Ovido
Language
  • English
  • Spanish
  • French
  • Portuguese
  • German
  • Italian
  • Dutch
  • Swedish
Text
  • Uppercase

User

  • Log in
  • Create account
  • Upgrade to Premium
Ovido
  • Home
  • Log in
  • Create account

study

The Domain Name System (DNS) has many functions, what is one of them?

Translate Domain names into IP adresses

What is an example of censorship on the internet?

The government filtering search results to limit the access of information and suppress discussion amongst its citizens.

What is one thing that makes our code more readable

Making it so each function only contains one command.

What is untrue about "White Hat Hackers"

They are breaking the law and are at risk of legal repercussions.

What is an example of accounting?

Tracking how long network users spend on Facebook or Instagram

what does TopDown design do to make a problem easier?

it breaks the problem down into smaller parts

what is an example of two factor authentication?

being asked to put in your password after you've already input it once

what level of abstraction is this paragraph? :
"The alarm on my phone started beeping at 8 AM on Saturday morning which made me open my eyes I was still a little tired so I moved my arm out of the covers and pressed the snooze button:

The lowest level of abstraction

how many pixels does Tracy need to move from her starting position to reach the right side of the canvas

Tracy needs to move 200 pixels

what is authentication?

having a network users login with a username and password

what is a valid HTML tag

h1>

True or false, Data sent over the Internet is broken down into several packets and sent over the network

True

is being general in your search query to get as many results as possible a good practice for effective Internet searches

No

True or false a person's digital footprint is public and permanent to anyone

true

is it legal to practice hacking public websites if you are a student learning about cyber security

no it is not legal

True or false, the Internet is a great place to socialize, and because it is completely online, everyone is safe

False

AAA network security is a protocol that stands for what

authorization, authentication, and accounting

if you wanted to tell Tracy to move forward 100 pixels how would you input it in the code

forward(100)

what does a person's digital footprint consist of

comment to leave, pictures you post, topics you search, apps you use, music you download, and emails you sent

if I wanted to tell Tracy to move forward 100 pixels without making a line how would you write the code

penup()
forward(100)

which lines of code below will be repeated four times?

1 penup()

2 for i in range(4):

3 pendown()

4 circle(25)

5 forward(50)

6 backward(200)

3, 4, and 5

what is one instance of legal hacking

penetration testing for a company

what is the Internet protocol (IP)

It's a protocol that defines the structure of an Internet address and assign a unique address to every devicd on the Internet

what are the best practices for having a secure password

creating a password that is long in length, using a password manager, and creating a password that has a combination of letters numbers and special characters

what is the latency of a system

The time it takes for a bit to travel from sender to receiver

what information is contained in a packet

A small part of a digital message, and meta-data about the message, including where it came from and where it is going

what actions will help you avoid violation of copyright law

check the copyright of the image to make sure you can use it by others without permission, limit your searches to public domain images, and always cite the source of the image

how would you change Tracy's trail to be a yellow line with a thickness of 10 pixels

color("yellow")
pensize(10)

what happens when a user enters a web address in a browser

The request for a file is sent to Web server. The file is then sent back to the user by the file being broken into packets and sent over a network. The packets must be reassembled the users computer when they are received. If any packets are missing, the browser request the missing packets

What is true about this image (Gray boxes with letters attached by a blue string)

only one thing is true
(block a)The network is fault-tolerant if one connection fails any two devices can still communicate

The output of the following command is
Circle(50,180,3)

The picture with three sides that's halfway complete completed

where does Tracy always start at

(0,0) In the middle of the canvas

if Tracy starts at the left edge of the canvas and moves forward 50 pixels how many times would that have to be repeated for Tracy to reach the right edge of the canvas

8 times

what will happen if you use the Command
right(180)

Tracy will turned around

what does the set position command do

It moves Tracy to coordinate and does not turn her

what is the correct way to draw a circle that is filled in

begin_fill()
circle(20)

end_fill()

what is the digital millennium copyright act

It criminalizes the act of circumventing or getting around axis controls that block access to copyrighted works

what are three statements that are true about the Internet

The Internet connects device devices and networks all over the world, the Internet helps people collaborate to solve problems, the Internet helps people communicate

what are valid words to enter colors in HTML

"rgb(255,0,0)"
"blue"

"#00FF00"

what does redundancy mean

Multiple paths exist between any two points in the context of Internet routing

why are comments written

For humans to read and understand

what is the proper way to set the background color of an <h1> tag to be blue using HTML

<h1 style="background-color:blue;">Hello</h1>

True or false the Internet is a network connecting individual networks

True

what is a (Distributed) Denial of service attack

When a company is server is flooded with data until it can no longer help with the volume, rendering the server Unreachable

how would you collect a number from the user to use for the radius of a circle

Radius = int(input("what is the radius?:"))

True or false if you set your sources, you can put any image you find online on your website

False

what is not a way to demonstrate a harmful consequence of increased and anonymity on the Internet

users can avoid targeted discrimination in an online forum

What direction does Tracy always start in

Facing right

What are the dimensions of Tracy's world

400 pixels X 400 pixels

which of the following programs would produce this output
(four squares in eachotjer decreasing in size)

Square_length = 20
For i in range(4):

For i in range(4):

forward(square_length)

left(90)

square_length = square_length*2

Quiz
UCSP 2
Marksmanship
8888
accounting
vvhg
CLE quarter 3
spagnolo
English
Filipino Quarter 3
le fémur
UCSP 1
jjjj
skelett
FILIPINO SA PILING LARANG 2
recest e instalaciones
Traduce_semana51
counting
LENGUA PT2
Filipino sa Piling Larang
indo
https://docs.google.com/document/d/13vG3VrJWpOc95jUsWR85vei3N3L4SBtjU1Tp2MJcOgY/
Environmental Science - 1.1.2 - Change due to biota
Automation
Environmental Science - 3.2.2 - Hydrological Cycle
PAGBASA AT PAGSUSURI
engelska
Tema 17 Green book
RIZAL Q1
AIRPORTDES ASSESSMENT2
Law
candian history 11 exam questions
lessico greco (terza declinazione
vocabulaire expression
Voc problématique
Les conjonctions de coordination
Prépositions suivies de l'ablatif
Prépositions suivies de l'accusatif
lessico greco (seconda declinazione)
Test revision
P3 água
colective nouns
1.3 salzsäure
1.2 Eigenschaften von Sauren Lösungen
säuren und laugen KA
unit 2
unit1
grade 10 biology
2. Nederlands en algemene taalkunde
industriella revolutionen
lessico greco (prima declinazione)