ISTM 210- PHINNEY EXAM 3 QUESTIONS & ANSWERS
What is HTML? - Answers -the language you use to create a web site
What is HTML an acronym for? - Answers -hypertext markup language
What is an HTML document? - Answers -a file that contains your website content and
HTML formatting instructions
What is an HTML tag? - Answers -specifies the formatting and presentation of
information on a web site
What are HTML tags used for? - Answers -to identify elements of an HTML document
What are fundamental components of the document's structure? - Answers -elements
Example of an element? - Answers -head, title, paragraphs, list, tables
What do HTML tags consist of? - Answers -<tag name>
What do tags come in? - Answers -pairs
Every HTML document should contain? - Answers -certain standard HTML tags
<hn> </hn> - Answers -heading tag, where n is replaced with number 1-6
How many header sizes are there? - Answers -6
What is the largest size header? - Answers -1
What is smallest size header? - Answers -6
<p> </p> - Answers -paragraph
<ul> </ul> - Answers -unordered list (bullets)
<ol> </ol> - Answers -ordered list (numbers)
<li> </li> - Answers -list item
<br /> - Answers -hard line break
<hr /> - Answers -horizontal rule
,<a> </a> - Answers -anchor tag
What is the purpose of an anchor tag? - Answers -to link to other documents
What replaces the file name in <a href="http://filename">Text</a> ? - Answers -the
path and filename of the target document
What replaces the text in <a href="http://filename">Text</a> ? - Answers -the text to
serve as the hyperlink in the document
How do you specify email address in href attribute? - Answers -replace "http://" with
"mailto:"
What tag do you use to make your background an image? - Answers -<body
background = "filename">
(replace filename with the name of the background image)
What tag do you use to add a picture? - Answers -<img>
What is different about the img tag? - Answers -it does not have a beginning and
ending tag
What are the attributes for the <img> tag - Answers -src="filename"
border="size"
align="position"
width="size"
height="size"
What does the src= do? - Answers -when inserting an image, it allows you to specify
the filename of the image
What does border= do when it comes to inserting images? - Answers -specifies if the
border is included in the picture
What does align= do when it comes to inserting images? - Answers -specifies the
alignment of the of the picture
What does width= do when it comes to inserting images? - Answers -specifies the
width of the picture in percent or pixels
What does height= do when it comes to inserting images? - Answers -specify the
height of the picture in percent or pixels
What tags insert a table? - Answers -<table></table>
must define beginning and end of table
, What two tags are used in inserting data into the table? - Answers -<tr></tr> defines
each row in table
<td></td> defines each cell in row
What does border= do when it comes to creating a table? - Answers -specifies a border
for the table
What does border size 0 mean? - Answers -no border
What country was attacked (cyber warfare)? - Answers -Estonia
What are DOS attacks? - Answers -denial of service
mess up websites to where they can't be used
Whose websites were attacked in the Estonia hack? - Answers -government, banks,
schools in Estonia
What are bot nets? - Answers -computers that are set up with malicious software to
bombard or overload websites
Security issues aren't a matter of ___ but ___ - Answers -if, when
What is computer security? - Answers -concerned with risk management,
confidentiality, integrity, and the availability of electronic information that is processed
and stored in a computing system
What is risk management? - Answers -the recognition, consequences, and assessment
of risk to a computer system
What is Phinney's definition of risk management? - Answers -managing the risks of
something happnening
What are hackers? - Answers -people who attempt to invade or disable a computer's
security measures and steal their resources, disrupt computer systems
What is another word for hackers? - Answers -hacktivist
What is a hacktivist? - Answers -disrupt system of something they don't like
Why do hackers hack? - Answers -it's a challenge, sometimes money is involved
What do businesses do to take advantage of the Internet? - Answers -set up Intranets
What is the key aspect of an Intranet? - Answers -privacy
What is HTML? - Answers -the language you use to create a web site
What is HTML an acronym for? - Answers -hypertext markup language
What is an HTML document? - Answers -a file that contains your website content and
HTML formatting instructions
What is an HTML tag? - Answers -specifies the formatting and presentation of
information on a web site
What are HTML tags used for? - Answers -to identify elements of an HTML document
What are fundamental components of the document's structure? - Answers -elements
Example of an element? - Answers -head, title, paragraphs, list, tables
What do HTML tags consist of? - Answers -<tag name>
What do tags come in? - Answers -pairs
Every HTML document should contain? - Answers -certain standard HTML tags
<hn> </hn> - Answers -heading tag, where n is replaced with number 1-6
How many header sizes are there? - Answers -6
What is the largest size header? - Answers -1
What is smallest size header? - Answers -6
<p> </p> - Answers -paragraph
<ul> </ul> - Answers -unordered list (bullets)
<ol> </ol> - Answers -ordered list (numbers)
<li> </li> - Answers -list item
<br /> - Answers -hard line break
<hr /> - Answers -horizontal rule
,<a> </a> - Answers -anchor tag
What is the purpose of an anchor tag? - Answers -to link to other documents
What replaces the file name in <a href="http://filename">Text</a> ? - Answers -the
path and filename of the target document
What replaces the text in <a href="http://filename">Text</a> ? - Answers -the text to
serve as the hyperlink in the document
How do you specify email address in href attribute? - Answers -replace "http://" with
"mailto:"
What tag do you use to make your background an image? - Answers -<body
background = "filename">
(replace filename with the name of the background image)
What tag do you use to add a picture? - Answers -<img>
What is different about the img tag? - Answers -it does not have a beginning and
ending tag
What are the attributes for the <img> tag - Answers -src="filename"
border="size"
align="position"
width="size"
height="size"
What does the src= do? - Answers -when inserting an image, it allows you to specify
the filename of the image
What does border= do when it comes to inserting images? - Answers -specifies if the
border is included in the picture
What does align= do when it comes to inserting images? - Answers -specifies the
alignment of the of the picture
What does width= do when it comes to inserting images? - Answers -specifies the
width of the picture in percent or pixels
What does height= do when it comes to inserting images? - Answers -specify the
height of the picture in percent or pixels
What tags insert a table? - Answers -<table></table>
must define beginning and end of table
, What two tags are used in inserting data into the table? - Answers -<tr></tr> defines
each row in table
<td></td> defines each cell in row
What does border= do when it comes to creating a table? - Answers -specifies a border
for the table
What does border size 0 mean? - Answers -no border
What country was attacked (cyber warfare)? - Answers -Estonia
What are DOS attacks? - Answers -denial of service
mess up websites to where they can't be used
Whose websites were attacked in the Estonia hack? - Answers -government, banks,
schools in Estonia
What are bot nets? - Answers -computers that are set up with malicious software to
bombard or overload websites
Security issues aren't a matter of ___ but ___ - Answers -if, when
What is computer security? - Answers -concerned with risk management,
confidentiality, integrity, and the availability of electronic information that is processed
and stored in a computing system
What is risk management? - Answers -the recognition, consequences, and assessment
of risk to a computer system
What is Phinney's definition of risk management? - Answers -managing the risks of
something happnening
What are hackers? - Answers -people who attempt to invade or disable a computer's
security measures and steal their resources, disrupt computer systems
What is another word for hackers? - Answers -hacktivist
What is a hacktivist? - Answers -disrupt system of something they don't like
Why do hackers hack? - Answers -it's a challenge, sometimes money is involved
What do businesses do to take advantage of the Internet? - Answers -set up Intranets
What is the key aspect of an Intranet? - Answers -privacy