Solutions
.doc
keyboard_arrow_up
School
Northern Alberta Institute of Technology *
*We aren’t endorsed by this school
Course
120
Subject
Computer Science
Date
Dec 6, 2023
Type
doc
Pages
17
Uploaded by MasterDangerIbis6142
New Perspectives on Computer Concepts, 8
th
Edition
Chapter 6 Solutions
Chapter 6 Solutions
In this document you will find the Solutions to the: Chapter QuickChecks, TechTalk QuickChecks, Lab Assignments, Interactive Summary, Interactive Situation Questions, Study Tips, Projects, and TechTV Projects.
Q
UICK
C
HECKS
QuickCheck A
1.
link
2.
page; HTTP
3.
XHTML
4.
browser
5.
helper application; plug-in; player
6.
stateless
7.
cookie
QuickCheck B
1.
text
2.
authoring
3.
head
4.
style
5.
JPEG
6.
GIF
7.
mailto
8.
hot spots
9.
true
10.
post
QuickCheck C
1.
XML
2.
scripts
3.
JAVA
4.
ActiveX
5.
certificate
QuickCheck D
1.
false
2.
GIF
3.
SSL
4.
sniffer
5.
wallets
T
ECH
T
ALK
Q
UICK
C
HECK
1.
plaintext; ciphertext
2.
symmetric 3.
public
4.
PGP, Pretty Good Privacy
1
New Perspectives on Computer Concepts, 8
th
Edition
Chapter 6 Solutions
L
AB
A
SSIGNMENTS
Lab 6-A – Working with Cookies
1.
Start the interactive part of the lab. Insert your Tracking Disk if you want to save your QuickCheck results. Perform each of the lab steps as directed, and answer all of the lab QuickCheck questions. When you exit the lab, your answers are automatically graded and your results are displayed.
Student answers are on file.
2.
Use Windows Explorer to look at the cookies stored on your computer. Indicate how many cookies are currently stored. Examine the contents of one cookie, and indicate whether or not you think it poses a threat to your privacy.
A student’s number of cookies may vary widely. A possible number might be (e.g.) 163 or 253.
Students’ possible responses to examining a cookie might include:
The response that it was difficult to read because the entire content of the file was on one continuous line.
Submitting examples of cookie text.
Their thoughts on whether or not the cookie is a threat to privacy.
Schwab Cookie
: I do not consider this a violation of privacy. There is no personal information in the text. None of the numbers here are either my social security or my Schwab account number.
NP01
4JUCbQAFAwElUwoAY3wAUy2OCnL24QM5FxYCugABAwAAAAoCBwgb05E4wAk1OAFIBOqiXfNeAzkXFimiGRI
AAAMBJVMKAGN8AFMtjgpTJ2kDORf0Ak0AAQMBWiAKAGN8AYjJzjbBM-
YDAdG2CgDdDAFn1tcI0RX6AAADASVTCgBjfABTLY4KUydpAzkX2wCEAAEDAUt9CgBjfADKrIkFvZ8BAwFIkg
oAY3wBgNyqL5yoNAAAAwElUwoAY3wAUy2OClMnaQM5F9sCbAAIAximPgoA3QEAkjBCOxZ4WgMBFFiiXfkSA
zkX2yTDCwUACjIwMDEtMDktMTcDGDscCgDdAQFJWYAy5XnHAwHRtgoA3QwBZ9bXCM7TQwAAAxg7kAoA3
QEBS9eIGjh4ygMB0bYKAN0MAWfW1wjRqHsAAAMYO5AKAN0BAUvXiBrBRI4DAdG2CgDdDAFn1tcI0ah7AAA
DGDuQCgDdAQFL14gawtXpAwHRtgoA3QwBZ9bXCNEV_gAAAxg7kAoA3QEBS9eIGsQkDwMB0bYKAN0MAWf
W1wjRqHsAAAMBc2UKAGN8AcGMgzK0klADARRYol35EgM5F9slABoaAAhkb21lc3RpYwMBQd4KAGNZAe9x3y
c3zPADARRYol35EgM5F9slATyHAAdFbmdsaXNoAwElUwoAY3wAUy2OClMnaQM5F9sCpgABAwFfzwoAY3wBf1Q
WLlyc7gMBFFiiXfkSAzkX2yh0X6QAQjM4NzM5NTYyRDJGQjRGODgxMDNFNDAxRTA5Q0VFMkEyMDc4NkEz
MjU3OTM3M0Y2RTg0M0U2QzE1REIxREExQTU2Rg@@
schwab.com/
0
3138338816
32108254
3393750400
29441975
*
SchwabCookie
GraphicsPref*Full@1316118107|
schwab.com/
0
767584256
32060989
3141150400
29441975
*
Faculty Text Cookie
: A student should consider this a violation of privacy since the name, home address, and phone number of the user are listed.
BASKET
00&CUST=Martha J.Tilmann&ADDR=221 Carmel Avenue &CITY=Pacifica&STATE=CA&ZIP=94044&PHONE=(650) 738-7534FAX=&EMAIL=&
e400.facultytext.com/cgi-bin/faculty/
0
2172068864
30066416
4253206592
29449248
*
2
New Perspectives on Computer Concepts, 8
th
Edition
Chapter 6 Solutions
3.
Indicate the name and the version of the browser that you typically use. To find this information, open your browser, then select the About option from the Help menu. Next, look at the cookie settings provided by your browser. Describe how you would adjust these settings to produce a level of privacy that is right for your needs. A student may report on a variety of different browsers. Common browsers include:
Microsoft Internet Explorer, Version 5.50.4522.1800CO, Cipher Strength 128 bit, Copyright 1995-2000
Microsoft Internet Explorer, Version 5.00.2314.1003CO, Cipher Strength 40 bit, Copyright 1995-1999
Netscape Communicator 4.75, Copyright 1994-2000
A student may list the cookie settings as:
Allow cookies that are stored on your computer: ENABLED [or Disabled or Prompt]
All per-session cookies (not stored): ENABLED [or Disabled or Prompt]
To enable more protection, a student may say that they plan to use the Prompt option to ensure closer scrutiny of individual cookies.
4.
Adjust your browser settings so that you are prompted whenever a Web server attempts to send a cookie to your computer. Go to several of your favorite Web sites and watch for third-party cookies. When you receive a message from a third-party Web site, record the name of the third-party Web site and the contents of the cookie that is attempting to send. Finally, indicate whether or not you would typically accept such a cookie.
Students may list 2 to 5 of their favorite sites. Each site should report that either there were no third party cookies, or information on the third party cookie. For example:
Amazon.com: There were many cookie prompts during my Amazon.com session, but all seemed to come directly from the Amazon.com company.
ConsumerReports.org: The Consumer Reports site generated both direct and third party cookies. Some of the third party cookies included: session id, overturn.com, and ad.link.synergy.com. I would not oppose the use of any of these third party cookies because all of them showed an expiration date of “end of session.”
Other possible student comments: There was one site whose cookie showed Dec. 4th 2011 as the expiration date. I would not want a third party cookie of this duration saved onto my hard drive.
Lab 6-C – Web Security Settings
1.
Start the interactive part of the lab. Insert your Tracking Disk if you want to save your QuickCheck results. Perform each of the lab steps as directed, and answer all of the lab QuickCheck questions. When you exit the lab, your answers are automatically graded and your results are displayed.
Student answers are on file.
2.
Check the Internet zone security setting on the computer that you typically use. Indicate whether the setting is High, Medium, Medium-low, Low, or Custom. Describe how this setting handles ActiveX controls, downloads, and Java applets.
A student’s answer should include the information from ONE of the following columns. For example, if the Internet Security Zone on a student’s computer is medium-low, then the answers should be those boxed in red.
Abbreviation: ActiveX (AX)
3
New Perspectives on Computer Concepts, 8
th
Edition
Chapter 6 Solutions
High
Med
Med-low
Low
Download signed AX controls
Disabled
Prompt
Prompt
Enabled
Download unsigned AX controls
Disabled
Disabled
Disabled
Prompt
Initialize and script AX controls not marked as safe
Disabled
Disabled
Disabled
Prompt
Run AX controls and plug-ins
Disabled
Enabled
Enabled
Enabled
Script AX controls marked safe for scripting
Enabled
Enabled
Enabled
Enabled
File Download
Disabled
Enabled
Enabled
Enabled
Font Download
Prompt
Enabled
Enabled
Enabled
Java Permissions
High Safety
High Safety
Med Safety
Low Safety
If the student chooses “Custom” setting, each setting can be set individually.
3.
On the computer that you typically use, find out if any Web sites are listed in the Trusted or Restricted zones. Would you make changes to the list of sites for these zones? Explain why or why not.
A student’s report on the settings for Trusted and Restricted security zones should minimally have listings for the following categories.
Trusted:
Low Security
Restricted:
High Security
Download signed AX controls
Enabled
Disabled
Download unsigned AX controls
Prompt
Disabled
Initialize and script AX controls not marked as safe
Prompt
Disabled
Run AX controls and plug-ins
Enabled
Disabled
Script AX controls marked safe for scripting
Enabled
Enabled
File Download
Enabled
Disabled
Font Download
Enabled
Prompt
Java Permissions
Low Safety
High Safety
A student’s list might also include settings for these categories: Cookies, Miscellaneous, Scripting, and User Authentication.
Additionally, a student’s answer should state if they would change the sites listed in the Trusted and/or Restricted security zones. For example, a student might say that they would list Amazon.com, Schwab.com, and ConsumerReports.org under Trusted Security because all three are highly respected and reputable companies. Conversely, a student might list the site DirtyHarry.com under Restricted because they heard it was trafficked by hackers and crackers.
4.
Activate the “Prompt” setting for the “Download ActiveX controls” security setting. Use your browser to connect to http://www.infoweblinks.com/np5/samples/activex.htm
, where you should encounter an ActiveX control security alert. Use your computer’s PrtSc key to capture a screenshot of the warning. Paste the screenshot into Paint and then print it. Would you accept this ActiveX control? Why or why not?
Students should provide a screen shot of the Security Warning window from http://www.infoweblinks.com/np5/samples/activex.htm
4
New Perspectives on Computer Concepts, 8
th
Edition
Chapter 6 Solutions
Students should also state if the ActiveX control is one they would accept as well as why they would or
would not accept it. A reasonable response is: “Yes, I would accept this ActiveX control because it is ‘signed.’ The ‘More Info’ states it is a certified control from the textbook’s Web site.
I
NTERACTIVE
S
UMMARY
Section 1
The basic building blocks for today’s Web were developed in 1990 by a British scientist named Tim Berners-Lee. The Web did not “take off,” however, until 1993 when Marc Andreessen and his colleagues developed a Web browser
called Mosaic. The Web is an abstract or imaginary space of information, whereas the Internet
is the communications network that carries Web data. The Web is based on Ted Nelson’s concept of a hypertext
—a series of documents that are stored electronically and linked together according to logical relationships. On today’s Web, these documents are stored in HTML
format and then displayed as Web pages
by a browser. HTML is a set of specifications for creating documents that contain special instructions called HTML tags
, which specify how the document should appear when displayed on a computer screen. In an HTML document, these tags are set apart from normal text by angle
brackets. In addition to HTML documents, Web browsers are designed to deal with graphics
file formats, such as GIF, JPEG, and PNG. A browser can also work with other file formats if the necessary helper application, plug-in, or player
has been installed.
HTML documents are transmitted from a Web server to a browser by means of the HTTP
protocol. This protocol is stateless
, which means that as soon as a request is fulfilled, the Web server “forgets” that your browser ever made a request. To keep track of an individual who clicks through several pages on a Web site, a Web server resorts to a cookie
—a small chunk of data that is generated by a Web server, sent to a browser, and then stored on the client computer’s hard disk.
1.
browser
2.
Internet
3.
hypertext
4.
HTML, hypertext markup language
5.
pages
6.
tags
7.
angle
8.
graphics, graphical
9.
player
10.
HTTP, hypertext transfer
11. stateless
5
New Perspectives on Computer Concepts, 8
th
Edition
Chapter 6 Solutions
12.
a cookie, cookies
Section 2
Many software tools are available today that make it easy to create Web pages. A Web page author can use a text
editor, such as Notepad, to create Web pages “from scratch” by manually embedding HTML tags within the text of a document. It is also possible to use the HTML conversion routines included with many standard software applications. Another route is to use specialized Web authoring
software, such as Microsoft FrontPage. An HTML document is divided into two sections. The head
section contains information used to define global properties for the document. The body
section contains the text you want the browser to display, the HTML tags that format the text, and a variety of links. In addition to embedding HTML tags within the text, a Web page can be formatted with a cascading
style sheet, which allows Web page designers to change formats throughout an HTML document without modifying individual HTML tags. In addition to formatting specifications, HTML tags can be used to add graphics and links to Web pages. The <img src> tag can be used to specify a graphic
. The <a href> tag is used to specify a link
. Graphics and links can be combined to create an image
map that contains clickable hot spots. To control the position of text and graphics on a Web page, many authors place these elements in the cells of a table
. In the context of Web pages, a frame
is part of a Web page that scrolls independently of other parts of the Web page.
1.
text 2.
authoring, editing
3.
head
4.
body
5.
cascading, external
6.
graphic, image
7.
link, hyperlink
8.
image
9.
table, Web page table
10.
frame, HTML frame
Section 3
HTML was designed to create static Web pages. With basic HTML, once a Web page appeared in a browser
window, the only way to change the appearance of the page was to download an update to the entire page. DHTML
is a method for updating Web pages “on the fly”—typically as the result of a mouseover or a mouse click. A technology called XML
can be used to incorporate structured data, such as spreadsheet data or database records, into a text file by adding special-purpose tags. These tags explicitly identify a particular kind of information, much like a field heading in a database
. A technology called XSL
is similar to XML, but can be used to create customized HTML tags that control the appearance of an XML document. Another way to add animation and interactivity to Web pages is to use scripting
languages, such as JavaScript and VBScript. Unfortunately, browsers offer slightly different support for these languages, which sometimes results in a scripting
error if the browser can’t execute a particular instruction. In addition
to JavaScript and VBScript, Java has become a popular programming tool for Web-based projects. Small Java programs are referred to as Java applets
. ActiveX provides another Web development tool. An ActiveX control
is a compiled computer program that can be referenced from within an HTML document, downloaded, installed on your computer, and executed within the browser window. This technology has potential security loopholes, which can be avoided by the use of digital certificate
.
1.
DHTML, Dynamic HTML
2.
XML, Extensible Markup Language
3.
database
4.
XSL, eXtensible Stylesheet Language
5.
scripting
6.
scripting
6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Html
arrow_forward
Computer Science
HTML5
Example source code of API with jQuery and incorporating social media plugins
arrow_forward
On a web browser, how are add-on extensions implemented?
arrow_forward
Html Webgl transformer,
Html and Javascript code: https://jsfiddle.net/j25Lpte9
What should come in line 70 in javascript of code?
arrow_forward
Contrast word processing and presentation software that is open source with those that are proprietary. Email clients and web browsers available for free use
arrow_forward
Design and development of web pages using HTML Tables and forms. Topic - Online Library
**Please code should be on the topic of online library only.**
NEED CODE WITH OUTPUTS
arrow_forward
please can you help me with this
Creation of a PHP and MySQL question and answer system and javascript, website with xamppA system that allows users to post a question and receive responses from other users with login and user registration
arrow_forward
Give an example of open source word processing or presentation
software and compare it to a proprietary software. Free and
shareware email clients and internet browsers
arrow_forward
lwc (light web component)
need help making calendar that shows Activity and not Opportunity, found a lot online but it only reads Opportunity only
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Related Questions
- Html Webgl transformer, Html and Javascript code: https://jsfiddle.net/j25Lpte9 What should come in line 70 in javascript of code?arrow_forwardContrast word processing and presentation software that is open source with those that are proprietary. Email clients and web browsers available for free usearrow_forwardDesign and development of web pages using HTML Tables and forms. Topic - Online Library **Please code should be on the topic of online library only.** NEED CODE WITH OUTPUTSarrow_forward
- please can you help me with this Creation of a PHP and MySQL question and answer system and javascript, website with xamppA system that allows users to post a question and receive responses from other users with login and user registrationarrow_forwardGive an example of open source word processing or presentation software and compare it to a proprietary software. Free and shareware email clients and internet browsersarrow_forwardlwc (light web component) need help making calendar that shows Activity and not Opportunity, found a lot online but it only reads Opportunity onlyarrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Microsoft Windows 10 Comprehensive 2019Computer ScienceISBN:9780357392607Author:FREUNDPublisher:CengagePrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
- COMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE L
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L