Exam 13: Behind the Scenes: How the Internet Works

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The main path of the Internet along which data travel the fastest is known as the Internet ________.

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

C

A(n)________ program is a computer program that runs on the client computer and requires no interaction with a web server.

Free
(Short Answer)
4.8/5
(24)
Correct Answer:
Verified

client-side

When a(n)________ address is assigned to a computer, its IP address will not change.

Free
(Short Answer)
4.9/5
(31)
Correct Answer:
Verified

static

HTML is a simple programming language.

(True/False)
4.9/5
(42)

An IP address in the form 197.169.100.1 is called a(n)________.

(Multiple Choice)
4.8/5
(31)

Transport Layer Security (TLS)and ________ are two protocols that provide data integrity and security for Internet transmission.

(Short Answer)
4.8/5
(25)

The United States government is in charge of the Internet.

(True/False)
4.7/5
(37)

________ is a consortium of organizations that develops web protocols and sets standards.

(Short Answer)
4.7/5
(31)

A(n)________ address is a temporary IP address that is assigned from an available pool of IP addresses.

(Multiple Choice)
4.7/5
(32)
Match each of the following terms to its definition:
private-key
communication between two or more people over the Internet in real time
Internet cache
list of rules that define how to display HTML elements
cascading style sheet
section of a hard drive that stores web page information
Correct Answer:
Verified
Premises:
Responses:
private-key
communication between two or more people over the Internet in real time
Internet cache
list of rules that define how to display HTML elements
cascading style sheet
section of a hard drive that stores web page information
instant messaging
used to decode an encrypted message
second-level domain
unique domain within another domain
(Matching)
4.9/5
(25)

The IPv4 protocol is beginning to be replaced by the ________ protocol.

(Short Answer)
4.9/5
(39)

Strong encryption now requires ________-bit keys.

(Multiple Choice)
4.8/5
(34)

IPv6 uses six groups of 16-bit numbers.

(True/False)
4.9/5
(31)

In http://example.gov, what is the second-level domain?

(Short Answer)
4.8/5
(31)

________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time.

(Short Answer)
4.8/5
(32)

A typical ________ is made up of one or more network switches to which ISPs connect.

(Short Answer)
4.8/5
(36)

Client-side programs run on a web server rather than on your computer.

(True/False)
4.7/5
(31)

<i> is an example of an HTML ________.

(Short Answer)
4.8/5
(28)

When using ________ addressing, a computer is assigned a temporary address from available IP addresses.

(Short Answer)
4.9/5
(34)

________ is the most commonly used scripting language for creating DHTML effects.

(Short Answer)
4.9/5
(36)
Showing 1 - 20 of 74
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)