
    New cards

    What are tracking cookies?

    typically text files on a client computer that users are typically unaware of that keeps track of that user's information

    97
    New cards

    What is data mining?

    when experts extract useful information from recorded data, like a cookie

    98
    New cards

    What's the difference between privacy and confidentiality?

    privacy is personal info, about people

    confidentiality is corporate, about company info

    99
    New cards

    What's the saying to remember the difference between privacy and confidentiality?

    p & c per me

    100
    New cards

    What is the long definition of identity theft?

    a crime concerning the unlawful practice of assuming another individual's identity