Exam 13: Behind the Scenes: How the Internet Works
Exam 1: Using Technology to Change the World75 Questions
Exam 2: Looking at Computers: Understanding the Parts74 Questions
Exam 3: Using the Internet: Making the Most of the Web's Resources76 Questions
Exam 4: Application Software: Programs That Let You Work and Play74 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System75 Questions
Exam 7: Networking: Connecting Computing Devices75 Questions
Exam 8: Digital Devices and Media: Managing a Digital Lifestyle75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices75 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World76 Questions
Exam 13: Behind the Scenes: How the Internet Works74 Questions
Exam 14: The History of the Personal Computer41 Questions
Exam 5: System Software: The Operating System, Utility Programs, and File Management73 Questions
Exam 15: Information Technology Ethics37 Questions
Exam 16: Under the Hood38 Questions
Exam 17: Careers in IT38 Questions
Select questions type
In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for decoding.
(Short Answer)
4.8/5
(33)
________ combines HTML, cascading style sheets, and JavaScript.
(Short Answer)
4.8/5
(42)
The main suite of protocols used on the Internet is ________.
(Multiple Choice)
4.8/5
(36)
In http://www.pearsonhighered.com, which of the following is the top-level domain?
(Multiple Choice)
4.8/5
(42)
________ permits two or more people to communicate over the Internet in real time.
(Multiple Choice)
4.9/5
(32)
Match each of the following TCP/IP suite protocols to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(33)
________ is a method of communication in which a dedicated connection is formed between two points and the connection remains active during the transmission.
(Short Answer)
4.8/5
(37)
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n)________ server.
(Multiple Choice)
4.9/5
(29)
________ is the process of encoding e-mail so that only the person with a corresponding key can decode and read the message.
(Short Answer)
4.9/5
(38)
A(n)________ is a small program that resides on a server and is designed to be downloaded and run on a client computer.
(Multiple Choice)
4.8/5
(43)
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.
(Multiple Choice)
4.9/5
(36)
The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.
(Multiple Choice)
4.8/5
(32)
A(n)________ links a URL to an IP address when a web page is requested.
(Short Answer)
4.8/5
(33)
Match each of the following terms to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(40)
Which of the following is NOT a language used in developing websites?
(Multiple Choice)
4.7/5
(27)
Showing 21 - 40 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)