Exam 13: Behind the Scenes: How the Internet Works
Exam 1: The Impact of Technology in a Changing World120 Questions
Exam 2: Looking at Computers: Understanding the Parts140 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources129 Questions
Exam 4: Application Software: Programs That Let You Work and Play124 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management133 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System134 Questions
Exam 7: Networking: Connecting Computing Devices132 Questions
Exam 8: Managing a Digital Lifestyle: Challenges and Ethics128 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices135 Questions
Exam 10: Behind the Scenes: Software Programming130 Questions
Exam 11: Behind the Scenes: Databases and Information Systems134 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World127 Questions
Exam 13: Behind the Scenes: How the Internet Works124 Questions
Exam 14: Technology In Action Complete: Appendix A41 Questions
Exam 15: Technology In Action Complete: Appendix B36 Questions
Select questions type
Which protocol uses standard Internet connections to make phone calls over the Internet?
(Multiple Choice)
4.8/5
(34)
________ permits two or more people to communicate over the Internet in real time.
(Multiple Choice)
4.9/5
(42)
In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for decoding.
(Short Answer)
4.8/5
(38)
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server.
(Multiple Choice)
4.7/5
(41)
Match each of the following servers to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(29)
When only the two parties involved in sending a message have the code, this is called ________-key encryption.
(Multiple Choice)
4.9/5
(37)
Match each of the following terms to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(34)
________ is a method of communication in which a dedicated connection is formed between two points and the connection remains active during the transmission.
(Short Answer)
4.8/5
(43)
________ is a commonly used scripting language for creating DHTML effects.
(Short Answer)
4.8/5
(34)
________ is the main protocol suite developed for the Internet.
(Short Answer)
4.8/5
(32)
________ is the process of encoding e-mail so that only the person with a corresponding key can decode and read the message.
(Short Answer)
4.8/5
(38)
When using ________-key encryption, only the message sender and recipient have the code.
(Short Answer)
4.9/5
(27)
The ________ is a consortium of organizations that develops web protocols and sets standards.
(Short Answer)
4.7/5
(34)
File Transfer Protocol (FTP) is used to transmit e-mail messages across the Internet.
(True/False)
4.9/5
(48)
An applet is a small application that resides on a server but is downloaded to, and run on, the client computer.
(True/False)
4.8/5
(36)
Match each of the following terms to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(31)
Match each of the following TCP/IP suite protocols to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(31)
Showing 101 - 120 of 124
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)