Exam 13: Behind the Scenes: How the Internet Works

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for decoding.

(Short Answer)
4.9/5
(44)

The ________ defines items on a web page such as graphics, tables, and headers as objects.

(Multiple Choice)
4.9/5
(45)

Dynamic IP addressing is accomplished using a DHCP server.

(True/False)
4.7/5
(39)

In http://example.gov, what is the second-level domain?

(Short Answer)
4.9/5
(30)

Transport Layer Security (TLS) and ________ are two protocols that provide data integrity and security for Internet transmission.

(Short Answer)
4.8/5
(36)

File Transfer Protocol (FTP) is used to transmit e-mail messages across the Internet.

(True/False)
4.7/5
(43)

DHTML stands for ________.

(Short Answer)
4.8/5
(29)

________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.

(Multiple Choice)
4.8/5
(44)

197.169.73.63 is an example of a(n) ________.

(Short Answer)
4.9/5
(34)

FTP enables files to be downloaded or uploaded between computers.

(True/False)
4.7/5
(35)

By adding a network prefix to an IP address, supernetting or ________ lets a single IP address represent multiple unique IP addresses.

(Multiple Choice)
4.9/5
(35)

The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.

(Multiple Choice)
4.9/5
(48)

________ is the process of encoding e-mail so that only the person with a corresponding key can decode and read the message.

(Short Answer)
4.8/5
(38)

HTML is a simple programming language.

(True/False)
4.8/5
(40)

A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.

(Multiple Choice)
4.7/5
(28)
Showing 61 - 75 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)