Exam 13: Behind the Scenes: How the Internet Works
Exam 1: Using Technology to Change the World72 Questions
Exam 2: Looking at Computers: Understanding the Parts75 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources75 Questions
Exam 4: Application Software: Programs That Let You Work and Play75 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management74 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System75 Questions
Exam 7: Networking: Connecting Computing Devices75 Questions
Exam 8: Digital Devices and Media: Managing a Digital Lifestyle75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices75 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World75 Questions
Exam 13: Behind the Scenes: How the Internet Works75 Questions
Exam 14: Tif 1: the History of the Personal Computer38 Questions
Exam 15: Tif 2: Information Technology Ethics37 Questions
Exam 16: Tif 3: Under the Hood38 Questions
Exam 17: Tif 4: Careers in It38 Questions
Select questions type
In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for decoding.
(Short Answer)
4.9/5
(44)
The ________ defines items on a web page such as graphics, tables, and headers as objects.
(Multiple Choice)
4.9/5
(45)
Transport Layer Security (TLS) and ________ are two protocols that provide data integrity and security for Internet transmission.
(Short Answer)
4.8/5
(36)
File Transfer Protocol (FTP) is used to transmit e-mail messages across the Internet.
(True/False)
4.7/5
(43)
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.
(Multiple Choice)
4.8/5
(44)
FTP enables files to be downloaded or uploaded between computers.
(True/False)
4.7/5
(35)
By adding a network prefix to an IP address, supernetting or ________ lets a single IP address represent multiple unique IP addresses.
(Multiple Choice)
4.9/5
(35)
The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.
(Multiple Choice)
4.9/5
(48)
________ is the process of encoding e-mail so that only the person with a corresponding key can decode and read the message.
(Short Answer)
4.8/5
(38)
A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.
(Multiple Choice)
4.7/5
(28)
Showing 61 - 75 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)