View
221
Download
1
Tags:
Embed Size (px)
Citation preview
Nasca 2007
200 200 200 200
400 400 400 400
600 600 600 600
800 800 800 800
1000 1000 1000 1000
Internet Ch. 5 Internet Ch. 8 Networking and Security Ch. 6
Networking and Security Ch. 8
A _________ is a clip of audio or video content that is
broadcast over the Internet using compressed audio files
such as MP3s.
podcast
Which of the following is the relatively new scam that attempts to
trick you into giving away confidential information through the
use of official-looking e-mails and phony Web sites?
phishing
Often used to personalize a Web site and make return visits more
efficient, a ___________ is stored on your computer by the Web server.
cookie
A computer is identified by a(n) __________ so that data sent over the Internet gets
sent to the correct computer.
IP Address
The technology that allows you to listen to a music file while it is being downloaded from a Web site to your
browser, without waiting for the download to finish, is called
Streaming audio
_______ refers to the process of coding e-mail so that only the
person with the key to the code can decode and read the
message.
Encryption
____________ is a client-side, small application that resides on
a server.
applet
The communications method whereby data is broken into
smaller chunks that are sent over various routes at the same time
is
Packet switching
Secure Sockets Layer:a.) provides an authentication and password protection.
b.) creates a safe connection between a client and a server.
c.) is an extension to the HTTP protocol. d.) was created especially for the transfer of hypertext
documents.
b.) creates a safe connection between a
client and a server.
Which protocol is used on the Internet for data transmission?
TCP/IPHTTPUDPFTP
TCP/IP
All network nodes (computers and peripherals) are connected to each other
and to the network by
Transmission media
Which of the following attaches to a network and provides wireless nodes with a means of wirelessly
connecting to the network?
Wireless Access Point
Public places at which you can wirelessly connect to the
Internet are known as
hotspots
A _____________ is defined as anyone who breaks into a
computer system (whether an individual computer or a
network) unlawfully.
hacker
Whatis the weakest link in a computer security system?
The user
A LAN is most likely to be used for which geographical area?
a.) building. b.) metropolitan area.
c.) town. d.) country.
a. building
___________ topology is the most widely deployed client/server network layout in businesses
today because it offers the most flexibility.
Star
To flow through a network, data is broken into small
segments called
packets
Which of the cable types has the highest run length and
the highest installation cost?
Fiber-optic
A firewall ensures that incoming data came from a
valid source by using a technique known as
Packet screening