100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ISTM 210- PHINNEY EXAM 3 QUESTIONS & ANSWERS

Rating
-
Sold
-
Pages
17
Grade
A+
Uploaded on
25-01-2026
Written in
2025/2026

ISTM 210- PHINNEY EXAM 3 QUESTIONS & ANSWERS

Institution
ISTM 210
Course
ISTM 210

Content preview

ISTM 210- PHINNEY EXAM 3 QUESTIONS & ANSWERS


What is HTML? - Answers -the language you use to create a web site

What is HTML an acronym for? - Answers -hypertext markup language

What is an HTML document? - Answers -a file that contains your website content and
HTML formatting instructions

What is an HTML tag? - Answers -specifies the formatting and presentation of
information on a web site

What are HTML tags used for? - Answers -to identify elements of an HTML document

What are fundamental components of the document's structure? - Answers -elements

Example of an element? - Answers -head, title, paragraphs, list, tables

What do HTML tags consist of? - Answers -<tag name>

What do tags come in? - Answers -pairs

Every HTML document should contain? - Answers -certain standard HTML tags

<hn> </hn> - Answers -heading tag, where n is replaced with number 1-6

How many header sizes are there? - Answers -6

What is the largest size header? - Answers -1

What is smallest size header? - Answers -6

<p> </p> - Answers -paragraph

<ul> </ul> - Answers -unordered list (bullets)

<ol> </ol> - Answers -ordered list (numbers)

<li> </li> - Answers -list item

<br /> - Answers -hard line break

<hr /> - Answers -horizontal rule

,<a> </a> - Answers -anchor tag

What is the purpose of an anchor tag? - Answers -to link to other documents

What replaces the file name in <a href="http://filename">Text</a> ? - Answers -the
path and filename of the target document

What replaces the text in <a href="http://filename">Text</a> ? - Answers -the text to
serve as the hyperlink in the document

How do you specify email address in href attribute? - Answers -replace "http://" with
"mailto:"

What tag do you use to make your background an image? - Answers -<body
background = "filename">
(replace filename with the name of the background image)

What tag do you use to add a picture? - Answers -<img>

What is different about the img tag? - Answers -it does not have a beginning and
ending tag

What are the attributes for the <img> tag - Answers -src="filename"
border="size"
align="position"
width="size"
height="size"

What does the src= do? - Answers -when inserting an image, it allows you to specify
the filename of the image

What does border= do when it comes to inserting images? - Answers -specifies if the
border is included in the picture

What does align= do when it comes to inserting images? - Answers -specifies the
alignment of the of the picture

What does width= do when it comes to inserting images? - Answers -specifies the
width of the picture in percent or pixels

What does height= do when it comes to inserting images? - Answers -specify the
height of the picture in percent or pixels

What tags insert a table? - Answers -<table></table>
must define beginning and end of table

, What two tags are used in inserting data into the table? - Answers -<tr></tr> defines
each row in table
<td></td> defines each cell in row

What does border= do when it comes to creating a table? - Answers -specifies a border
for the table

What does border size 0 mean? - Answers -no border

What country was attacked (cyber warfare)? - Answers -Estonia

What are DOS attacks? - Answers -denial of service
mess up websites to where they can't be used

Whose websites were attacked in the Estonia hack? - Answers -government, banks,
schools in Estonia

What are bot nets? - Answers -computers that are set up with malicious software to
bombard or overload websites

Security issues aren't a matter of ___ but ___ - Answers -if, when

What is computer security? - Answers -concerned with risk management,
confidentiality, integrity, and the availability of electronic information that is processed
and stored in a computing system

What is risk management? - Answers -the recognition, consequences, and assessment
of risk to a computer system

What is Phinney's definition of risk management? - Answers -managing the risks of
something happnening

What are hackers? - Answers -people who attempt to invade or disable a computer's
security measures and steal their resources, disrupt computer systems

What is another word for hackers? - Answers -hacktivist

What is a hacktivist? - Answers -disrupt system of something they don't like

Why do hackers hack? - Answers -it's a challenge, sometimes money is involved

What do businesses do to take advantage of the Internet? - Answers -set up Intranets

What is the key aspect of an Intranet? - Answers -privacy

Written for

Institution
ISTM 210
Course
ISTM 210

Document information

Uploaded on
January 25, 2026
Number of pages
17
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GEEKA YALA UNIVERSITY
View profile
Follow You need to be logged in order to follow users or courses
Sold
2017
Member since
4 year
Number of followers
1447
Documents
49081
Last sold
2 days ago

3.8

345 reviews

5
172
4
61
3
44
2
16
1
52

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions