Capstone Jeopardy. Chapter 3 Ghosts in the Machine. Internet Appendix. Chapter 2 Naked in the Sunlight. Chapter 1 Digital Explosion

Similar documents
Wireless systems. how radio works radio spectrum allocation examples. tradeoffs. non-technical issues

Online Marketing. Anthony Cannata. ARC Creative Groups

IOT Question Bank. Unit 1. Chapter 1

6 System architecture

Monitoring Cable Technologies

SECTION 2. Computer Applications Technology

History of Communication

Internet of Things (Winter Training Program) 6 Weeks/45 Days

Wireless systems. includes issues of

Digital Surveillance Devices?

Digital surveillance devices?

Computer Facilities and Network Management BUS3150 Assignment 1

This Privacy Policy describes the types of personal information SF Express Co., Ltd. and

AP / IB Computer Science Summer Assignment

Version 9.2. SmartPTT PLUS. Capacity Max Configuration Guide

e-paper ESP866 Driver Board USER MANUAL

Question No: 2 In an OSPF Hello packet, which of the following fields must match for all neighbor routers on the segment? Choose three answers.

MOTOBRIDGE IP Interoperable Solution

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic

Introduction to the challenges of current GSM and GPRS planning. Technical Presentation

Cross-Border Interoperability Report Overview CANUS CIWG Meeting

10/17/2011. I have an Air-Card. I have Satellite Internet. Why would I use Wi-Fi? Just for

Social Issues. spam espionage cheating forgery access to your data years from today destroying old records/ data

Bloodhound RMS Product Overview

How to put the Image Services in the Living Atlas to Work in Your GIS. Charlie Frye, Chief Cartographer Esri, Redlands

OSPF Sham-Link MIB Support

Technical Bulletin, Communicating with Honeywell TM ST3000/STT3000 Smart Transmitters

Legislation & Standardization

Photo Digitization. Pre-Digitization (including planning) Digitization. Post-Digitization

SM 4117 Virtual Reality Assignment 2 By Li Yiu Chong ( )

Welcome to Hellfire Multi Player. Game Version 3.3

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Location Tracking. Current Technologies 1/19/2011. Not one, single technology Convergence of several technologies. Systems for

MILnews. IP-based split-site operation with the R&S M3SR Series4100 HF radios. Offprint from MILnews 12. Electronics for security and defense

Social Issues. CS Concepts. How does a printed document differ from a digital document? WYSI(not)WYG. What s in the model?

Engr 1202 ECE. Clean Room Project

Amazon Money Maker... 2 Section 1 - Amazon Heat Seeker... 3 Star Rating... 3 Reviews... 3 Cost... 3 Finding Products... 4 Keyword Research...

"Terminal RG-1000" Customer Programming Software. User Guide. August 2016 R4.3

Infoblox and Ansible Integration

Wyoming s Statewide Public-Safety Interoperable Radio Communications System WyoLink Frequently Asked Questions (FAQ)


Set Up Your Domain Here

Location Planning and Verification

Computer Progression Pathways statements for KS3 & 4. Year 7 National Expectations. Algorithms

DOWNLOAD OR READ : VAGRANT MEMORIES BEING FURTHER RECOLLECTIONS OF OTHER DAYS PDF EBOOK EPUB MOBI

Hytera SmartOne. A professional unified Communications Solution. Inter-system communication Unified dispatching Plug-in module design Open platform

RELEASE NOTES. Introduction. Trimble NetR9 Infrastructure GNSS Series Receivers

Human Identifier Tag

Service and technology neutrality - universal service obligations

Where s The Beep? Privacy, Security, & User (Mis)undestandings of RFID

TETRA data services: Applications & innovations

Ansible + Hadoop. Deploying Hortonworks Data Platform with Ansible. Michael Young Solutions Engineer February 23, 2017

Modular Metering System ModbusTCP Communications Manual

First Components Ltd, Savigny Oddie Ltd, & Datum Engineering Ltd. is pleased to provide the following

Papers. Ad Hoc Routing. Outline. Motivation

Unhappy with the poor health of his cows, Farmer John enrolls them in an assortment of different physical fitness activities.

Final Exam (ECE 408/508 Digital Communications) (05/05/10, Wed, 6 8:30PM)

Wireless Cellular Networks. Base Station - Mobile Network

UNIVERSAL NET SERVICES

No User Left Behind. Mohit Suley, Bing Live Site Engineering /

Internet of Things. (Ref: Slideshare)

The 4A Vision: Anytime, anywhere, by anyone and anything

Big Data & Law. AzALL-SANDALL Symposium on Digital Dilemmas Feb. 16, Gary E. Marchant, J.D., Ph.D.

OSPF Inbound Filtering Using Route Maps with

METAVERSE WALLET USER MANUAL

WHAT EVERY ADVERTISER NEEDS TO KNOW About Podcast Measurement

DECODIO SPECTRUM MONITORING SYSTEM

Scalable and Lightweight CTF Infrastructures Using Application Containers

iphoto Getting Started Get to know iphoto and learn how to import and organize your photos, and create a photo slideshow and book.

Managing Microservices using Terraform, Docker, and the Cloud

Sensitivity Of Quake3 Players To Network Latency and Jitter

BusWorks 900EN Series Modbus TCP/IP 10/100M Industrial Ethernet I/O Modules

My Research. 1 Animation = 1K Words. Overview of by Azer Bestavros, Fall

MOBILE COMPUTING 1/29/18. Cellular Positioning: Cell ID. Cellular Positioning - Cell ID with TA. CSE 40814/60814 Spring 2018

Engineering Scope and Sequence Student Outcomes (Objectives Skills/Verbs)

Procedures for Testing and Troubleshooting Radianse RTLS

Software development and ITS research of Dtv group. Timo Koski University of Turku, Dtv group

RFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode

Comparison ibeacon VS Smart Antenna

Executive Summary. Correspondence between age and grade. Grade Outside Quebec. Grade In Quebec Secondary

Copyright WriterHelpWanted.com

GUIDE TO GAME LOBBY FOR STRAT-O-MATIC COMPUTER BASEBALL By Jack Mitchell

1 of 8 9/26/2016 3:03 PM. Jon Peha. none

EPCglobal Gen 2 RFID Reader

Network Planning and Link Budget Analysis. Presenter: E. Kasule Musisi ITSO Consultant Cell:

USER GUIDE. NEED HELP? Call us on +44 (0)

Teleoperated Robot Controlling Interface: an Internet of Things Based Approach

2009 Michigan Educational Technology Standards - Grades 6-8

Compatibility. R142-R142A Compatibility Propulsion Network NEW YORK CITY TRANSIT. New Train Procurement for NYCT Division A (R142)

ID: Cookbook: browseurl.jbs Time: 16:09:48 Date: 05/02/2018 Version:

Circuit Simulators: a Revolutionary E-Learning Platform

DMRGateway Technical Overview INAD

Chapter 1 Basic concepts of wireless data networks (cont d.)

OSPF Link-State Database Overload Protection

CS 457 Lecture 16 Routing Continued. Spring 2010

European Position Determination System. Technical Standards

Spectrum sharing using Coexistence Frame and Networking solutions. Mariana Goldhamer Director Strategic Technologies Alvarion

Dr. Ivy Matsepe-Casaburri Minister of Communications SCHEDULE. Amendment of Ministerial Declaration

4G Mobile Broadband LTE

June 21, 2016 comments from AT&T's president of Technology Operations, Bill Smith, at the Wells Fargo 2016 Convergence and Connectivity Symposium

Transcription:

Capstone Jeopardy Internet Appendix Chapter 1 Digital Explosion Chapter 2 Naked in the Sunlight Chapter 3 Ghosts in the Machine Chapter 4 Needles in the Haystack 10 10 10 10 10 20 20 20 20 20 30 30 30 30 30 40 40 40 40 40 50 50 50 50 50

Internet Appendix for 10 A postcard is an analogy for what Internet component?

Appendix for 10 Answer: IP packet Why?

Internet Appendix for 20 points How is a URL (e.g, www.google.com) converted to an IP address?

Internet Appendix for 20 Answer: Local DNS, Domain Name Server, contacted if necessary it will ask other DNS servers including.com server.

Internet Appendix for 30 points How does your home computer get assigned an IP address?

Internet Appendix for 30 points Answer: Your Internet Service Provider (ISP) dynamically leases your computer an IP address from the block in its domain.

Internet Appendix for 40 points What is at the core of the Internet?

Internet Appendix for 40 Answer: Interconnected routers owned by the telecommunication companies and gov ts that pass along IP packets using the IP protocol.

Internet Appendix for 50 points The Internet hourglass showed 5 layers from application to physical media. From application on down name an example at each layer.

Internet Appendix for 50 Answer: Email Web Phone SMTP TCP HTTP UDP IP Wire Fiber Radio

Ch. 1 Digital Explosion for 10 points How was Tanya Rider found 8 days after her car crashed into a ravine near Seattle?

Ch. 1 Digital Explosion for 10 points From her last cell-phone ping to the nearest tower. Police could only accessed cell-phone records when they became suspicious of her husband.

Ch. 1 Digital Explosion for 20 points Why is technology neither good nor bad?

Digital Explosion for 30 points What is Moorse s Law?

Digital Explosion for 30 points Answer: Moorse s Law: The density of integrated circuits seems to double every couple of years. Leading to exponential growth of main memory sizes and processing power.

Digital Explosion for 40 points Give an example of Koan 3: There Is Want in the Midst of Plenty

Digital Explosion for 40 points Answers Paper Dr. files not accessable via computer Search engine might not find digital file on web Other?

Digital Explosion for 50 points List 5 of the 7 Koans

Digital Explosion for 50 points Answer Koans: 1: It s all just bits 2: Perfection is Normal 3: There is want in the midst of plenty 4: Processing is power 5: More of the same can be a whole new thing 6: Nothing goes away 7: Bits move faster than thought

Naked in the Sunlight for 10 points What s the difference between a digital footprint and digital fingerprint?

Naked in the Sunlight for 10 points Answer Footprints we know we leave Fingerprints we leave unintentionally

Naked in the Sunlight for 20 points Give a usage of the Radio Frequency Identification Tag (RFID)?

Naked in the Sunlight for 20 points Answer Electronic door key, toll-booth pass, pet or livestock identification, inventory aid, etc.

Naked in the Sunlight for 30 points In Oct. 2007, what did the British national tax agency loose?

Naked in the Sunlight for 30 points Answer Two disk drives containing national insurance numbers and banking information for 40% of all British population.

Naked in the Sunlight for 40 points Given an example of how the Digital Explosion allows us to Connect the Dots

Naked in the Sunlight for 40 points Answer MA Group Ins. Commission (GIC) deidentified insurance claims data Enron emails

Naked in the Sunlight for 50 points What do the terms Big Brother and Little Brother refer to with respect to privacy?

Naked in the Sunlight for 50 points Answer Big Brother is the government ( 1984 ) Little Brother is your neighbor or any individual using the Internet to check up on you.

Ghosts in the Machine for 10 points What type of metadata is associated with a word processor document?

Ghosts in the Machine for 20 points How are images stored on the computer?

Ghosts in the Machine for 20 points Answer A sequence of pixels with each pixel consisting of a Red #, Green #, and Blue # (RGB value).

Ghosts in the Machine for 30 points What is steganography?

Ghosts in the Machine for 30 points Answer Steganography is the art of sending secret messages in imperceptible ways

Ghosts in the Machine for 40 points If you delete a file and execute an Empty Trash command, why might the content s of the file still be recovered?

Ghosts in the Machine for 40 points Answer Blocks from a deleted file are removed from the Operating Systems file structure and put on the OS s list of unused disk blocks. This blocks typically contain their deleted information until they are overwritten, so the file might be able to be covered.

Ghosts in the Machine for 50 points Why did the Digital Domesday Book last only 15 years not 900 years like the paper version?

Ghosts in the Machine for 50 points Answer The digital format of the specialized 12-inch disks were obsolete and forgotten so Digital Domesday Book could not be read. (eventually was reversed engineered)

Needles in the Haystack for 10 points What make the early Internet more like a library?

Needles in the Haystack for 10 points Answer Universities and Big Businesses mostly posted information which was organized by categories

Needles in the Haystack for 20 points In the following search engine steps, where is the dividing line between the background vs. the foreground steps? 1. Gather information 2. Keep copies 3. Build an index 4. Understand the query 5. Determine the relevance of each possible result to the query 6. Determine the ranking of the relevant results 7. Present the results

Needles in the Haystack for 20 points The dividing line between the background vs. the foreground steps: 1. Gather information 2. Keep copies 3. Build an index 4. Understand the query 5. Determine the relevance of each possible result to the query 6. Determine the ranking of the relevant results 7. Present the results

Needles in the Haystack for 30 points What s the difference between a sponsored and an organic search result?

Needles in the Haystack for 30 points Answer A sponsored search result is pay-forplacement advertisement while an organic search result is one found through the search engines normal process

Needles in the Haystack for 40 points Why do search engines track individual search histories?

Needles in the Haystack for 40 points Answer Search engines track an individual s search history because knowing about you can improve your search quality. USA PATRIOT Act requires search engine provides to provide search history under certain circumstances.

Needles in the Haystack for 50 points What percentage of the Chinese version of Google on 10,000 English test words resulted in censored responses?

Needles in the Haystack for 50 points Answer 9% of the responses were censored