Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8
A _________ is a clip of audio or video content that is broadcast over the Internet using compressed audio files such as MP3s. podcast
Which of the following is the relatively new scam that attempts to trick you into giving away confidential information through the use of official-looking e- mails and phony Web sites? phishing
Often used to personalize a Web site and make return visits more efficient, a ___________ is stored on your computer by the Web server. cookie
A computer is identified by a(n) __________ so that data sent over the Internet gets sent to the correct computer. IP Address
The technology that allows you to listen to a music file while it is being downloaded from a Web site to your browser, without waiting for the download to finish, is called Streaming audio
_______ refers to the process of coding so that only the person with the key to the code can decode and read the message. Encryption
____________ is a client-side, small application that resides on a server. applet
The communications method whereby data is broken into smaller chunks that are sent over various routes at the same time is Packet switching
Secure Sockets Layer: a.) provides an authentication and password protection. b.) creates a safe connection between a client and a server. c.) is an extension to the HTTP protocol. d.) was created especially for the transfer of hypertext documents. b.) creates a safe connection between a client and a server.
Which protocol is used on the Internet for data transmission? TCP/IP HTTP UDP FTP TCP/IP
All network nodes (computers and peripherals) are connected to each other and to the network by Transmission media
Which of the following attaches to a network and provides wireless nodes with a means of wirelessly connecting to the network? Wireless Access Point
Public places at which you can wirelessly connect to the Internet are known as hotspots
A _____________ is defined as anyone who breaks into a computer system (whether an individual computer or a network) unlawfully. hacker
Whatis the weakest link in a computer security system? The user
A LAN is most likely to be used for which geographical area? a.) building. b.) metropolitan area. c.) town. d.) country. a. building
___________ topology is the most widely deployed client/server network layout in businesses today because it offers the most flexibility. Star
To flow through a network, data is broken into small segments called packets
Which of the cable types has the highest run length and the highest installation cost? Fiber-optic
A firewall ensures that incoming data came from a valid source by using a technique known as Packet screening