Download presentation
Presentation is loading. Please wait.
2
Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8
3
A _________ is a clip of audio or video content that is broadcast over the Internet using compressed audio files such as MP3s. podcast
4
Which of the following is the relatively new scam that attempts to trick you into giving away confidential information through the use of official-looking e- mails and phony Web sites? phishing
5
Often used to personalize a Web site and make return visits more efficient, a ___________ is stored on your computer by the Web server. cookie
6
A computer is identified by a(n) __________ so that data sent over the Internet gets sent to the correct computer. IP Address
7
The technology that allows you to listen to a music file while it is being downloaded from a Web site to your browser, without waiting for the download to finish, is called Streaming audio
8
_______ refers to the process of coding e-mail so that only the person with the key to the code can decode and read the message. Encryption
9
____________ is a client-side, small application that resides on a server. applet
10
The communications method whereby data is broken into smaller chunks that are sent over various routes at the same time is Packet switching
11
Secure Sockets Layer: a.) provides an authentication and password protection. b.) creates a safe connection between a client and a server. c.) is an extension to the HTTP protocol. d.) was created especially for the transfer of hypertext documents. b.) creates a safe connection between a client and a server.
12
Which protocol is used on the Internet for data transmission? TCP/IP HTTP UDP FTP TCP/IP
13
All network nodes (computers and peripherals) are connected to each other and to the network by Transmission media
14
Which of the following attaches to a network and provides wireless nodes with a means of wirelessly connecting to the network? Wireless Access Point
15
Public places at which you can wirelessly connect to the Internet are known as hotspots
16
A _____________ is defined as anyone who breaks into a computer system (whether an individual computer or a network) unlawfully. hacker
17
Whatis the weakest link in a computer security system? The user
18
A LAN is most likely to be used for which geographical area? a.) building. b.) metropolitan area. c.) town. d.) country. a. building
19
___________ topology is the most widely deployed client/server network layout in businesses today because it offers the most flexibility. Star
20
To flow through a network, data is broken into small segments called packets
21
Which of the cable types has the highest run length and the highest installation cost? Fiber-optic
22
A firewall ensures that incoming data came from a valid source by using a technique known as Packet screening
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.