Deck 13: Behind the Scenes: How the Internet Works

ملء الشاشة (f)
exit full mode
سؤال
To boldface text in HTML, you would enclose your text in ________.

A) and
B) /b and b
C) *b* and */b*
D) HTM.bold.on and HTM.bold.off
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following information is NOT contained in a packet sent over the Internet?

A) The size (in bytes) of the packet
B) The address to which the packet is sent
C) The address from where the packet originates
D) The data that are transmitted
سؤال
A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.

A) dynamic
B) static
C) assigned
D) transition
سؤال
An IP address that does not change and is usually assigned manually by a network administrator or an ISP is called a ________ address.

A) dynamic
B) static
C) fixed
D) stationary
سؤال
High-speed ________ communication lines on the Internet backbone use fiber optics.

A) IP
B) OC
C) DSL
D) cable
سؤال
Which of the following was created for the transfer of hypertext documents across the Internet?

A) SSL
B) HTTP
C) FTP
D) AJAX
سؤال
In the URL http://www.pearsonhighered.com, which of the following is the top-level domain?

A) http
B) www
C) pearsonhighered
D) )com
سؤال
________ describes the website content in terms of the data that is being described rather than how it is to be displayed.

A) CGI
B) JavaScript
C) XML
D) HTML
سؤال
Individual Internet users connect to ISPs through a(n) ________.

A) User Datagram Protocol (UDP)
B) T line
C) optical carrier (OC) line
D) point of presence (POP)
سؤال
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server.

A) DNS
B) URL
C) FTP
D) XML
سؤال
An IP address in the form 197.169.100.1 is called a(n) ________.

A) sequential access number
B) dotted quad
C) encryption key
D) random number
سؤال
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.

A) Packet switching
B) An open circuit
C) Circuit switching
D) A closed circuit
سؤال
A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet.

A) TCP
B) IP
C) SMTP
D) NetBIOS
سؤال
The main suite of protocols used for transmitting data on the Internet is ________.

A) FTP
B) TCP/IP
C) SMTP
D) POP
سؤال
Which of the following is NOT used in developing websites?

A) XML
B) KML
C) DHTML
D) HTML
سؤال
The main path of the Internet along which data travels the fastest is known as the Internet ________.

A) protocol
B) highway
C) backbone
D) cache
سؤال
IPv6 was introduced when IPv4 ________.

A) became too old
B) was eliminated
C) no longer had enough unique addresses
D) was revoked
سؤال
is an example of an HTML ________.

A) marker
B) tag
C) indicator
D) key
سؤال
Which of the following organizations research new Internet technologies to improve its capabilities?

A) Internet Architecture Board
B) Internet Society
C) World Wide Web Consortium
D) Internet Engineering Task Force
سؤال
The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.

A) ISOC
B) ICANN
C) W3C
D) IAB
سؤال
Which of the following is an example of an instant messaging service?

A) LinkedIn
B) Monster
C) WhatsApp
D) Flickr
سؤال
In the acronym HTTPS, the S stands for ________.
سؤال
The JavaScript ________ defines items on a web page such as graphics, tables, and headers as objects.

A) SSL
B) MIME
C) JSON
D) DOM
سؤال
A typical ________ is made up of one or more network switches to which ISPs connect to each other.
سؤال
In public-key encryption, the two keys, one for coding and one for decoding, are known as ________.

A) code keys
B) linked keys
C) key tags
D) a key pair
سؤال
________ is a method of communication in which a dedicated connection is formed between two points and the connection remains active during the transmission.
سؤال
A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer.

A) CGI script
B) app
C) applet
D) JavaScript
سؤال
________ permits two or more people to communicate over the Internet in real time.

A) E-mail
B) Snapfish
C) Flickr
D) Instant messaging
سؤال
Within an URL, .com and .edu are examples of a(n) ________.
سؤال
A(n) ________ links a URL to an IP address when a web page is requested.
سؤال
Which protocol is used when sending files as attachments by e-mail?

A) Multipurpose Internet Mail Extensions (MIME)
B) Post Office Protocol (POP)
C) Simple Mail Transfer Protocol (SMTP)
D) User Datagram Protocol (UDP)
سؤال
The ________ is a consortium of organizations that develops web protocols and sets standards.
سؤال
________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time.
سؤال
The ________ IP addressing scheme uses 128-bit addressing.
سؤال
197.169.73.63 is an example of a(n) ________.
سؤال
When using ________ addressing, a computer is assigned a temporary address from a pool of available IP addresses.
سؤال
The IPv4 protocol is beginning to be replaced by the ________ protocol.
سؤال
Strong encryption now requires ________-bit keys.

A) 40
B) 128
C) 256
D) 512
سؤال
SMTP stands for ________.
سؤال
________ servers are computers that host software that enables users to buy goods and services over the web.
سؤال
The MIME specification stands for ________.
سؤال
PHP is a popular choice for coding ________ programs.
سؤال
FTP enables files to be downloaded or uploaded between computers.
سؤال
________ is a commonly used scripting language for creating DHTML effects.
سؤال
Dynamic IP addressing is accomplished using a DHCP server.
سؤال
In the URL http://example.gov, what is the second-level domain?
سؤال
A(n) ________ is a small program that resides on a server, is downloaded to the client, and runs when needed without additional data transfers between the client and server.
سؤال
When using packet switching, packets are always sent over the same route.
سؤال
When using ________-key encryption, only the message sender and recipient have the code.
سؤال
In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for decoding.
سؤال
is an example of an HTML ________.
سؤال
________ is the process of encoding e-mail so that only the person with a corresponding key can decode and read the message.
سؤال
________ combines HTML, cascading style sheets, and JavaScript.
سؤال
File Transfer Protocol (FTP) is used to transmit e-mail messages across the Internet.
سؤال
Transport Layer Security (TLS) and ________ are two protocols that provide data integrity and security for Internet transmission.
سؤال
IPv6 uses six groups of 16-bit numbers.
سؤال
DHTML stands for ________.
سؤال
When a(n) ________ address is assigned to a computer, its IP address will NOT change.
سؤال
The United States government is the sole country in charge of the Internet.
سؤال
A(n) ________ program is a computer program that runs on the client computer and requires no interaction with a web server.
سؤال
An applet is a small application that resides on a server but is downloaded to, and run on, the client computer.
سؤال
Node.js is used to create faster animation.
سؤال
Most instant messaging services provide a high level of encryption for their messages.
سؤال
XML technologies allow web pages to change after they have been loaded.
سؤال
Facebook Connect is one the most popular instant messaging services.
سؤال
HTML is an acronym for Highly Textual Markup Language.
سؤال
The tag informs a browser that the text that follows the tag should be italicized.
سؤال
Client-side programs run on a web server rather than on your computer.
سؤال
Java and JavaScript refer to the same language.
سؤال
Match between columns
IP
used for transmission of e-mail messages across the Internet
IP
protocol that assigns dynamic IP addresses
IP
transfers data from servers to browsers
IP
prepares data for transmission providing for error checking and resending lost data
IP
sends data between computers on the Internet
DHCP
used for transmission of e-mail messages across the Internet
DHCP
protocol that assigns dynamic IP addresses
DHCP
transfers data from servers to browsers
DHCP
prepares data for transmission providing for error checking and resending lost data
DHCP
sends data between computers on the Internet
HTTP
used for transmission of e-mail messages across the Internet
HTTP
protocol that assigns dynamic IP addresses
HTTP
transfers data from servers to browsers
HTTP
prepares data for transmission providing for error checking and resending lost data
HTTP
sends data between computers on the Internet
TCP
used for transmission of e-mail messages across the Internet
TCP
protocol that assigns dynamic IP addresses
TCP
transfers data from servers to browsers
TCP
prepares data for transmission providing for error checking and resending lost data
TCP
sends data between computers on the Internet
SMTP
used for transmission of e-mail messages across the Internet
SMTP
protocol that assigns dynamic IP addresses
SMTP
transfers data from servers to browsers
SMTP
prepares data for transmission providing for error checking and resending lost data
SMTP
sends data between computers on the Internet
سؤال
Match between columns
PGP
a dedicated connection is formed between two communicating parties
PGP
public-key package
PGP
exchange of control packets between computers
PGP
breaks information down into pieces that can take different paths
PGP
allocates IP addresses
ICANN
a dedicated connection is formed between two communicating parties
ICANN
public-key package
ICANN
exchange of control packets between computers
ICANN
breaks information down into pieces that can take different paths
ICANN
allocates IP addresses
packet switching
a dedicated connection is formed between two communicating parties
packet switching
public-key package
packet switching
exchange of control packets between computers
packet switching
breaks information down into pieces that can take different paths
packet switching
allocates IP addresses
handshaking
a dedicated connection is formed between two communicating parties
handshaking
public-key package
handshaking
exchange of control packets between computers
handshaking
breaks information down into pieces that can take different paths
handshaking
allocates IP addresses
circuit switching
a dedicated connection is formed between two communicating parties
circuit switching
public-key package
circuit switching
exchange of control packets between computers
circuit switching
breaks information down into pieces that can take different paths
circuit switching
allocates IP addresses
سؤال
Match between columns
dynamic address
a unique identification number that defines each computer, service, or other device that connects to the Internet
dynamic address
used in a common encryption technique
dynamic address
a set of rules for exchanging electronic information
dynamic address
IP address for a computer that does not change
dynamic address
temporary IP address for a computer that is assigned from a pool of available IP addresses
computer protocol
a unique identification number that defines each computer, service, or other device that connects to the Internet
computer protocol
used in a common encryption technique
computer protocol
a set of rules for exchanging electronic information
computer protocol
IP address for a computer that does not change
computer protocol
temporary IP address for a computer that is assigned from a pool of available IP addresses
key pair
a unique identification number that defines each computer, service, or other device that connects to the Internet
key pair
used in a common encryption technique
key pair
a set of rules for exchanging electronic information
key pair
IP address for a computer that does not change
key pair
temporary IP address for a computer that is assigned from a pool of available IP addresses
IP address
a unique identification number that defines each computer, service, or other device that connects to the Internet
IP address
used in a common encryption technique
IP address
a set of rules for exchanging electronic information
IP address
IP address for a computer that does not change
IP address
temporary IP address for a computer that is assigned from a pool of available IP addresses
static address
a unique identification number that defines each computer, service, or other device that connects to the Internet
static address
used in a common encryption technique
static address
a set of rules for exchanging electronic information
static address
IP address for a computer that does not change
static address
temporary IP address for a computer that is assigned from a pool of available IP addresses
سؤال
Match between columns
second-level domain
unique domain within another domain
second-level domain
list of rules that define how to display HTML elements
second-level domain
communication between two or more people over the Internet in real time
second-level domain
section of a hard drive that stores web page information
second-level domain
used to decode an encrypted message
cascading style sheet
unique domain within another domain
cascading style sheet
list of rules that define how to display HTML elements
cascading style sheet
communication between two or more people over the Internet in real time
cascading style sheet
section of a hard drive that stores web page information
cascading style sheet
used to decode an encrypted message
instant messaging
unique domain within another domain
instant messaging
list of rules that define how to display HTML elements
instant messaging
communication between two or more people over the Internet in real time
instant messaging
section of a hard drive that stores web page information
instant messaging
used to decode an encrypted message
private-key
unique domain within another domain
private-key
list of rules that define how to display HTML elements
private-key
communication between two or more people over the Internet in real time
private-key
section of a hard drive that stores web page information
private-key
used to decode an encrypted message
Internet cache
unique domain within another domain
Internet cache
list of rules that define how to display HTML elements
Internet cache
communication between two or more people over the Internet in real time
Internet cache
section of a hard drive that stores web page information
Internet cache
used to decode an encrypted message
سؤال
Match between columns
commerce
translates a domain name into an IP address
commerce
assigns users IP addresses for the duration of a session
commerce
enables users to purchase items over the Internet
commerce
delivers HTML documents on request
commerce
specifically deals with the SMTP communication method
DNS
translates a domain name into an IP address
DNS
assigns users IP addresses for the duration of a session
DNS
enables users to purchase items over the Internet
DNS
delivers HTML documents on request
DNS
specifically deals with the SMTP communication method
web
translates a domain name into an IP address
web
assigns users IP addresses for the duration of a session
web
enables users to purchase items over the Internet
web
delivers HTML documents on request
web
specifically deals with the SMTP communication method
e-mail
translates a domain name into an IP address
e-mail
assigns users IP addresses for the duration of a session
e-mail
enables users to purchase items over the Internet
e-mail
delivers HTML documents on request
e-mail
specifically deals with the SMTP communication method
DHCP
translates a domain name into an IP address
DHCP
assigns users IP addresses for the duration of a session
DHCP
enables users to purchase items over the Internet
DHCP
delivers HTML documents on request
DHCP
specifically deals with the SMTP communication method
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/74
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Behind the Scenes: How the Internet Works
1
To boldface text in HTML, you would enclose your text in ________.

A) and
B) /b and b
C) *b* and */b*
D) HTM.bold.on and HTM.bold.off
A
2
Which of the following information is NOT contained in a packet sent over the Internet?

A) The size (in bytes) of the packet
B) The address to which the packet is sent
C) The address from where the packet originates
D) The data that are transmitted
A
3
A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.

A) dynamic
B) static
C) assigned
D) transition
A
4
An IP address that does not change and is usually assigned manually by a network administrator or an ISP is called a ________ address.

A) dynamic
B) static
C) fixed
D) stationary
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
5
High-speed ________ communication lines on the Internet backbone use fiber optics.

A) IP
B) OC
C) DSL
D) cable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following was created for the transfer of hypertext documents across the Internet?

A) SSL
B) HTTP
C) FTP
D) AJAX
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
7
In the URL http://www.pearsonhighered.com, which of the following is the top-level domain?

A) http
B) www
C) pearsonhighered
D) )com
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
8
________ describes the website content in terms of the data that is being described rather than how it is to be displayed.

A) CGI
B) JavaScript
C) XML
D) HTML
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
9
Individual Internet users connect to ISPs through a(n) ________.

A) User Datagram Protocol (UDP)
B) T line
C) optical carrier (OC) line
D) point of presence (POP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
10
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server.

A) DNS
B) URL
C) FTP
D) XML
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
11
An IP address in the form 197.169.100.1 is called a(n) ________.

A) sequential access number
B) dotted quad
C) encryption key
D) random number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
12
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.

A) Packet switching
B) An open circuit
C) Circuit switching
D) A closed circuit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
13
A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet.

A) TCP
B) IP
C) SMTP
D) NetBIOS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
14
The main suite of protocols used for transmitting data on the Internet is ________.

A) FTP
B) TCP/IP
C) SMTP
D) POP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is NOT used in developing websites?

A) XML
B) KML
C) DHTML
D) HTML
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
16
The main path of the Internet along which data travels the fastest is known as the Internet ________.

A) protocol
B) highway
C) backbone
D) cache
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
17
IPv6 was introduced when IPv4 ________.

A) became too old
B) was eliminated
C) no longer had enough unique addresses
D) was revoked
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
18
is an example of an HTML ________.

A) marker
B) tag
C) indicator
D) key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following organizations research new Internet technologies to improve its capabilities?

A) Internet Architecture Board
B) Internet Society
C) World Wide Web Consortium
D) Internet Engineering Task Force
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
20
The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.

A) ISOC
B) ICANN
C) W3C
D) IAB
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following is an example of an instant messaging service?

A) LinkedIn
B) Monster
C) WhatsApp
D) Flickr
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
22
In the acronym HTTPS, the S stands for ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
23
The JavaScript ________ defines items on a web page such as graphics, tables, and headers as objects.

A) SSL
B) MIME
C) JSON
D) DOM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
24
A typical ________ is made up of one or more network switches to which ISPs connect to each other.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
25
In public-key encryption, the two keys, one for coding and one for decoding, are known as ________.

A) code keys
B) linked keys
C) key tags
D) a key pair
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
26
________ is a method of communication in which a dedicated connection is formed between two points and the connection remains active during the transmission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
27
A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer.

A) CGI script
B) app
C) applet
D) JavaScript
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
28
________ permits two or more people to communicate over the Internet in real time.

A) E-mail
B) Snapfish
C) Flickr
D) Instant messaging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
29
Within an URL, .com and .edu are examples of a(n) ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
30
A(n) ________ links a URL to an IP address when a web page is requested.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which protocol is used when sending files as attachments by e-mail?

A) Multipurpose Internet Mail Extensions (MIME)
B) Post Office Protocol (POP)
C) Simple Mail Transfer Protocol (SMTP)
D) User Datagram Protocol (UDP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
32
The ________ is a consortium of organizations that develops web protocols and sets standards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
33
________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
34
The ________ IP addressing scheme uses 128-bit addressing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
35
197.169.73.63 is an example of a(n) ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
36
When using ________ addressing, a computer is assigned a temporary address from a pool of available IP addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
37
The IPv4 protocol is beginning to be replaced by the ________ protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
38
Strong encryption now requires ________-bit keys.

A) 40
B) 128
C) 256
D) 512
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
39
SMTP stands for ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
40
________ servers are computers that host software that enables users to buy goods and services over the web.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
41
The MIME specification stands for ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
42
PHP is a popular choice for coding ________ programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
43
FTP enables files to be downloaded or uploaded between computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
44
________ is a commonly used scripting language for creating DHTML effects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
45
Dynamic IP addressing is accomplished using a DHCP server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
46
In the URL http://example.gov, what is the second-level domain?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
47
A(n) ________ is a small program that resides on a server, is downloaded to the client, and runs when needed without additional data transfers between the client and server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
48
When using packet switching, packets are always sent over the same route.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
49
When using ________-key encryption, only the message sender and recipient have the code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
50
In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for decoding.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
51
is an example of an HTML ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
52
________ is the process of encoding e-mail so that only the person with a corresponding key can decode and read the message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
53
________ combines HTML, cascading style sheets, and JavaScript.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
54
File Transfer Protocol (FTP) is used to transmit e-mail messages across the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
55
Transport Layer Security (TLS) and ________ are two protocols that provide data integrity and security for Internet transmission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
56
IPv6 uses six groups of 16-bit numbers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
57
DHTML stands for ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
58
When a(n) ________ address is assigned to a computer, its IP address will NOT change.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
59
The United States government is the sole country in charge of the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
60
A(n) ________ program is a computer program that runs on the client computer and requires no interaction with a web server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
61
An applet is a small application that resides on a server but is downloaded to, and run on, the client computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
62
Node.js is used to create faster animation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
63
Most instant messaging services provide a high level of encryption for their messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
64
XML technologies allow web pages to change after they have been loaded.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
65
Facebook Connect is one the most popular instant messaging services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
66
HTML is an acronym for Highly Textual Markup Language.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
67
The tag informs a browser that the text that follows the tag should be italicized.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
68
Client-side programs run on a web server rather than on your computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
69
Java and JavaScript refer to the same language.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
70
Match between columns
IP
used for transmission of e-mail messages across the Internet
IP
protocol that assigns dynamic IP addresses
IP
transfers data from servers to browsers
IP
prepares data for transmission providing for error checking and resending lost data
IP
sends data between computers on the Internet
DHCP
used for transmission of e-mail messages across the Internet
DHCP
protocol that assigns dynamic IP addresses
DHCP
transfers data from servers to browsers
DHCP
prepares data for transmission providing for error checking and resending lost data
DHCP
sends data between computers on the Internet
HTTP
used for transmission of e-mail messages across the Internet
HTTP
protocol that assigns dynamic IP addresses
HTTP
transfers data from servers to browsers
HTTP
prepares data for transmission providing for error checking and resending lost data
HTTP
sends data between computers on the Internet
TCP
used for transmission of e-mail messages across the Internet
TCP
protocol that assigns dynamic IP addresses
TCP
transfers data from servers to browsers
TCP
prepares data for transmission providing for error checking and resending lost data
TCP
sends data between computers on the Internet
SMTP
used for transmission of e-mail messages across the Internet
SMTP
protocol that assigns dynamic IP addresses
SMTP
transfers data from servers to browsers
SMTP
prepares data for transmission providing for error checking and resending lost data
SMTP
sends data between computers on the Internet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
71
Match between columns
PGP
a dedicated connection is formed between two communicating parties
PGP
public-key package
PGP
exchange of control packets between computers
PGP
breaks information down into pieces that can take different paths
PGP
allocates IP addresses
ICANN
a dedicated connection is formed between two communicating parties
ICANN
public-key package
ICANN
exchange of control packets between computers
ICANN
breaks information down into pieces that can take different paths
ICANN
allocates IP addresses
packet switching
a dedicated connection is formed between two communicating parties
packet switching
public-key package
packet switching
exchange of control packets between computers
packet switching
breaks information down into pieces that can take different paths
packet switching
allocates IP addresses
handshaking
a dedicated connection is formed between two communicating parties
handshaking
public-key package
handshaking
exchange of control packets between computers
handshaking
breaks information down into pieces that can take different paths
handshaking
allocates IP addresses
circuit switching
a dedicated connection is formed between two communicating parties
circuit switching
public-key package
circuit switching
exchange of control packets between computers
circuit switching
breaks information down into pieces that can take different paths
circuit switching
allocates IP addresses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
72
Match between columns
dynamic address
a unique identification number that defines each computer, service, or other device that connects to the Internet
dynamic address
used in a common encryption technique
dynamic address
a set of rules for exchanging electronic information
dynamic address
IP address for a computer that does not change
dynamic address
temporary IP address for a computer that is assigned from a pool of available IP addresses
computer protocol
a unique identification number that defines each computer, service, or other device that connects to the Internet
computer protocol
used in a common encryption technique
computer protocol
a set of rules for exchanging electronic information
computer protocol
IP address for a computer that does not change
computer protocol
temporary IP address for a computer that is assigned from a pool of available IP addresses
key pair
a unique identification number that defines each computer, service, or other device that connects to the Internet
key pair
used in a common encryption technique
key pair
a set of rules for exchanging electronic information
key pair
IP address for a computer that does not change
key pair
temporary IP address for a computer that is assigned from a pool of available IP addresses
IP address
a unique identification number that defines each computer, service, or other device that connects to the Internet
IP address
used in a common encryption technique
IP address
a set of rules for exchanging electronic information
IP address
IP address for a computer that does not change
IP address
temporary IP address for a computer that is assigned from a pool of available IP addresses
static address
a unique identification number that defines each computer, service, or other device that connects to the Internet
static address
used in a common encryption technique
static address
a set of rules for exchanging electronic information
static address
IP address for a computer that does not change
static address
temporary IP address for a computer that is assigned from a pool of available IP addresses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
73
Match between columns
second-level domain
unique domain within another domain
second-level domain
list of rules that define how to display HTML elements
second-level domain
communication between two or more people over the Internet in real time
second-level domain
section of a hard drive that stores web page information
second-level domain
used to decode an encrypted message
cascading style sheet
unique domain within another domain
cascading style sheet
list of rules that define how to display HTML elements
cascading style sheet
communication between two or more people over the Internet in real time
cascading style sheet
section of a hard drive that stores web page information
cascading style sheet
used to decode an encrypted message
instant messaging
unique domain within another domain
instant messaging
list of rules that define how to display HTML elements
instant messaging
communication between two or more people over the Internet in real time
instant messaging
section of a hard drive that stores web page information
instant messaging
used to decode an encrypted message
private-key
unique domain within another domain
private-key
list of rules that define how to display HTML elements
private-key
communication between two or more people over the Internet in real time
private-key
section of a hard drive that stores web page information
private-key
used to decode an encrypted message
Internet cache
unique domain within another domain
Internet cache
list of rules that define how to display HTML elements
Internet cache
communication between two or more people over the Internet in real time
Internet cache
section of a hard drive that stores web page information
Internet cache
used to decode an encrypted message
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
74
Match between columns
commerce
translates a domain name into an IP address
commerce
assigns users IP addresses for the duration of a session
commerce
enables users to purchase items over the Internet
commerce
delivers HTML documents on request
commerce
specifically deals with the SMTP communication method
DNS
translates a domain name into an IP address
DNS
assigns users IP addresses for the duration of a session
DNS
enables users to purchase items over the Internet
DNS
delivers HTML documents on request
DNS
specifically deals with the SMTP communication method
web
translates a domain name into an IP address
web
assigns users IP addresses for the duration of a session
web
enables users to purchase items over the Internet
web
delivers HTML documents on request
web
specifically deals with the SMTP communication method
e-mail
translates a domain name into an IP address
e-mail
assigns users IP addresses for the duration of a session
e-mail
enables users to purchase items over the Internet
e-mail
delivers HTML documents on request
e-mail
specifically deals with the SMTP communication method
DHCP
translates a domain name into an IP address
DHCP
assigns users IP addresses for the duration of a session
DHCP
enables users to purchase items over the Internet
DHCP
delivers HTML documents on request
DHCP
specifically deals with the SMTP communication method
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.