Exam 13: Behind the Scenes: How the Internet Works
Exam 1: The Impact of Technology in a Changing World120 Questions
Exam 2: Looking at Computers: Understanding the Parts140 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources129 Questions
Exam 4: Application Software: Programs That Let You Work and Play124 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management133 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System134 Questions
Exam 7: Networking: Connecting Computing Devices132 Questions
Exam 8: Managing a Digital Lifestyle: Challenges and Ethics128 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices135 Questions
Exam 10: Behind the Scenes: Software Programming130 Questions
Exam 11: Behind the Scenes: Databases and Information Systems134 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World127 Questions
Exam 13: Behind the Scenes: How the Internet Works124 Questions
Exam 14: Technology In Action Complete: Appendix A41 Questions
Exam 15: Technology In Action Complete: Appendix B36 Questions
Select questions type
Which of the following is an example of an instant messaging service?
(Multiple Choice)
5.0/5
(39)
If a packet which is being sent between two computers is damaged in transit, a(n) ________ acknowledgment is sent.
(Short Answer)
4.9/5
(29)
Packet switching is the communications methodology where data is broken into ________ that are sent over various routes at the same time.
(Short Answer)
4.9/5
(29)
A secure website using SSL encryption will have ________ followed by ://www.websitename.com as the protocol in its URL.
(Short Answer)
4.8/5
(41)
The OpenPgP encryption protocol stands for Open Pretty Good Privacy.
(True/False)
4.9/5
(43)
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.
(Multiple Choice)
4.8/5
(36)
A(n) ________ links a URL to an IP address when a web page is requested.
(Short Answer)
4.9/5
(26)
The JavaScript ________ defines items on a web page such as graphics, tables, and headers as objects.
(Multiple Choice)
4.8/5
(31)
________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time.
(Short Answer)
4.8/5
(31)
In ________ encryption, only the two parties involved in sending a message have the code to unlock the message.
(Short Answer)
4.8/5
(41)
When using ________ addressing, a computer is assigned a temporary address from a pool of available IP addresses.
(Short Answer)
4.9/5
(40)
Transport Layer Security (TLS) and ________ are two protocols that provide data integrity and security for Internet transmission.
(Short Answer)
4.8/5
(35)
The tag <i> informs a browser that the text that follows the tag should be italicized.
(True/False)
5.0/5
(37)
Match each of the following terms to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(36)
A communications server is a specialized computer whose sole function is to store, process, and send e-mail.
(True/False)
4.9/5
(31)
________ addressing means that your ISP assigns your computer a temporary IP address from an available pool of IP addresses each time you log on to the Internet.
(Multiple Choice)
4.8/5
(33)
A(n) ________ protocol doesn't require any type of connection to be established or maintained between two computers.
(Short Answer)
4.8/5
(39)
Showing 21 - 40 of 124
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)