Deck 2: Technology Infrastructure: the Internet and the World Wide Web

Full screen (f)
exit full mode
Question
A network of computers that are located close together-for example, in the same building-is called a local area network.
Use Space or
up arrow
down arrow
to flip the card.
Question
VPN software must be installed on the computers at both ends of the transmission.
Question
The Internet provides a high degree of security in its basic structure.
Question
Domain names are sets of words that are assigned to specific IP addresses.
Question
The "virtual" part of VPN means that the connection seems to be a temporary, internal network connection, but the connection is actually permanent.
Question
At a technological level, the Web is nothing more than software that runs on computers that are connected to the Internet.
Question
IP addresses appear as five numbers separated by periods.
Question
IMAP is a newer e-mail protocol that performs the same basic functions as POP, but includes additional features.
Question
Although fax, telephone, e-mail, and overnight express carriers have been the main communications tools for business for many years, extranets can replace many of them at a lower cost.
Question
The technologies used (public networks, private networks, or VPNs)are independent of organizational boundaries.
Question
In 1989, the NSF permitted two commercial e-mail services, MCI Mail and CompuServe, to establish limited connections to the Internet for the sole purpose of exchanging e-mail transmissions with users of the Internet.
Question
SMTP is a common protocol used for sending and retrieving e-mail.
Question
The USENET was the earliest of the networks that eventually combined to become what we now call the Internet.
Question
An HTML document is similar to a word-processing document in that it specifies how a particular text element will appear.
Question
The POP protocol provides support for MIME.
Question
The Internet Corporation for Actualized Names and Nuances has the responsibility of managing domain names and coordinating them with the IP address registrars.
Question
Networks of computers and the Internet that connects them to each other form the basic technological structure that underlies virtually all electronic commerce.
Question
The set of rules for delivering Web page files over the Internet is in a protocol called the Hypertext Transfer Protocol (HTTP).
Question
E-mail was born in 1972 when a researcher wrote a program that could send and receive messages over the Defense Department network.
Question
An intranet extends beyond the organization that created it.
Question
The term cascading is used because designers can apply many style sheets to the same Web page, one on top of the other.
Question
The higher the bandwidth, the faster data files travel and the faster Web pages appear on your screen.
Question
The combination of telephone lines and the closed switches that connect them to each other is called a ____.

A)LAN
B)WAN
C)circuit
D)pathway
Question
In networking applications, an 8-bit number is often called a(n)____.

A)octet
B)netbit
C)piconet
D)bit
Question
On a packet-switched network, files and e-mail messages are broken down into small pieces, called ____.

A)messages
B)pieces
C)circuits
D)packets
Question
IPv6 uses a ___ number for addresses.

A)32-bit
B)56-bit
C)128-bit
D)256-bit
Question
____ determine how the sending device indicates that it has finished sending a message, and how the receiving device indicates that it has received the message.

A)Routers
B)Bridges
C)Protocols
D)Adapters
Question
SGML offers a system of marking up documents that is independent of any software application.
Question
The purpose of a(n)____ is to respond to requests for Web pages from Web clients.

A)URL
B)e-mail
C)Web server
D)top-level domain
Question
Routers and the telecommunications lines connecting them are collectively referred to as ____.

A)backbone routers
B)Internet routers
C)an asynchronous backbone
D)the Internet backbone
Question
HTML is a meta language because users can create their own markup elements that extend the usefulness of XML.
Question
A ____ is a collection of rules for formatting, ordering, and error checking data sent across a network.

A)routing algorithm
B)backbone router
C)protocol
D)packet
Question
A(n)____ is like a separate, covered commuter lane on a highway (the Internet)in which passengers are protected from being seen by the vehicles traveling in the other lanes.

A)VPN
B)IP wrapper
C)extranet
D)IAP
Question
A computer called a ____ converts private IP addresses into normal IP address when it forwards packets from those computers to the Internet.

A)routing algorithm device
B)network address translation device
C)subnet translation device
D)private network device
Question
The ____ numbering system uses 16 characters.

A)hexadecimal
B)decimal
C)binary
D)ASCII
Question
Network engineers have devised a number of stopgap techniques to stretch the supply of IP addresses.One of the most popular techniques is ____.

A)subnetting
B)subletting
C)sub-blocking
D)piconetting
Question
A(n)____ does not extend beyond the boundaries of a particular organization.

A)Internet
B)extranet
C)intranet
D)ARPANET
Question
Asymmetric connections provide the same bandwidth for each direction.
Question
A(n)____ is a connection that uses public networks and their protocols to send data in a way that protects the data as well as a private network would, but at a lower cost.

A)public network
B)virtual public network
C)virtual private network
D)private network
Question
When packets leave a network to travel on the Internet, they must be translated into a standard format.____ usually perform this translation function.

A)Switches
B)Bridges
C)Routers
D)Routing algorithms
Question
____ specifies the format of a mail message and describes how mail is to be administered on the e-mail server and transmitted on the Internet.

A)SMTP
B)TCP/IP
C)MIME
D)POP
Question
A network which uses a specific set of rules and connects networks all over the world to each other, is called the ____________________.
Question
The early versions of ____ let Web page designers create text-based electronic documents with headings, title bar titles, bullets, lines, and ordered lists.

A)HTTP
B)HTML
C)SGML
D)XML
Question
A newer e-mail protocol that performs the same basic functions as POP, but includes additional features, is known as ____.

A)IMAP
B)SMTP
C)POPI
D)IPOP
Question
____________________ providers sell Internet access rights directly to larger customers and indirectly to smaller firms and individuals through other companies, called ISPs.
Question
____ is a set of rules for handling binary files, such as word-processing documents, spreadsheets, photos, or sound clips, that are attached to e-mail messages.

A)IMAP
B)MIME
C)SMTP
D)POP
Question
In HTML, hyperlinks are created using the HTML ____ tag.

A)head
B)anchor
C)title
D)ol
Question
The combination of the protocol name and the domain name is called the ____.

A)URT
B)URO
C)URL
D)HTTP
Question
A computer ____________________ is any technology that allows people to connect computers to each computer.
Question
____ lets users create and manipulate e-mail folders and individual e-mail messages while the messages are still on the e-mail server.

A)POP
B)SMTP
C)IMAP
D)MIME
Question
____ was the first Web browser that became widely available for personal computers.

A)Mosaic
B)Netscape
C)Internet Explorer
D)CompuServe
Question
Usenet survives on the Internet today, with more than 1000 different topic areas that are called ____________________.
Question
A(n)____________________ is an e-mail address that forwards any message it receives to any user subscribed to the list.
Question
The routers connected to the Internet backbone are sometimes called ____________________ routers.
Question
In 1979, a group of students and programmers at Duke University and the University of North Carolina started ____________________, which allows anyone who connects to the network to read and post articles on a variety of subjects.
Question
____ are sets of words that are assigned to specific IP addresses.

A)Domain names
B)URLs
C)Octets
D)Piconets
Question
HTML was developed by ____.

A)ARPANET
B)NSF
C)Ted Nelson
D)Tim Berners-Lee
Question
Internet ____________________ are computers that are directly connected to the Internet.
Question
The part of the Internet known as the ____________________ is a subset of the computers on the Internet that are connected to one other in a specific way that makes them and their contents easily accessible to each other.
Question
Programs apply their routing algorithms to information they have stored in routing tables or ____________________ tables.
Question
Upstream bandwidth is also called ____________________ bandwidth.
Question
In HTML, the text elements that are related to each another are called ____________________ elements.
Question
____________________ is the amount of data that can travel through a communication medium per unit of time.
Question
The set of rules for delivering Web page files over the Internet is in a protocol called the ____________________.
Question
What is the difference between a public network and a private network?
Question
A(n)____________________ is used when the internet extends beyond the boundaries of an organization.
Question
What are the advantages of Bluetooth technology?
Question
A(n)____________________ server is a computer that stores files written in Hypertext Markup Language (HTML).
Question
Identify the four key rules for message handling.
Question
An XML document is embedded within the ____________________ document.
Question
____________________ let designers define formatting styles that can be applied to multiple Web pages.
Question
____________________ tags do not specify how text appears on a Web page; the tags convey the meaning (the semantics)of the information included within them.
Question
A(n)____________________ is any computer network or telecommunications network that is available to the public.
Question
A(n)____________________ is a language that can be used to define other languages.
Question
A(n)____________________ hyperlink structure resembles conventional paper documents in that the reader begins on the first page and clicks a Next button to move to the next page in a serial fashion.
Question
The ____________________ Protocol controls the disassembly of a message or a file into packets before it is transmitted over the Internet, and it controls the reassembly of those packets into their original formats when they reach their destinations.
Question
What is the difference between TCP and IP?
Question
The ____________________ Protocol specifies the addressing details for each packet, labeling each with the packet's origination and destination addresses.
Question
HTML, XML, and XHTML have descended from the original ____________________ specification.
Question
As an individual packet travels from one network to another, the computers through which the packet travels determine the best route for getting the packet to its destination.Describe this process.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Technology Infrastructure: the Internet and the World Wide Web
1
A network of computers that are located close together-for example, in the same building-is called a local area network.
True
2
VPN software must be installed on the computers at both ends of the transmission.
True
3
The Internet provides a high degree of security in its basic structure.
False
4
Domain names are sets of words that are assigned to specific IP addresses.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
The "virtual" part of VPN means that the connection seems to be a temporary, internal network connection, but the connection is actually permanent.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
At a technological level, the Web is nothing more than software that runs on computers that are connected to the Internet.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
IP addresses appear as five numbers separated by periods.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
IMAP is a newer e-mail protocol that performs the same basic functions as POP, but includes additional features.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
Although fax, telephone, e-mail, and overnight express carriers have been the main communications tools for business for many years, extranets can replace many of them at a lower cost.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
The technologies used (public networks, private networks, or VPNs)are independent of organizational boundaries.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
In 1989, the NSF permitted two commercial e-mail services, MCI Mail and CompuServe, to establish limited connections to the Internet for the sole purpose of exchanging e-mail transmissions with users of the Internet.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
SMTP is a common protocol used for sending and retrieving e-mail.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
The USENET was the earliest of the networks that eventually combined to become what we now call the Internet.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
An HTML document is similar to a word-processing document in that it specifies how a particular text element will appear.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
The POP protocol provides support for MIME.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
The Internet Corporation for Actualized Names and Nuances has the responsibility of managing domain names and coordinating them with the IP address registrars.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
Networks of computers and the Internet that connects them to each other form the basic technological structure that underlies virtually all electronic commerce.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
The set of rules for delivering Web page files over the Internet is in a protocol called the Hypertext Transfer Protocol (HTTP).
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
E-mail was born in 1972 when a researcher wrote a program that could send and receive messages over the Defense Department network.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
An intranet extends beyond the organization that created it.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
The term cascading is used because designers can apply many style sheets to the same Web page, one on top of the other.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
The higher the bandwidth, the faster data files travel and the faster Web pages appear on your screen.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
The combination of telephone lines and the closed switches that connect them to each other is called a ____.

A)LAN
B)WAN
C)circuit
D)pathway
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
In networking applications, an 8-bit number is often called a(n)____.

A)octet
B)netbit
C)piconet
D)bit
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
On a packet-switched network, files and e-mail messages are broken down into small pieces, called ____.

A)messages
B)pieces
C)circuits
D)packets
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
IPv6 uses a ___ number for addresses.

A)32-bit
B)56-bit
C)128-bit
D)256-bit
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
____ determine how the sending device indicates that it has finished sending a message, and how the receiving device indicates that it has received the message.

A)Routers
B)Bridges
C)Protocols
D)Adapters
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
SGML offers a system of marking up documents that is independent of any software application.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
The purpose of a(n)____ is to respond to requests for Web pages from Web clients.

A)URL
B)e-mail
C)Web server
D)top-level domain
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
Routers and the telecommunications lines connecting them are collectively referred to as ____.

A)backbone routers
B)Internet routers
C)an asynchronous backbone
D)the Internet backbone
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
HTML is a meta language because users can create their own markup elements that extend the usefulness of XML.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
A ____ is a collection of rules for formatting, ordering, and error checking data sent across a network.

A)routing algorithm
B)backbone router
C)protocol
D)packet
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
A(n)____ is like a separate, covered commuter lane on a highway (the Internet)in which passengers are protected from being seen by the vehicles traveling in the other lanes.

A)VPN
B)IP wrapper
C)extranet
D)IAP
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
A computer called a ____ converts private IP addresses into normal IP address when it forwards packets from those computers to the Internet.

A)routing algorithm device
B)network address translation device
C)subnet translation device
D)private network device
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
The ____ numbering system uses 16 characters.

A)hexadecimal
B)decimal
C)binary
D)ASCII
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
Network engineers have devised a number of stopgap techniques to stretch the supply of IP addresses.One of the most popular techniques is ____.

A)subnetting
B)subletting
C)sub-blocking
D)piconetting
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
A(n)____ does not extend beyond the boundaries of a particular organization.

A)Internet
B)extranet
C)intranet
D)ARPANET
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
Asymmetric connections provide the same bandwidth for each direction.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
A(n)____ is a connection that uses public networks and their protocols to send data in a way that protects the data as well as a private network would, but at a lower cost.

A)public network
B)virtual public network
C)virtual private network
D)private network
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
When packets leave a network to travel on the Internet, they must be translated into a standard format.____ usually perform this translation function.

A)Switches
B)Bridges
C)Routers
D)Routing algorithms
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
____ specifies the format of a mail message and describes how mail is to be administered on the e-mail server and transmitted on the Internet.

A)SMTP
B)TCP/IP
C)MIME
D)POP
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
A network which uses a specific set of rules and connects networks all over the world to each other, is called the ____________________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
The early versions of ____ let Web page designers create text-based electronic documents with headings, title bar titles, bullets, lines, and ordered lists.

A)HTTP
B)HTML
C)SGML
D)XML
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
A newer e-mail protocol that performs the same basic functions as POP, but includes additional features, is known as ____.

A)IMAP
B)SMTP
C)POPI
D)IPOP
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
____________________ providers sell Internet access rights directly to larger customers and indirectly to smaller firms and individuals through other companies, called ISPs.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
____ is a set of rules for handling binary files, such as word-processing documents, spreadsheets, photos, or sound clips, that are attached to e-mail messages.

A)IMAP
B)MIME
C)SMTP
D)POP
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
In HTML, hyperlinks are created using the HTML ____ tag.

A)head
B)anchor
C)title
D)ol
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
The combination of the protocol name and the domain name is called the ____.

A)URT
B)URO
C)URL
D)HTTP
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
A computer ____________________ is any technology that allows people to connect computers to each computer.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
____ lets users create and manipulate e-mail folders and individual e-mail messages while the messages are still on the e-mail server.

A)POP
B)SMTP
C)IMAP
D)MIME
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
____ was the first Web browser that became widely available for personal computers.

A)Mosaic
B)Netscape
C)Internet Explorer
D)CompuServe
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
Usenet survives on the Internet today, with more than 1000 different topic areas that are called ____________________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
A(n)____________________ is an e-mail address that forwards any message it receives to any user subscribed to the list.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
The routers connected to the Internet backbone are sometimes called ____________________ routers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
In 1979, a group of students and programmers at Duke University and the University of North Carolina started ____________________, which allows anyone who connects to the network to read and post articles on a variety of subjects.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
____ are sets of words that are assigned to specific IP addresses.

A)Domain names
B)URLs
C)Octets
D)Piconets
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
HTML was developed by ____.

A)ARPANET
B)NSF
C)Ted Nelson
D)Tim Berners-Lee
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
Internet ____________________ are computers that are directly connected to the Internet.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
The part of the Internet known as the ____________________ is a subset of the computers on the Internet that are connected to one other in a specific way that makes them and their contents easily accessible to each other.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
Programs apply their routing algorithms to information they have stored in routing tables or ____________________ tables.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
Upstream bandwidth is also called ____________________ bandwidth.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
In HTML, the text elements that are related to each another are called ____________________ elements.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
____________________ is the amount of data that can travel through a communication medium per unit of time.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
The set of rules for delivering Web page files over the Internet is in a protocol called the ____________________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
What is the difference between a public network and a private network?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
A(n)____________________ is used when the internet extends beyond the boundaries of an organization.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
What are the advantages of Bluetooth technology?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
A(n)____________________ server is a computer that stores files written in Hypertext Markup Language (HTML).
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
Identify the four key rules for message handling.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
An XML document is embedded within the ____________________ document.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
____________________ let designers define formatting styles that can be applied to multiple Web pages.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
____________________ tags do not specify how text appears on a Web page; the tags convey the meaning (the semantics)of the information included within them.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
A(n)____________________ is any computer network or telecommunications network that is available to the public.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
A(n)____________________ is a language that can be used to define other languages.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
A(n)____________________ hyperlink structure resembles conventional paper documents in that the reader begins on the first page and clicks a Next button to move to the next page in a serial fashion.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
The ____________________ Protocol controls the disassembly of a message or a file into packets before it is transmitted over the Internet, and it controls the reassembly of those packets into their original formats when they reach their destinations.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
What is the difference between TCP and IP?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
The ____________________ Protocol specifies the addressing details for each packet, labeling each with the packet's origination and destination addresses.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
HTML, XML, and XHTML have descended from the original ____________________ specification.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
As an individual packet travels from one network to another, the computers through which the packet travels determine the best route for getting the packet to its destination.Describe this process.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 80 flashcards in this deck.