Exam 13: Behind the Scenes: How the Internet Works

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ provides a procedure by which a browser can request that a program file be run rather than just being delivered to the browser.

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

D

MIME stands for ________.

Free
(Short Answer)
4.7/5
(33)
Correct Answer:
Verified

Multipurpose Internet Mail Extensions

LinkedIn is one the most popular instant messaging services.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

False

In http://www.pearsonhighered.com, which of the following is the top-level domain?

(Multiple Choice)
4.8/5
(30)

Java and JavaScript refer to the same language.

(True/False)
4.8/5
(37)

________ permits two or more people to communicate over the Internet in real time.

(Multiple Choice)
4.8/5
(31)

The IPv4 protocol is beginning to be replaced by the ________ protocol.

(Short Answer)
4.7/5
(34)

<b> is an example of an HTML ________.

(Multiple Choice)
4.8/5
(34)

Which of the following is NOT a language used in developing websites?

(Multiple Choice)
4.8/5
(30)
Match each of the following terms to its definition:
key pair
a unique identification number that defines each computer, service, or other device that connects to the Internet
dynamic addressing
used in a common encryption technique
computer protocol
IP address for a computer does not change
Correct Answer:
Verified
Premises:
Responses:
key pair
a unique identification number that defines each computer, service, or other device that connects to the Internet
dynamic addressing
used in a common encryption technique
computer protocol
IP address for a computer does not change
static addressing
temporary IP address for a computer that is assigned from a pool of available IP addresses
IP address
a set of rules for exchanging electronic information
(Matching)
4.7/5
(33)

IPV6 was needed when IPV4 ________.

(Multiple Choice)
4.9/5
(30)

Client-side programs run on a web server rather than on your computer.

(True/False)
4.9/5
(35)

When using ________-key encryption, only the message sender and recipient have the code.

(Short Answer)
4.8/5
(29)

The main suite of protocols used on the Internet is ________.

(Multiple Choice)
4.8/5
(46)

<i> is an example of an HTML ________.

(Short Answer)
4.7/5
(31)
Match each of the following terms to its definition:
PGP
allocates IP address
handshaking
public-key package
packet switching
exchange of control packets between computers
Correct Answer:
Verified
Premises:
Responses:
PGP
allocates IP address
handshaking
public-key package
packet switching
exchange of control packets between computers
ICANN
breaks information down into pieces that can take different paths
circuit switching
a dedicated connection is formed between two communicating parties
(Matching)
4.8/5
(36)

Individual Internet users connect to ISPs through a(n) ________.

(Multiple Choice)
4.9/5
(40)

The ________ IP addressing scheme uses 128-bit addressing.

(Short Answer)
4.9/5
(26)

.com and .edu are examples of a(n) ________.

(Short Answer)
4.8/5
(40)

An IP address in the form 197.169.100.1 is called a(n) ________.

(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)