48
START

Juego de ingles tecnico

Embed Size (px)

Citation preview

Presentacin de PowerPoint

ENGLISH GAME

START

INSTRUCTIONSMUST ANSWER ALL QUESTIONS CORRECTLY CLICK TO GIVING YOU THINK ESPONSE IS CORRECT.

IF YOU MISS MUST IN NO ANSWER BACK TO INICAR GAME OR LEAVE HIM.START THE GAME

1. Is the treatment of the data contained in a packet to prevent anyone but the recipient can read them. There are many types of data encryption, which are the basis of network security ?A. ENCRYPTIONB. ENCRYPTATIONC. SEGURITYD. INFORMATION

PLAY AGAINEXIT GAME

NEXT

2. Connecting universities and European research centers through e-mail and file transfer services using the Bitnet network. See also: "BITNET ?A. ANTIVIRUSB. ENVY C. EVENTD. EUROPEAN ACADEMIC AND RESEARCH NETWORK (EARN)

PLAY AGAINEXIT GAME

NEXT

3. Data network to provide service to a maximum area of a few square kilometers, which can improve the protocols for network signal to reach transmission speeds of up to 100 mbps (100 million bits per second) ?A. WLANB. NETWORK C. LOCAL AREA NETWORK (LAN)D. WEBSITE

PLAY AGAINEXIT GAME

NEXT

4. Distributed information system, hypertext mechanisms created by researchers at CERN in Switzerland. Users can create, edit and view hypertext documents. Your client and server can be easily accessed ?A. HTTPB. World Wide Web (WWW or W3)C. HTTPSD. Wide Area Information Servers (WAIS)

PLAY AGAINEXIT GAME

NEXT

5. Acronym the World Wide Web?A. WWEB. WWW OR W3C. AWWWD. HTTPS

PLAY AGAINEXIT GAME

NEXT

6. Program that duplicates itself in a computer system incorporating other programs that are used by multiple systems. These programs can cause problems of varying severity on systems that store ?A. VIDEO-ON-DEMANDB. INFECTION IN YOUR PC C. VIRUSD. BACTERIA

PLAY AGAINEXIT GAME

NEXT

7. Program used to test whether a destination is available. The term is also used colloquially: "make a" ping "to the" host "X to see if it works. ?A. PACKET INTERNET GROPER (PING)B. PACKET INTERNET C. PNG D. PREVIEW

PLAY AGAINEXIT GAME

NEXT

8. Addressable device connected to a computer network ?A. CATHODEB. CATIONC. ANODO D. NODE

PLAY AGAINEXIT GAME

NEXT

9. The NII is the official name of the data highway in the United States ?A. NATIONAL INFORMATION INFRASTRUCTURE B. NATIONAL INFORMATION INFRACTRUCTURE C. NATIONAL SEGURITY INTERNATIONALD. NATIONAL SECURITY COUNCIL

PLAY AGAINEXIT GAME

NEXT

10. Acronym the Local Area NetworkA. LAN B. LNAC. LANWD. WLAN

PLAY AGAINEXIT GAME

NEXT

11. Pioneer long distance network based initial research networks ?A. BIOS B. ARPANET C. ADVICE D. AGENT

PLAY AGAINEXIT GAME

NEXT

12. Protects the computer virus?A. PROGRAM B. ANTIBACTERIA C. ANTIVIRUSD. APPLET

PLAY AGAINEXIT GAME

NEXT

13. Verifying the identity of a person or process ?A. CHECKOUTB. COMPROBATIONC. PERSOND. AUTHENTICATION

PLAY AGAINEXIT GAME

NEXT

14. Service search utility data, distributed and multiplied. Its main use is to search for IP addresses of host systems ("hosts") based on the names of these. The style name "hosts" currently used on the internet is called ?A. DOMAIN B. POSSESSION C. MEMBERSHIPD. ABUSE

PLAY AGAINEXIT GAME

NEXT

15. Is the name given to the data highway that will cover the entire planet ?A. GOPHER B. GII C. GATEWAYD. GLOBAL INFORMATION INFRASTRUCTURE

PLAY AGAINEXIT GAME

EXIT GAMEPLAY AGAIN

47

null272554.28null272554.28null10109.385null4989.399