i need help with my school work...

Discussion in 'General Off-Topic Chat' started by sphere9, Oct 8, 2008.

  1. sphere9

    sphere9 GBAtemp Fan

    Jul 6, 2007
    basically, we need to fill these questions in, but we have to refernce a website with every answer and the teachers don't know and can't help us (hooray for training)

    so i'm hoping someone here knows any websites that might have answers or anything...


    (i've already done some, i just need help with the ones i haven't)

    As part of your completion of this competency, you need to be able to answer the following questions. Later, there will be a quiz to test your knowledge. Specify your sources for the answers to the questions.

    Type your answers under the questions.

    1. How do you initiate and conclude an Internet connection?
    “…Before you can connect to the Internet and access the World Wide Web, you need to have certain equipment. In brief, you must have a computer (preferably running an up-to-date operating system); a modem and access to a telephone line or a local area network (LAN) that is in turn connected to the Internet; and connection software that will allow you to establish an account with a service provider and access the Internet…”
    Source: http://www.centerspan.org/tutorial/connect.htm

    2. If a connection attempt fails, what could be the cause and what do you do?

    3. How do you know if you are still on line, and how do you log off?

    4. Explain some appropriate uses of different Internet protocols and data types (WWW, e-mail, intranet, newsgroup or chat room, networking sites such as MySpace or U-Tube.)

    5. Name two WWW search engines
    • www.google.com
    • www.yahoo.com

    6. What is a URL?
    “…Uniform Resource Locator: a protocol for specifying addresses on the Internet…”
    Source: http://dictionary.reference.com/browse/URL

    7. Why might you sometimes use e-mail to respond to a newsgroup post?

    8. What is shareware? (Give at least two examples)

    “…The term shareware refers to commercial software that is copyrighted, but which may be copied for others for the purpose of their trying it out with the understanding that they will pay for it if they continue to use it…”
    Source: http://en.wikipedia.org/wiki/Shareware

    Examples of Shareware software;
    • WinRAR
    Source: http://en.wikipedia.org/wiki/WinRAR
    • DOOM
    Sourece: http://en.wikipedia.org/wiki/DOOM

    9. In which of these is maintaining (upper/lower) case important: URLs, file names, passwords?
    Source: http://morun.net/

    10. What are "zip" files and why are they used?
    “…Zip files can contain one or more files that have been compressed using the zip format. The zip format is popular on PCs and is widely used for interplatform compression of files. Decompression software is widely available...”
    Source: http://iconfactory.com/home/show/1321

    11. What is the difference between Java and JavaScript?
    “JavaScript is text-based. You write it to an HTML document and it is run through a browser. You can alter it after it runs and run it again and again. Once the Java is compiled, it is set. Sure, you can go back to the original text and alter it, but then you need to compile again.
    Java applets run independent of the HTML document that is calling for them. Sure, they appear on the page, but the HTML document did little more than call for the application and place it. If the programmer allows it, oftentimes parameters can be set by the HTML document. This includes the background color of the applet of the type of text it displays, etc. The delivery of the applet is done through a download. The HTML document calls for the application, it downloads to the user's cache, and waits to run. JavaScript is wholly reliant on the browser to understand it and make it come to life.“
    Source: http://www.htmlgoodies.com/beyond/javascri...cle.php/3470971
    12. In what ways can you use the Internet to obtain product information and technical support?
    Company websites
    13. Approximately how long would it take to download one megabyte of data using a fast modem? (Specify at least two connection types and speeds)

    • 56kb/s Dial-up: 2 Minutes 29 Seconds
    • 512kb/s DSL: 15 Seconds
    Source: http://www.csgnetwork.com/csdlspeedcalc.html

    14. What are some key privacy and security measures related to on line tasks?

    15. What information would you refuse to provide when filling out a form on a web page? Why?

    16. What are cookies?
    “…A "cookie" is a small piece of information sent by a web server to store on a web browser so it can later be read back from that browser. This is useful for having the browser remember some specific information…”

    17. Why should you not leave the terminal unattended while on line?

    18. Which types of files can carry viruses?

    File types such as;
    .csh .exe
    .ksh .lnk
    .ops .pcd
    .vb .vbe
    Source: http://kb.iu.edu/data/ajch.html
    19. Why must you scan for viruses before and after extracting the files from a compressed archive?

    20. Who owns the copyright on the types of data you retrieve?
  2. The Teej

    The Teej Also known as The Tjalian

    Former Staff
    Jun 27, 2004
    I kind of got bored after answering 3. I haven't sourced any of this, but it should be plenty of information to find some random source and use that (no, don't use this post as a source!).

    Please note I've added in 1 or 2 humourous tidbits which should probably be omitted. You may also want to rewrite this yourself to fit your own writing style.

    EDIT: This one is so easy I had to answer it:

    20. Who owns the copyright on the types of data you retrieve?
    The copyright holder, OBVIOUSLY.
  3. sphere9

    sphere9 GBAtemp Fan

    Jul 6, 2007
    thanks for the help!

    i really appreciate it but the answer has to be copy/pasted exactly from the source.

    how stupid is that!
  4. ZonMachi

    ZonMachi GBAtemp Regular

    Aug 29, 2008
    United States
    exactly from the source can't you come up with your own answers? [​IMG]
  5. Pimpmynintendo

    Pimpmynintendo GBAtemp Advanced Fan

    Mar 18, 2008
    United States
    I won't word it for you but here is 14 and 15.
    14. What are some key privacy and security measures related to on line tasks?
    This is more than likely talking about a WEP Key
    15. What information would you refuse to provide when filling out a form on a web page? Why?
    This is probably talking things that would allow people to steal your identity.
  6. sphere9

    sphere9 GBAtemp Fan

    Jul 6, 2007

    nope, they have to be directly copy/pasted from the website.

    it's screwed idn't it?
  7. mercluke

    mercluke ‮҉

    Dec 2, 2007
  8. sphere9

    sphere9 GBAtemp Fan

    Jul 6, 2007
    that wasn't helpful at all.
  9. sphere9

    sphere9 GBAtemp Fan

    Jul 6, 2007
    i still need help with this...
  10. sphere9

    sphere9 GBAtemp Fan

    Jul 6, 2007
    like majorly, if i don't get this done i can't pass the subject.
  11. UltraMagnus

    UltraMagnus hic sunt dracones

    Aug 2, 2007
    ok, this is really quite simple, look it up on wikipedia, find a little number next to what you copied and pasted, click it and it will take you to a link, say you got it from there
  12. FAST6191

    FAST6191 Techromancer

    pip Reporter
    Nov 21, 2005
    United Kingdom
    First avoid wikipedia at all costs, were I to mark something and the author was to reference wikipedia then I would probably fail them or if that was not possible mark harshly (no benefit of the doubt sort of thing).
    If you must use wikipedia go down to the bottom of the page and look at the external links section. If the site ends in .edu or ac.uk then go with that (I actually type site:.ac.uk OR site:.edu into search engines these days as -wikipedia.org fails to eliminate the clones).

    None the less I assume this is a how a computer works course rather than a what are the underlying concepts. Also some of these questions probably need to be updated 2 decades.

    1."How do you initiate and conclude an Internet connection"
    (one of the biggest companies in the world tech support also counts as a good source for this sort of thing, finance/legal related pertaining to them not so much)

    2. Troubleshooting network connections:

    3. Answer try connecting to an external network address. See link above for more on this.

    Effectively a "company internet".
    The rest I leave to you.

    5. Search engines.

    One of the biggest internet standards organisations. Good source for this sort of thing.

    7. See moderated newsgroups.


    You have examples.

    9. Actually depends on the OS (filenames are OK if you change case in windows but try the same on a unix machine and you can fall foul. Likewise most passwords are case sensitive but there are a few that are not.

    10. Good enough.

    11. Good enough.

    12. I think they also want newsgroups and the like.

    13. Good enough. Note they may be trying to trick you with bits and bytes (8bits = 1 byte and unless you are a hard drive company they match for higher orders 8megabits = 1 megabyte).

    14. see https, ssl encryption...... They may also want something about session cookies.

    15. Depends on what you are doing I suppose. I use fake addresses and names as standard but I need something real when shopping online. See your schools guide for this one.

    16. http://msdn.microsoft.com/en-us/library/aa384321(VS.85).aspx

    17. Someone else can effectively appear as you.

    18. See any type of file. Point to the jpg trojan* stuff or the more recent MS one (no link but most IT news sites had something):

    *trojan does not equal virus I know but ask for clarification if in doubt.

    19. My AV scans zip files but I suppose they are after compressed files can obscure malware.

    20. Copyright law is infinitely more complex than this but he who owns the copyright retains it.
  13. Scorpei

    Scorpei GBAtemp Maniac

    Aug 21, 2006
    Quote GBAtemp then, you got your answers from (t)here right? The assignment was to look it up online and you did, you looked it up on GBAtemp. Granted you got the answers from people who know but who cares.

    I have to say I find it rather silly that you have to look up the info if you know it ^^.

    Wikipedia isn't all that bad depending on what level you are making your assigment for. Especially if wikipedia helps you to get further. Aka check wikipedia and get some info from there and use that to do a new search to see if the info you have found on wikipedia seems to be correct (quote both sources). Naturally though ANYTHING you find online can simply be placed by someone who has no knowlidge about the subject (and possibly is just replicating common belief/myth).