5. Considering any Microsoft Windows operating system: of the following features in MS Windows: (i) C drive (ii) Desktop (iii) Recycle Bin a) Describe the significance

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
(x).
It is a good practice to read from the slides during presentation and to have around three clear bullet
points on it.
5. Considering any Microsoft Windows operating system:
a) Describe the significance of the following features in MS Windows: (i) C drive (ii) Desktop (iii) Recycle Bin
b) Write the long form for each of the following abbreviation related to IT security: HTTPS, 2FA, SSL, SSH, GIGO.
c) Attempt the following TRUE/FALSE questions related to computer security:
Internet is a secured place.
(i).
(ii).
(i).
(iv).
Passwords sent through Internet can be intercepted.
Websites with "http" are more secured than website with "https".
Password is a passphrase when it uses more than one word and is a passcode or passkey when it
uses only numbers.
(v).
A good password has minimum of eight characters.
(vi).
It is a good security practice to reuse password.
(vii). Single password can be used to login to several systems.
(viii).
A password of "123456" is among the password blacklist.
(ix).
(xi).
(xii).
Trojan horses replicate and are autonomous.
Hoax is a false message being spread by e-mail in order to deceive users.
For a malicious software to work, it must be installed in the computer.
Malicious software cannot install if your login account does not have installation privilege.
(xiii). Violating privacy is one of cybercrimes.
6. Answer the following questions related to network technologies and Internet application:
a) Write the long form for each of the following abbreviations: USSD, MOODLE, HTTPS, HTML, HTTP, URL, ISP,
TCP Wi-Fi, FTP.
b)
Mention one example for each of the following: (a) free mail server (b) search engine (c) cloud service (d) social
network (e) email feature (f) Internet service
c) Answer the following TRUE/FALSE questions related to Internet:
(i).
Internet is WLAN and is based on client-server architecture.
(ii).
Trash is a standard folder in any mail server.
(iii).
Spam emails do not have their addresses recorded in the mail address book.
(iv).
You can attach file of any size and any type in the email.
(v).
Your email address is unique in the world.
(vi). Instant messaging is a real time communication and allows textual communication, video conferencing,
and file transfer.
(vii). VoIP transfers sound over the Internet.
(viii).
Podcast contains audio or video content and is distributed over the Internet using RSS technology.
Instant messaging requires software installation while chatroom does not.
Transcribed Image Text:(x). It is a good practice to read from the slides during presentation and to have around three clear bullet points on it. 5. Considering any Microsoft Windows operating system: a) Describe the significance of the following features in MS Windows: (i) C drive (ii) Desktop (iii) Recycle Bin b) Write the long form for each of the following abbreviation related to IT security: HTTPS, 2FA, SSL, SSH, GIGO. c) Attempt the following TRUE/FALSE questions related to computer security: Internet is a secured place. (i). (ii). (i). (iv). Passwords sent through Internet can be intercepted. Websites with "http" are more secured than website with "https". Password is a passphrase when it uses more than one word and is a passcode or passkey when it uses only numbers. (v). A good password has minimum of eight characters. (vi). It is a good security practice to reuse password. (vii). Single password can be used to login to several systems. (viii). A password of "123456" is among the password blacklist. (ix). (xi). (xii). Trojan horses replicate and are autonomous. Hoax is a false message being spread by e-mail in order to deceive users. For a malicious software to work, it must be installed in the computer. Malicious software cannot install if your login account does not have installation privilege. (xiii). Violating privacy is one of cybercrimes. 6. Answer the following questions related to network technologies and Internet application: a) Write the long form for each of the following abbreviations: USSD, MOODLE, HTTPS, HTML, HTTP, URL, ISP, TCP Wi-Fi, FTP. b) Mention one example for each of the following: (a) free mail server (b) search engine (c) cloud service (d) social network (e) email feature (f) Internet service c) Answer the following TRUE/FALSE questions related to Internet: (i). Internet is WLAN and is based on client-server architecture. (ii). Trash is a standard folder in any mail server. (iii). Spam emails do not have their addresses recorded in the mail address book. (iv). You can attach file of any size and any type in the email. (v). Your email address is unique in the world. (vi). Instant messaging is a real time communication and allows textual communication, video conferencing, and file transfer. (vii). VoIP transfers sound over the Internet. (viii). Podcast contains audio or video content and is distributed over the Internet using RSS technology. Instant messaging requires software installation while chatroom does not.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Embedded software development
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education