Deck 6: The Internet

ملء الشاشة (f)
exit full mode
سؤال
A news article states that hackers tried to redirect unsuspecting users to infected sites using a technique called
A news article states that hackers tried to redirect unsuspecting users to infected sites using a technique called   cache poisoning. (Hint: Use the acronym.)<div style=padding-top: 35px> cache poisoning. (Hint: Use the acronym.)
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Your friend is setting up a cable Internet connection. You recommend that she connect a router between her computer and the cable modem, and explain that network
Your friend is setting up a cable Internet connection. You recommend that she connect a router between her computer and the cable modem, and explain that network   translation can help to secure her computer against intrusions.<div style=padding-top: 35px> translation can help to secure her computer against intrusions.
سؤال
  , which adheres to IEEE 802.16 standards, is one of the most promising fixed wireless Internet technologies.<div style=padding-top: 35px> , which adheres to IEEE 802.16 standards, is one of the most promising fixed wireless Internet technologies.
سؤال
Make a timeline of events associated with the evolution of the Internet.
سؤال
Give examples of synchronous and asynchronous communications offered on the Internet.
سؤال
  Internet access can be defined as the ability to use the Internet while walking or traveling in a moving vehicle.<div style=padding-top: 35px> Internet access can be defined as the ability to use the Internet while walking or traveling in a moving vehicle.
سؤال
You're installing a high-speed Internet connection. The modem has a cable like the one shown at right. This modem is designed to connect to a computer's
You're installing a high-speed Internet connection. The modem has a cable like the one shown at right. This modem is designed to connect to a computer's   port.<div style=padding-top: 35px> port.
سؤال
Explain how Voice over IP works, and compare it to cell phone and land line services.
سؤال
A Wi-Fi
A Wi-Fi   is an area in which the public can access a Wi-Fi network that offers Internet service.<div style=padding-top: 35px> is an area in which the public can access a Wi-Fi network that offers Internet service.
سؤال
Draw a conceptual diagram illustrating the Internet backbone, NAPs, NSPs, routers, and ISPs. Extend the diagram to show how computers on a LAN access the Internet through a single DSL modem.
سؤال
List two examples of distributed grid computing and two examples of cloud computing.
سؤال
  G technologies include EV-DO, HSUPA, and EDGE.<div style=padding-top: 35px> G technologies include EV-DO, HSUPA, and EDGE.
سؤال
Your Internet access seems very slow one day. You might be able to use a networking utility called
Your Internet access seems very slow one day. You might be able to use a networking utility called   to discover the source of the slowdown.<div style=padding-top: 35px> to discover the source of the slowdown.
سؤال
Draw diagrams to illustrate how FTP, the original Napster, and Bit Torrent work.
سؤال
WAP devices have been replaced by devices that use mobile
WAP devices have been replaced by devices that use mobile   technologies offering the full Internet experience.<div style=padding-top: 35px> technologies offering the full Internet experience.
سؤال
List at least five protocols used on the Internet and describe what they are used for.
سؤال
Make a list of security concerns that are related to Internet access.
سؤال
Portable
Portable   technology can be used to access the Internet from remote locations where there are no cable, WiMAX, or cellular networks.<div style=padding-top: 35px> technology can be used to access the Internet from remote locations where there are no cable, WiMAX, or cellular networks.
سؤال
Suppose that you decide to open a little Web store to sell handcrafted pottery. Your Web site will need a(n)
Suppose that you decide to open a little Web store to sell handcrafted pottery. Your Web site will need a(n)   name.<div style=padding-top: 35px> name.
سؤال
Make a checklist of steps you can take to secure your computer from Internet-based intrusions.
سؤال
  computing offers Internet-based computer resources on demand so that individuals and businesses can contract for access as these resources are needed.<div style=padding-top: 35px> computing offers Internet-based computer resources on demand so that individuals and businesses can contract for access as these resources are needed.
سؤال
Explain the differences between static IP addresses, dynamic IP addresses, private IP addresses, and domain names.
سؤال
TCP\
TCP\   is the primary protocol suite used on the Internet.<div style=padding-top: 35px> is the primary protocol suite used on the Internet.
سؤال
Instant messaging, chat, and VoIP are classified as
Instant messaging, chat, and VoIP are classified as   communications because both parties have to be online.<div style=padding-top: 35px> communications because both parties have to be online.
سؤال
You frequently use public Wi-Fi hotspots in cafes and other locations. To keep your passwords and other confidential data safe, you work with your employer to install a(n)
You frequently use public Wi-Fi hotspots in cafes and other locations. To keep your passwords and other confidential data safe, you work with your employer to install a(n)   that encrypts the data you transmit over the Internet. (Hint: Use the acronym.)<div style=padding-top: 35px> that encrypts the data you transmit over the Internet. (Hint: Use the acronym.)
سؤال
204.127.129.1 is an example of an IPv4 address. True or false
204.127.129.1 is an example of an IPv4 address. True or false  <div style=padding-top: 35px>
سؤال
VoIP quality can be affected by
VoIP quality can be affected by   that results from too much packet latency.<div style=padding-top: 35px> that results from too much packet latency.
سؤال
Describe the difference between Ping and Traceroute by giving an example of when each would be used.
سؤال
A(n)
A(n)   name server maintains a database of IP addresses that correspond to addresses such as www.nike.com.<div style=padding-top: 35px> name server maintains a database of IP addresses that correspond to addresses such as www.nike.com.
سؤال
On some sites,
On some sites,   FTP can be used to upload and download files even if you don't have an account on the FTP server.<div style=padding-top: 35px> FTP can be used to upload and download files even if you don't have an account on the FTP server.
سؤال
Suppose you have installed a cable modem on a standalone PC. To secure your computer, you should activate
Suppose you have installed a cable modem on a standalone PC. To secure your computer, you should activate   software to filter packets entering and leaving your computer.<div style=padding-top: 35px> software to filter packets entering and leaving your computer.
سؤال
If you ping Google from your computer and get a result of 46 ms, you have a relatively slow Internet connection. True or false
If you ping Google from your computer and get a result of 46 ms, you have a relatively slow Internet connection. True or false  <div style=padding-top: 35px>
سؤال
  is a peer-to-peer file sharing protocol that uses a swarm of computers to exchange chunks of data that can eventually be assembled into complete files.<div style=padding-top: 35px> is a peer-to-peer file sharing protocol that uses a "swarm" of computers to exchange chunks of data that can eventually be assembled into complete files.
سؤال
List the advantages and disadvantages of dial-up, cable, DSL, satellite, and fixed wireless Internet services. List the Internet access methods in which upstream transmission rates differ from downstream rates.
سؤال
Most ISPs offer
Most ISPs offer   Internet connections, meaning the downstream speed is faster than the upstream speed.<div style=padding-top: 35px> Internet connections, meaning the downstream speed is faster than the upstream speed.
سؤال
Hackers use
Hackers use   scanning software to look for computers connected to the Internet that are vulnerable to intrusions.<div style=padding-top: 35px> scanning software to look for computers connected to the Internet that are vulnerable to intrusions.
سؤال
Your friend, a film student, has created a 20-minute short film that she wants to distribute to friends. The file is much too large to be an e-mail attachment and she doesn't have access to a(n)
Your friend, a film student, has created a 20-minute short film that she wants to distribute to friends. The file is much too large to be an e-mail attachment and she doesn't have access to a(n)   server. You suggest that she try posting it at a(n)   P2P file sharing site where a swarm of computers can assist with the downloads.<div style=padding-top: 35px> server. You suggest that she try posting it at a(n)
Your friend, a film student, has created a 20-minute short film that she wants to distribute to friends. The file is much too large to be an e-mail attachment and she doesn't have access to a(n)   server. You suggest that she try posting it at a(n)   P2P file sharing site where a swarm of computers can assist with the downloads.<div style=padding-top: 35px> P2P file sharing site where a swarm of computers can assist with the downloads.
سؤال
Dial-up and DSL Internet access use the telephone cables already installed in a home or business. True or false
Dial-up and DSL Internet access use the telephone cables already installed in a home or business. True or false  <div style=padding-top: 35px>
سؤال
  software monitors network activity, blocks packets from suspicious IP addresses, and reports intrusion attempts.<div style=padding-top: 35px> software monitors network activity, blocks packets from suspicious IP addresses, and reports intrusion attempts.
سؤال
List the options for mobile and portable Internet access, and explain their strengths and weaknesses.
سؤال
Always-on connections are not a security risk because they use DOCSIS. True or false
Always-on connections are not a security risk because they use DOCSIS. True or false  <div style=padding-top: 35px>
سؤال
One of the best defenses against intrusions is to install a(n)
One of the best defenses against intrusions is to install a(n)   between your standalone computer or LAN and your Internet connection device.<div style=padding-top: 35px> between your standalone computer or LAN and your Internet connection device.
سؤال
Your friend wants you to follow her tweets and asks if you have a(n)
Your friend wants you to follow her tweets and asks if you have a(n)   account.<div style=padding-top: 35px> account.
سؤال
The two requirements for cable Internet service are circuitry to handle
The two requirements for cable Internet service are circuitry to handle   protocols and a cable modem.<div style=padding-top: 35px> protocols and a cable modem.
سؤال
A(n)
A(n)   IP address is a non-routable IP address that can be used within a LAN, but not for Internet data transport.<div style=padding-top: 35px> IP address is a non-routable IP address that can be used within a LAN, but not for Internet data transport.
سؤال
Explain the advantages of mobile broadband services compared to WAP service.
سؤال
Satellite Internet service typically has a high
Satellite Internet service typically has a high   rate, which is unsuitable for some online gaming and Voice over IP.<div style=padding-top: 35px> rate, which is unsuitable for some online gaming and Voice over IP.
سؤال
When using a public Wi-Fi hotspot, you can use a personal
When using a public Wi-Fi hotspot, you can use a personal   to encrypt data that travels from your computer. (Hint: Use the acronym.)<div style=padding-top: 35px> to encrypt data that travels from your computer. (Hint: Use the acronym.)
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/48
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: The Internet
1
A news article states that hackers tried to redirect unsuspecting users to infected sites using a technique called
A news article states that hackers tried to redirect unsuspecting users to infected sites using a technique called   cache poisoning. (Hint: Use the acronym.) cache poisoning. (Hint: Use the acronym.)
Domain Name Sever
• The technique used to redirect web site from one to another when DNS is malfunctioned is called DNS Cache Poisoning.
• Therefore, the hacker used this DNS Cache Poisoning technique to divert the website.
Therefore, the appropriate word to fill in the blank is DNS.
2
Your friend is setting up a cable Internet connection. You recommend that she connect a router between her computer and the cable modem, and explain that network
Your friend is setting up a cable Internet connection. You recommend that she connect a router between her computer and the cable modem, and explain that network   translation can help to secure her computer against intrusions. translation can help to secure her computer against intrusions.
Address
• Network Address Translation (NAT) is used to keep track of the packets with respect to their IP address.
• Since, it is used as a security technique, I request my friend to use NAT between the router and system or computer to set a cable internet connection.
Therefore, the appropriate word to fill in the blank is Address.
3
  , which adheres to IEEE 802.16 standards, is one of the most promising fixed wireless Internet technologies. , which adheres to IEEE 802.16 standards, is one of the most promising fixed wireless Internet technologies.
WIMAX
WIMAX stands for worldwide interoperability for microwave access. It is also designated as IEEE 802.16 by Ethernet compatibility network.
It acts as an alternative to DSL where cable service or telephone lines are not available such as in rural area.
A WIMAX sends and receive data with the help of WIMAX antennas. A WIMAX is capable of covering approximate 8 KM area. It can transmit data at 70Mbps rate.
Therefore, the appropriate word to fill in the blank is WIMAX.
4
Make a timeline of events associated with the evolution of the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
5
Give examples of synchronous and asynchronous communications offered on the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
6
  Internet access can be defined as the ability to use the Internet while walking or traveling in a moving vehicle. Internet access can be defined as the ability to use the Internet while walking or traveling in a moving vehicle.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
7
You're installing a high-speed Internet connection. The modem has a cable like the one shown at right. This modem is designed to connect to a computer's
You're installing a high-speed Internet connection. The modem has a cable like the one shown at right. This modem is designed to connect to a computer's   port. port.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
8
Explain how Voice over IP works, and compare it to cell phone and land line services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
9
A Wi-Fi
A Wi-Fi   is an area in which the public can access a Wi-Fi network that offers Internet service. is an area in which the public can access a Wi-Fi network that offers Internet service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
10
Draw a conceptual diagram illustrating the Internet backbone, NAPs, NSPs, routers, and ISPs. Extend the diagram to show how computers on a LAN access the Internet through a single DSL modem.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
11
List two examples of distributed grid computing and two examples of cloud computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
12
  G technologies include EV-DO, HSUPA, and EDGE. G technologies include EV-DO, HSUPA, and EDGE.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
13
Your Internet access seems very slow one day. You might be able to use a networking utility called
Your Internet access seems very slow one day. You might be able to use a networking utility called   to discover the source of the slowdown. to discover the source of the slowdown.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
14
Draw diagrams to illustrate how FTP, the original Napster, and Bit Torrent work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
15
WAP devices have been replaced by devices that use mobile
WAP devices have been replaced by devices that use mobile   technologies offering the full Internet experience. technologies offering the full Internet experience.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
16
List at least five protocols used on the Internet and describe what they are used for.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
17
Make a list of security concerns that are related to Internet access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
18
Portable
Portable   technology can be used to access the Internet from remote locations where there are no cable, WiMAX, or cellular networks. technology can be used to access the Internet from remote locations where there are no cable, WiMAX, or cellular networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
19
Suppose that you decide to open a little Web store to sell handcrafted pottery. Your Web site will need a(n)
Suppose that you decide to open a little Web store to sell handcrafted pottery. Your Web site will need a(n)   name. name.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
20
Make a checklist of steps you can take to secure your computer from Internet-based intrusions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
21
  computing offers Internet-based computer resources on demand so that individuals and businesses can contract for access as these resources are needed. computing offers Internet-based computer resources on demand so that individuals and businesses can contract for access as these resources are needed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
22
Explain the differences between static IP addresses, dynamic IP addresses, private IP addresses, and domain names.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
23
TCP\
TCP\   is the primary protocol suite used on the Internet. is the primary protocol suite used on the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
24
Instant messaging, chat, and VoIP are classified as
Instant messaging, chat, and VoIP are classified as   communications because both parties have to be online. communications because both parties have to be online.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
25
You frequently use public Wi-Fi hotspots in cafes and other locations. To keep your passwords and other confidential data safe, you work with your employer to install a(n)
You frequently use public Wi-Fi hotspots in cafes and other locations. To keep your passwords and other confidential data safe, you work with your employer to install a(n)   that encrypts the data you transmit over the Internet. (Hint: Use the acronym.) that encrypts the data you transmit over the Internet. (Hint: Use the acronym.)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
26
204.127.129.1 is an example of an IPv4 address. True or false
204.127.129.1 is an example of an IPv4 address. True or false
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
27
VoIP quality can be affected by
VoIP quality can be affected by   that results from too much packet latency. that results from too much packet latency.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
28
Describe the difference between Ping and Traceroute by giving an example of when each would be used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
29
A(n)
A(n)   name server maintains a database of IP addresses that correspond to addresses such as www.nike.com. name server maintains a database of IP addresses that correspond to addresses such as www.nike.com.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
30
On some sites,
On some sites,   FTP can be used to upload and download files even if you don't have an account on the FTP server. FTP can be used to upload and download files even if you don't have an account on the FTP server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
31
Suppose you have installed a cable modem on a standalone PC. To secure your computer, you should activate
Suppose you have installed a cable modem on a standalone PC. To secure your computer, you should activate   software to filter packets entering and leaving your computer. software to filter packets entering and leaving your computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
32
If you ping Google from your computer and get a result of 46 ms, you have a relatively slow Internet connection. True or false
If you ping Google from your computer and get a result of 46 ms, you have a relatively slow Internet connection. True or false
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
33
  is a peer-to-peer file sharing protocol that uses a swarm of computers to exchange chunks of data that can eventually be assembled into complete files. is a peer-to-peer file sharing protocol that uses a "swarm" of computers to exchange chunks of data that can eventually be assembled into complete files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
34
List the advantages and disadvantages of dial-up, cable, DSL, satellite, and fixed wireless Internet services. List the Internet access methods in which upstream transmission rates differ from downstream rates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
35
Most ISPs offer
Most ISPs offer   Internet connections, meaning the downstream speed is faster than the upstream speed. Internet connections, meaning the downstream speed is faster than the upstream speed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
36
Hackers use
Hackers use   scanning software to look for computers connected to the Internet that are vulnerable to intrusions. scanning software to look for computers connected to the Internet that are vulnerable to intrusions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
37
Your friend, a film student, has created a 20-minute short film that she wants to distribute to friends. The file is much too large to be an e-mail attachment and she doesn't have access to a(n)
Your friend, a film student, has created a 20-minute short film that she wants to distribute to friends. The file is much too large to be an e-mail attachment and she doesn't have access to a(n)   server. You suggest that she try posting it at a(n)   P2P file sharing site where a swarm of computers can assist with the downloads. server. You suggest that she try posting it at a(n)
Your friend, a film student, has created a 20-minute short film that she wants to distribute to friends. The file is much too large to be an e-mail attachment and she doesn't have access to a(n)   server. You suggest that she try posting it at a(n)   P2P file sharing site where a swarm of computers can assist with the downloads. P2P file sharing site where a swarm of computers can assist with the downloads.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
38
Dial-up and DSL Internet access use the telephone cables already installed in a home or business. True or false
Dial-up and DSL Internet access use the telephone cables already installed in a home or business. True or false
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
39
  software monitors network activity, blocks packets from suspicious IP addresses, and reports intrusion attempts. software monitors network activity, blocks packets from suspicious IP addresses, and reports intrusion attempts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
40
List the options for mobile and portable Internet access, and explain their strengths and weaknesses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
41
Always-on connections are not a security risk because they use DOCSIS. True or false
Always-on connections are not a security risk because they use DOCSIS. True or false
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
42
One of the best defenses against intrusions is to install a(n)
One of the best defenses against intrusions is to install a(n)   between your standalone computer or LAN and your Internet connection device. between your standalone computer or LAN and your Internet connection device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
43
Your friend wants you to follow her tweets and asks if you have a(n)
Your friend wants you to follow her tweets and asks if you have a(n)   account. account.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
44
The two requirements for cable Internet service are circuitry to handle
The two requirements for cable Internet service are circuitry to handle   protocols and a cable modem. protocols and a cable modem.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
45
A(n)
A(n)   IP address is a non-routable IP address that can be used within a LAN, but not for Internet data transport. IP address is a non-routable IP address that can be used within a LAN, but not for Internet data transport.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
46
Explain the advantages of mobile broadband services compared to WAP service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
47
Satellite Internet service typically has a high
Satellite Internet service typically has a high   rate, which is unsuitable for some online gaming and Voice over IP. rate, which is unsuitable for some online gaming and Voice over IP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
48
When using a public Wi-Fi hotspot, you can use a personal
When using a public Wi-Fi hotspot, you can use a personal   to encrypt data that travels from your computer. (Hint: Use the acronym.) to encrypt data that travels from your computer. (Hint: Use the acronym.)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.