Solutions

.doc

School

Northern Alberta Institute of Technology *

*We aren’t endorsed by this school

Course

120

Subject

Computer Science

Date

Dec 6, 2023

Type

doc

Pages

17

Uploaded by MasterDangerIbis6142

Report
New Perspectives on Computer Concepts, 8 th Edition Chapter 6 Solutions Chapter 6 Solutions In this document you will find the Solutions to the: Chapter QuickChecks, TechTalk QuickChecks, Lab Assignments, Interactive Summary, Interactive Situation Questions, Study Tips, Projects, and TechTV Projects. Q UICK C HECKS QuickCheck A 1. link 2. page; HTTP 3. XHTML 4. browser 5. helper application; plug-in; player 6. stateless 7. cookie QuickCheck B 1. text 2. authoring 3. head 4. style 5. JPEG 6. GIF 7. mailto 8. hot spots 9. true 10. post QuickCheck C 1. XML 2. scripts 3. JAVA 4. ActiveX 5. certificate QuickCheck D 1. false 2. GIF 3. SSL 4. sniffer 5. wallets T ECH T ALK Q UICK C HECK 1. plaintext; ciphertext 2. symmetric 3. public 4. PGP, Pretty Good Privacy 1
New Perspectives on Computer Concepts, 8 th Edition Chapter 6 Solutions L AB A SSIGNMENTS Lab 6-A – Working with Cookies 1. Start the interactive part of the lab. Insert your Tracking Disk if you want to save your QuickCheck results. Perform each of the lab steps as directed, and answer all of the lab QuickCheck questions. When you exit the lab, your answers are automatically graded and your results are displayed. Student answers are on file. 2. Use Windows Explorer to look at the cookies stored on your computer. Indicate how many cookies are currently stored. Examine the contents of one cookie, and indicate whether or not you think it poses a threat to your privacy. A student’s number of cookies may vary widely. A possible number might be (e.g.) 163 or 253. Students’ possible responses to examining a cookie might include: The response that it was difficult to read because the entire content of the file was on one continuous line. Submitting examples of cookie text. Their thoughts on whether or not the cookie is a threat to privacy. Schwab Cookie : I do not consider this a violation of privacy. There is no personal information in the text. None of the numbers here are either my social security or my Schwab account number. NP01 4JUCbQAFAwElUwoAY3wAUy2OCnL24QM5FxYCugABAwAAAAoCBwgb05E4wAk1OAFIBOqiXfNeAzkXFimiGRI AAAMBJVMKAGN8AFMtjgpTJ2kDORf0Ak0AAQMBWiAKAGN8AYjJzjbBM- YDAdG2CgDdDAFn1tcI0RX6AAADASVTCgBjfABTLY4KUydpAzkX2wCEAAEDAUt9CgBjfADKrIkFvZ8BAwFIkg oAY3wBgNyqL5yoNAAAAwElUwoAY3wAUy2OClMnaQM5F9sCbAAIAximPgoA3QEAkjBCOxZ4WgMBFFiiXfkSA zkX2yTDCwUACjIwMDEtMDktMTcDGDscCgDdAQFJWYAy5XnHAwHRtgoA3QwBZ9bXCM7TQwAAAxg7kAoA3 QEBS9eIGjh4ygMB0bYKAN0MAWfW1wjRqHsAAAMYO5AKAN0BAUvXiBrBRI4DAdG2CgDdDAFn1tcI0ah7AAA DGDuQCgDdAQFL14gawtXpAwHRtgoA3QwBZ9bXCNEV_gAAAxg7kAoA3QEBS9eIGsQkDwMB0bYKAN0MAWf W1wjRqHsAAAMBc2UKAGN8AcGMgzK0klADARRYol35EgM5F9slABoaAAhkb21lc3RpYwMBQd4KAGNZAe9x3y c3zPADARRYol35EgM5F9slATyHAAdFbmdsaXNoAwElUwoAY3wAUy2OClMnaQM5F9sCpgABAwFfzwoAY3wBf1Q WLlyc7gMBFFiiXfkSAzkX2yh0X6QAQjM4NzM5NTYyRDJGQjRGODgxMDNFNDAxRTA5Q0VFMkEyMDc4NkEz MjU3OTM3M0Y2RTg0M0U2QzE1REIxREExQTU2Rg@@ schwab.com/ 0 3138338816 32108254 3393750400 29441975 * SchwabCookie GraphicsPref*Full@1316118107| schwab.com/ 0 767584256 32060989 3141150400 29441975 * Faculty Text Cookie : A student should consider this a violation of privacy since the name, home address, and phone number of the user are listed. BASKET 00&CUST=Martha J.Tilmann&ADDR=221 Carmel Avenue &CITY=Pacifica&STATE=CA&ZIP=94044&PHONE=(650) 738-7534FAX=&EMAIL=& e400.facultytext.com/cgi-bin/faculty/ 0 2172068864 30066416 4253206592 29449248 * 2
New Perspectives on Computer Concepts, 8 th Edition Chapter 6 Solutions 3. Indicate the name and the version of the browser that you typically use. To find this information, open your browser, then select the About option from the Help menu. Next, look at the cookie settings provided by your browser. Describe how you would adjust these settings to produce a level of privacy that is right for your needs. A student may report on a variety of different browsers. Common browsers include: Microsoft Internet Explorer, Version 5.50.4522.1800CO, Cipher Strength 128 bit, Copyright 1995-2000 Microsoft Internet Explorer, Version 5.00.2314.1003CO, Cipher Strength 40 bit, Copyright 1995-1999 Netscape Communicator 4.75, Copyright 1994-2000 A student may list the cookie settings as: Allow cookies that are stored on your computer: ENABLED [or Disabled or Prompt] All per-session cookies (not stored): ENABLED [or Disabled or Prompt] To enable more protection, a student may say that they plan to use the Prompt option to ensure closer scrutiny of individual cookies. 4. Adjust your browser settings so that you are prompted whenever a Web server attempts to send a cookie to your computer. Go to several of your favorite Web sites and watch for third-party cookies. When you receive a message from a third-party Web site, record the name of the third-party Web site and the contents of the cookie that is attempting to send. Finally, indicate whether or not you would typically accept such a cookie. Students may list 2 to 5 of their favorite sites. Each site should report that either there were no third party cookies, or information on the third party cookie. For example: Amazon.com: There were many cookie prompts during my Amazon.com session, but all seemed to come directly from the Amazon.com company. ConsumerReports.org: The Consumer Reports site generated both direct and third party cookies. Some of the third party cookies included: session id, overturn.com, and ad.link.synergy.com. I would not oppose the use of any of these third party cookies because all of them showed an expiration date of “end of session.” Other possible student comments: There was one site whose cookie showed Dec. 4th 2011 as the expiration date. I would not want a third party cookie of this duration saved onto my hard drive. Lab 6-C – Web Security Settings 1. Start the interactive part of the lab. Insert your Tracking Disk if you want to save your QuickCheck results. Perform each of the lab steps as directed, and answer all of the lab QuickCheck questions. When you exit the lab, your answers are automatically graded and your results are displayed. Student answers are on file. 2. Check the Internet zone security setting on the computer that you typically use. Indicate whether the setting is High, Medium, Medium-low, Low, or Custom. Describe how this setting handles ActiveX controls, downloads, and Java applets. A student’s answer should include the information from ONE of the following columns. For example, if the Internet Security Zone on a student’s computer is medium-low, then the answers should be those boxed in red. Abbreviation: ActiveX (AX) 3
New Perspectives on Computer Concepts, 8 th Edition Chapter 6 Solutions High Med Med-low Low Download signed AX controls Disabled Prompt Prompt Enabled Download unsigned AX controls Disabled Disabled Disabled Prompt Initialize and script AX controls not marked as safe Disabled Disabled Disabled Prompt Run AX controls and plug-ins Disabled Enabled Enabled Enabled Script AX controls marked safe for scripting Enabled Enabled Enabled Enabled File Download Disabled Enabled Enabled Enabled Font Download Prompt Enabled Enabled Enabled Java Permissions High Safety High Safety Med Safety Low Safety If the student chooses “Custom” setting, each setting can be set individually. 3. On the computer that you typically use, find out if any Web sites are listed in the Trusted or Restricted zones. Would you make changes to the list of sites for these zones? Explain why or why not. A student’s report on the settings for Trusted and Restricted security zones should minimally have listings for the following categories. Trusted: Low Security Restricted: High Security Download signed AX controls Enabled Disabled Download unsigned AX controls Prompt Disabled Initialize and script AX controls not marked as safe Prompt Disabled Run AX controls and plug-ins Enabled Disabled Script AX controls marked safe for scripting Enabled Enabled File Download Enabled Disabled Font Download Enabled Prompt Java Permissions Low Safety High Safety A student’s list might also include settings for these categories: Cookies, Miscellaneous, Scripting, and User Authentication. Additionally, a student’s answer should state if they would change the sites listed in the Trusted and/or Restricted security zones. For example, a student might say that they would list Amazon.com, Schwab.com, and ConsumerReports.org under Trusted Security because all three are highly respected and reputable companies. Conversely, a student might list the site DirtyHarry.com under Restricted because they heard it was trafficked by hackers and crackers. 4. Activate the “Prompt” setting for the “Download ActiveX controls” security setting. Use your browser to connect to http://www.infoweblinks.com/np5/samples/activex.htm , where you should encounter an ActiveX control security alert. Use your computer’s PrtSc key to capture a screenshot of the warning. Paste the screenshot into Paint and then print it. Would you accept this ActiveX control? Why or why not? Students should provide a screen shot of the Security Warning window from http://www.infoweblinks.com/np5/samples/activex.htm 4
New Perspectives on Computer Concepts, 8 th Edition Chapter 6 Solutions Students should also state if the ActiveX control is one they would accept as well as why they would or would not accept it. A reasonable response is: “Yes, I would accept this ActiveX control because it is ‘signed.’ The ‘More Info’ states it is a certified control from the textbook’s Web site. I NTERACTIVE S UMMARY Section 1 The basic building blocks for today’s Web were developed in 1990 by a British scientist named Tim Berners-Lee. The Web did not “take off,” however, until 1993 when Marc Andreessen and his colleagues developed a Web browser called Mosaic. The Web is an abstract or imaginary space of information, whereas the Internet is the communications network that carries Web data. The Web is based on Ted Nelson’s concept of a hypertext —a series of documents that are stored electronically and linked together according to logical relationships. On today’s Web, these documents are stored in HTML format and then displayed as Web pages by a browser. HTML is a set of specifications for creating documents that contain special instructions called HTML tags , which specify how the document should appear when displayed on a computer screen. In an HTML document, these tags are set apart from normal text by angle brackets. In addition to HTML documents, Web browsers are designed to deal with graphics file formats, such as GIF, JPEG, and PNG. A browser can also work with other file formats if the necessary helper application, plug-in, or player has been installed. HTML documents are transmitted from a Web server to a browser by means of the HTTP protocol. This protocol is stateless , which means that as soon as a request is fulfilled, the Web server “forgets” that your browser ever made a request. To keep track of an individual who clicks through several pages on a Web site, a Web server resorts to a cookie —a small chunk of data that is generated by a Web server, sent to a browser, and then stored on the client computer’s hard disk. 1. browser 2. Internet 3. hypertext 4. HTML, hypertext markup language 5. pages 6. tags 7. angle 8. graphics, graphical 9. player 10. HTTP, hypertext transfer 11. stateless 5
New Perspectives on Computer Concepts, 8 th Edition Chapter 6 Solutions 12. a cookie, cookies Section 2 Many software tools are available today that make it easy to create Web pages. A Web page author can use a text editor, such as Notepad, to create Web pages “from scratch” by manually embedding HTML tags within the text of a document. It is also possible to use the HTML conversion routines included with many standard software applications. Another route is to use specialized Web authoring software, such as Microsoft FrontPage. An HTML document is divided into two sections. The head section contains information used to define global properties for the document. The body section contains the text you want the browser to display, the HTML tags that format the text, and a variety of links. In addition to embedding HTML tags within the text, a Web page can be formatted with a cascading style sheet, which allows Web page designers to change formats throughout an HTML document without modifying individual HTML tags. In addition to formatting specifications, HTML tags can be used to add graphics and links to Web pages. The <img src> tag can be used to specify a graphic . The <a href> tag is used to specify a link . Graphics and links can be combined to create an image map that contains clickable hot spots. To control the position of text and graphics on a Web page, many authors place these elements in the cells of a table . In the context of Web pages, a frame is part of a Web page that scrolls independently of other parts of the Web page. 1. text 2. authoring, editing 3. head 4. body 5. cascading, external 6. graphic, image 7. link, hyperlink 8. image 9. table, Web page table 10. frame, HTML frame Section 3 HTML was designed to create static Web pages. With basic HTML, once a Web page appeared in a browser window, the only way to change the appearance of the page was to download an update to the entire page. DHTML is a method for updating Web pages “on the fly”—typically as the result of a mouseover or a mouse click. A technology called XML can be used to incorporate structured data, such as spreadsheet data or database records, into a text file by adding special-purpose tags. These tags explicitly identify a particular kind of information, much like a field heading in a database . A technology called XSL is similar to XML, but can be used to create customized HTML tags that control the appearance of an XML document. Another way to add animation and interactivity to Web pages is to use scripting languages, such as JavaScript and VBScript. Unfortunately, browsers offer slightly different support for these languages, which sometimes results in a scripting error if the browser can’t execute a particular instruction. In addition to JavaScript and VBScript, Java has become a popular programming tool for Web-based projects. Small Java programs are referred to as Java applets . ActiveX provides another Web development tool. An ActiveX control is a compiled computer program that can be referenced from within an HTML document, downloaded, installed on your computer, and executed within the browser window. This technology has potential security loopholes, which can be avoided by the use of digital certificate . 1. DHTML, Dynamic HTML 2. XML, Extensible Markup Language 3. database 4. XSL, eXtensible Stylesheet Language 5. scripting 6. scripting 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help