Deck 13: Behind the Scenes: How the Internet Works

Full screen (f)
exit full mode
Question
________ defines the content in terms of the data that is being described rather than how it is to be displayed.

A) CGI
B) JavaScript
C) XML
D) HTML
Use Space or
up arrow
down arrow
to flip the card.
Question
Individual Internet users connect to ISPs through a(n)________.

A) User Datagram Protocol (UDP)
B) T line
C) optical carrier (OC) line
D) point of presence (POP)
Question
Which of the following is NOT a language used in developing websites?

A) XML
B) KML
C) DHTML
D) HTML
Question
Which of the following information is NOT contained in a packet?

A) The size (in bytes) of the packet
B) The address to which the packet is sent
C) The address from where the packet originates
D) The data that are transmitted
Question
The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.

A) ISOC
B) ICANN
C) W3C
D) IAB
Question
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n)________ server.

A) DNS
B) URL
C) FTP
D) XML
Question
An IP address that does not change and is usually assigned manually by a network administrator is called a ________ address.

A) dynamic
B) static
C) fixed
D) stationary
Question
An IP address in the form 197.169.100.1 is called a(n)________.

A) sequential access number
B) dotted quad
C) encryption key
D) random number
Question
The main path of the Internet along which data travel the fastest is known as the Internet ________.

A) protocol
B) highway
C) backbone
D) cache
Question
A(n)________ address is a unique number that identifies a computer, server, or device connected to the Internet.

A) TCP
B) IP
C) SMTP
D) NetBIOS
Question
In http://www.pearsonhighered.com, which of the following is the top-level domain?

A) http
B) www
C) pearsonhighered
D) com
Question
High-speed ________ communication lines use fiber-optics.

A) IP
B) OC
C) DSL
D) cable
Question
________ enables interactive functionality beyond the simple display of information on a web page by providing a platform which can execute a program to do things like collect data from the user.

A) OC
B) ACK
C) UDP
D) CGI
Question
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.

A) Packet switching
B) An open circuit
C) Circuit switching
D) A closed circuit
Question
The main suite of protocols used on the Internet is ________.

A) FTP
B) TCP/IP
C) SMTP
D) POP
Question
To boldface text in HTML, you would enclose your text in ________ and ________.

A) and
B) /b and b
C) *b* and */b*
D) HTM.bold.on and HTM.bold.off
Question
IPV6 was needed when IPV4 ________.

A) became too old
B) was eliminated
C) no longer had enough unique addresses
D) was revoked
Question
A(n)________ address is a temporary IP address that is assigned from an available pool of IP addresses.

A) dynamic
B) static
C) assigned
D) transition
Question
Which of the following was created for the transfer of hypertext documents across the Internet?

A) SSL
B) HTTP
C) FTP
D) HTML
Question
is an example of an HTML ________.

A) marker
B) tag
C) indicator
D) key
Question
When using ________ addressing, a computer is assigned a temporary address from available IP addresses.
Question
________ permits two or more people to communicate over the Internet in real time.

A) email
B) Snapfish
C) Flickr
D) Instant messaging
Question
The IPv4 protocol is beginning to be replaced by the ________ protocol.
Question
Which protocol is used when sending files as attachments by e-mail?

A) Multipurpose Internet Mail Extensions (MIME)
B) Post Office Protocol (POP)
C) Simple Mail Transfer Protocol (SMTP)
D) User Datagram Protocol (UDP)
Question
SMTP stands for ________.
Question
A typical ________ is made up of one or more network switches to which ISPs connect.
Question
In the acronym HTTPS, the S stands for ________.
Question
.com and .edu are examples of a(n)________.
Question
Which of the following is an example of an instant messaging service?

A) LinkedIn
B) Monster
C) Yahoo Messenger
D) Flickr
Question
197.169.73.63 is an example of a(n)________.
Question
A(n)________ links a URL to an IP address when a web page is requested.
Question
In public-key encryption, the two keys-one for coding and one for decoding-are known as ________.

A) code keys
B) linked keys
C) key tags
D) a key pair
Question
________ is a consortium of organizations that develops web protocols and sets standards.
Question
Strong encryption now requires ________-bit keys.

A) 40
B) 128
C) 256
D) 512
Question
________ is a method of communication in which a dedicated connection is formed between two points and the connection remains active during the transmission.
Question
The ________ defines items on a web page such as graphics, tables, and headers as objects.

A) SSL
B) MIME
C) JSON
D) DOM
Question
The ________ IP addressing scheme uses 128-bit addressing.
Question
________ servers are computers that enable users to buy goods and services over the web.
Question
________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time.
Question
A(n)________ is a small program that resides on a server and is designed to be downloaded and run on a client computer.

A) CGI script
B) app
C) applet
D) JavaScript
Question
When using ________-key encryption, only the message sender and recipient have the code.
Question
FTP enables files to be downloaded or uploaded between computers.
Question
When a(n)________ address is assigned to a computer, its IP address will not change.
Question
Dynamic IP addressing is accomplished using a DHCP server.
Question
In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for decoding.
Question
A(n)________ program is a computer program that runs on the client computer and requires no interaction with a web server.
Question
________ combines HTML, cascading style sheets, and JavaScript.
Question
MIME stands for ________.
Question
Transport Layer Security (TLS)and ________ are two protocols that provide data integrity and security for Internet transmission.
Question
File Transfer Protocol (FTP)is used to transmit e-mail messages across the Internet.
Question
In http://example.gov, what is the second-level domain?
Question
When using packet switching, packets are always sent over the same route.
Question
DHTML stands for ________.
Question
CGI scripts are known as ________ programs because these programs run on a web server.
Question
is an example of an HTML ________.
Question
________ is the process of encoding e-mail so that only the person with a corresponding key can decode and read the message.
Question
The United States government is in charge of the Internet.
Question
IPv6 uses six groups of 16-bit numbers.
Question
A(n)________ is a small program that resides on a server, is downloaded to the client, and runs when needed without additional data transfers between the client and server.
Question
________ is the most commonly used scripting language for creating DHTML effects.
Question
LinkedIn is one the most popular instant messaging services.
Question
JavaScript commands are executed on a server computer.
Question
Client-side programs run on a web server rather than on your computer.
Question
XML technologies allow web pages to change after they have been loaded.
Question
An applet is a small application that resides on a server but is downloaded to, and run on, the client computer.
Question
HTML is a simple programming language.
Question
Most instant messaging services provide a high level of encryption for their messages.
Question
The tag informs a browser that the text that follows the tag should be italicized.
Question
Java and JavaScript refer to the same language.
Question
Match between columns
DHCP
used for transmission of e-mail messages across the Internet
DHCP
protocol that assigns dynamic IP addresses
DHCP
transfers data from servers to browsers
DHCP
prepares data for transmission providing for error checking and resending lost data
DHCP
sends data between computers on the Internet
TCP
used for transmission of e-mail messages across the Internet
TCP
protocol that assigns dynamic IP addresses
TCP
transfers data from servers to browsers
TCP
prepares data for transmission providing for error checking and resending lost data
TCP
sends data between computers on the Internet
IP
used for transmission of e-mail messages across the Internet
IP
protocol that assigns dynamic IP addresses
IP
transfers data from servers to browsers
IP
prepares data for transmission providing for error checking and resending lost data
IP
sends data between computers on the Internet
HTTP
used for transmission of e-mail messages across the Internet
HTTP
protocol that assigns dynamic IP addresses
HTTP
transfers data from servers to browsers
HTTP
prepares data for transmission providing for error checking and resending lost data
HTTP
sends data between computers on the Internet
SMTP
used for transmission of e-mail messages across the Internet
SMTP
protocol that assigns dynamic IP addresses
SMTP
transfers data from servers to browsers
SMTP
prepares data for transmission providing for error checking and resending lost data
SMTP
sends data between computers on the Internet
Question
Match between columns
packet switching
a dedicated connection is formed between two communicating parties
packet switching
public-key package
packet switching
exchange of control packets between computers
packet switching
breaks information down into pieces that can take different paths
packet switching
allocates IP address
circuit switching
a dedicated connection is formed between two communicating parties
circuit switching
public-key package
circuit switching
exchange of control packets between computers
circuit switching
breaks information down into pieces that can take different paths
circuit switching
allocates IP address
ICANN
a dedicated connection is formed between two communicating parties
ICANN
public-key package
ICANN
exchange of control packets between computers
ICANN
breaks information down into pieces that can take different paths
ICANN
allocates IP address
PGP
a dedicated connection is formed between two communicating parties
PGP
public-key package
PGP
exchange of control packets between computers
PGP
breaks information down into pieces that can take different paths
PGP
allocates IP address
handshaking
a dedicated connection is formed between two communicating parties
handshaking
public-key package
handshaking
exchange of control packets between computers
handshaking
breaks information down into pieces that can take different paths
handshaking
allocates IP address
Question
Match between columns
computer protocol
a unique identification number that defines each computer, service, or other device that connects to the Internet
computer protocol
used in a common encryption technique
computer protocol
a set of rules for exchanging electronic information
computer protocol
IP address for a computer does not change
computer protocol
temporary IP address for a computer that is assigned from a pool of available IP addresses
static addressing
a unique identification number that defines each computer, service, or other device that connects to the Internet
static addressing
used in a common encryption technique
static addressing
a set of rules for exchanging electronic information
static addressing
IP address for a computer does not change
static addressing
temporary IP address for a computer that is assigned from a pool of available IP addresses
key pair
a unique identification number that defines each computer, service, or other device that connects to the Internet
key pair
used in a common encryption technique
key pair
a set of rules for exchanging electronic information
key pair
IP address for a computer does not change
key pair
temporary IP address for a computer that is assigned from a pool of available IP addresses
IP address
a unique identification number that defines each computer, service, or other device that connects to the Internet
IP address
used in a common encryption technique
IP address
a set of rules for exchanging electronic information
IP address
IP address for a computer does not change
IP address
temporary IP address for a computer that is assigned from a pool of available IP addresses
dynamic addressing
a unique identification number that defines each computer, service, or other device that connects to the Internet
dynamic addressing
used in a common encryption technique
dynamic addressing
a set of rules for exchanging electronic information
dynamic addressing
IP address for a computer does not change
dynamic addressing
temporary IP address for a computer that is assigned from a pool of available IP addresses
Question
Match between columns
private-key
unique domain within another domain
private-key
list of rules that define how to display HTML elements
private-key
communication between two or more people over the Internet in real time
private-key
section of a hard drive that stores web page information
private-key
used to decode an encrypted message
Internet cache
unique domain within another domain
Internet cache
list of rules that define how to display HTML elements
Internet cache
communication between two or more people over the Internet in real time
Internet cache
section of a hard drive that stores web page information
Internet cache
used to decode an encrypted message
cascading style sheet
unique domain within another domain
cascading style sheet
list of rules that define how to display HTML elements
cascading style sheet
communication between two or more people over the Internet in real time
cascading style sheet
section of a hard drive that stores web page information
cascading style sheet
used to decode an encrypted message
instant messaging
unique domain within another domain
instant messaging
list of rules that define how to display HTML elements
instant messaging
communication between two or more people over the Internet in real time
instant messaging
section of a hard drive that stores web page information
instant messaging
used to decode an encrypted message
second-level domain
unique domain within another domain
second-level domain
list of rules that define how to display HTML elements
second-level domain
communication between two or more people over the Internet in real time
second-level domain
section of a hard drive that stores web page information
second-level domain
used to decode an encrypted message
Question
Match between columns
web
translates a domain name into an IP address
web
assigns users IP addresses for the duration of a session
web
enables users to purchase items over the Internet
web
delivers HTML documents on request
web
specifically deals with the SMTP communication method
DNS
translates a domain name into an IP address
DNS
assigns users IP addresses for the duration of a session
DNS
enables users to purchase items over the Internet
DNS
delivers HTML documents on request
DNS
specifically deals with the SMTP communication method
e-mail
translates a domain name into an IP address
e-mail
assigns users IP addresses for the duration of a session
e-mail
enables users to purchase items over the Internet
e-mail
delivers HTML documents on request
e-mail
specifically deals with the SMTP communication method
DHCP
translates a domain name into an IP address
DHCP
assigns users IP addresses for the duration of a session
DHCP
enables users to purchase items over the Internet
DHCP
delivers HTML documents on request
DHCP
specifically deals with the SMTP communication method
commerce
translates a domain name into an IP address
commerce
assigns users IP addresses for the duration of a session
commerce
enables users to purchase items over the Internet
commerce
delivers HTML documents on request
commerce
specifically deals with the SMTP communication method
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/74
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 13: Behind the Scenes: How the Internet Works
1
________ defines the content in terms of the data that is being described rather than how it is to be displayed.

A) CGI
B) JavaScript
C) XML
D) HTML
C
2
Individual Internet users connect to ISPs through a(n)________.

A) User Datagram Protocol (UDP)
B) T line
C) optical carrier (OC) line
D) point of presence (POP)
D
3
Which of the following is NOT a language used in developing websites?

A) XML
B) KML
C) DHTML
D) HTML
B
4
Which of the following information is NOT contained in a packet?

A) The size (in bytes) of the packet
B) The address to which the packet is sent
C) The address from where the packet originates
D) The data that are transmitted
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
5
The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.

A) ISOC
B) ICANN
C) W3C
D) IAB
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
6
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n)________ server.

A) DNS
B) URL
C) FTP
D) XML
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
7
An IP address that does not change and is usually assigned manually by a network administrator is called a ________ address.

A) dynamic
B) static
C) fixed
D) stationary
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
8
An IP address in the form 197.169.100.1 is called a(n)________.

A) sequential access number
B) dotted quad
C) encryption key
D) random number
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
9
The main path of the Internet along which data travel the fastest is known as the Internet ________.

A) protocol
B) highway
C) backbone
D) cache
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
10
A(n)________ address is a unique number that identifies a computer, server, or device connected to the Internet.

A) TCP
B) IP
C) SMTP
D) NetBIOS
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
11
In http://www.pearsonhighered.com, which of the following is the top-level domain?

A) http
B) www
C) pearsonhighered
D) com
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
12
High-speed ________ communication lines use fiber-optics.

A) IP
B) OC
C) DSL
D) cable
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
13
________ enables interactive functionality beyond the simple display of information on a web page by providing a platform which can execute a program to do things like collect data from the user.

A) OC
B) ACK
C) UDP
D) CGI
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
14
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.

A) Packet switching
B) An open circuit
C) Circuit switching
D) A closed circuit
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
15
The main suite of protocols used on the Internet is ________.

A) FTP
B) TCP/IP
C) SMTP
D) POP
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
16
To boldface text in HTML, you would enclose your text in ________ and ________.

A) and
B) /b and b
C) *b* and */b*
D) HTM.bold.on and HTM.bold.off
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
17
IPV6 was needed when IPV4 ________.

A) became too old
B) was eliminated
C) no longer had enough unique addresses
D) was revoked
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
18
A(n)________ address is a temporary IP address that is assigned from an available pool of IP addresses.

A) dynamic
B) static
C) assigned
D) transition
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following was created for the transfer of hypertext documents across the Internet?

A) SSL
B) HTTP
C) FTP
D) HTML
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
20
is an example of an HTML ________.

A) marker
B) tag
C) indicator
D) key
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
21
When using ________ addressing, a computer is assigned a temporary address from available IP addresses.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
22
________ permits two or more people to communicate over the Internet in real time.

A) email
B) Snapfish
C) Flickr
D) Instant messaging
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
23
The IPv4 protocol is beginning to be replaced by the ________ protocol.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
24
Which protocol is used when sending files as attachments by e-mail?

A) Multipurpose Internet Mail Extensions (MIME)
B) Post Office Protocol (POP)
C) Simple Mail Transfer Protocol (SMTP)
D) User Datagram Protocol (UDP)
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
25
SMTP stands for ________.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
26
A typical ________ is made up of one or more network switches to which ISPs connect.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
27
In the acronym HTTPS, the S stands for ________.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
28
.com and .edu are examples of a(n)________.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following is an example of an instant messaging service?

A) LinkedIn
B) Monster
C) Yahoo Messenger
D) Flickr
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
30
197.169.73.63 is an example of a(n)________.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
31
A(n)________ links a URL to an IP address when a web page is requested.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
32
In public-key encryption, the two keys-one for coding and one for decoding-are known as ________.

A) code keys
B) linked keys
C) key tags
D) a key pair
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
33
________ is a consortium of organizations that develops web protocols and sets standards.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
34
Strong encryption now requires ________-bit keys.

A) 40
B) 128
C) 256
D) 512
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
35
________ is a method of communication in which a dedicated connection is formed between two points and the connection remains active during the transmission.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
36
The ________ defines items on a web page such as graphics, tables, and headers as objects.

A) SSL
B) MIME
C) JSON
D) DOM
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
37
The ________ IP addressing scheme uses 128-bit addressing.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
38
________ servers are computers that enable users to buy goods and services over the web.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
39
________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
40
A(n)________ is a small program that resides on a server and is designed to be downloaded and run on a client computer.

A) CGI script
B) app
C) applet
D) JavaScript
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
41
When using ________-key encryption, only the message sender and recipient have the code.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
42
FTP enables files to be downloaded or uploaded between computers.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
43
When a(n)________ address is assigned to a computer, its IP address will not change.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
44
Dynamic IP addressing is accomplished using a DHCP server.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
45
In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for decoding.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
46
A(n)________ program is a computer program that runs on the client computer and requires no interaction with a web server.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
47
________ combines HTML, cascading style sheets, and JavaScript.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
48
MIME stands for ________.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
49
Transport Layer Security (TLS)and ________ are two protocols that provide data integrity and security for Internet transmission.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
50
File Transfer Protocol (FTP)is used to transmit e-mail messages across the Internet.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
51
In http://example.gov, what is the second-level domain?
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
52
When using packet switching, packets are always sent over the same route.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
53
DHTML stands for ________.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
54
CGI scripts are known as ________ programs because these programs run on a web server.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
55
is an example of an HTML ________.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
56
________ is the process of encoding e-mail so that only the person with a corresponding key can decode and read the message.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
57
The United States government is in charge of the Internet.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
58
IPv6 uses six groups of 16-bit numbers.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
59
A(n)________ is a small program that resides on a server, is downloaded to the client, and runs when needed without additional data transfers between the client and server.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
60
________ is the most commonly used scripting language for creating DHTML effects.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
61
LinkedIn is one the most popular instant messaging services.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
62
JavaScript commands are executed on a server computer.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
63
Client-side programs run on a web server rather than on your computer.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
64
XML technologies allow web pages to change after they have been loaded.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
65
An applet is a small application that resides on a server but is downloaded to, and run on, the client computer.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
66
HTML is a simple programming language.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
67
Most instant messaging services provide a high level of encryption for their messages.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
68
The tag informs a browser that the text that follows the tag should be italicized.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
69
Java and JavaScript refer to the same language.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
70
Match between columns
DHCP
used for transmission of e-mail messages across the Internet
DHCP
protocol that assigns dynamic IP addresses
DHCP
transfers data from servers to browsers
DHCP
prepares data for transmission providing for error checking and resending lost data
DHCP
sends data between computers on the Internet
TCP
used for transmission of e-mail messages across the Internet
TCP
protocol that assigns dynamic IP addresses
TCP
transfers data from servers to browsers
TCP
prepares data for transmission providing for error checking and resending lost data
TCP
sends data between computers on the Internet
IP
used for transmission of e-mail messages across the Internet
IP
protocol that assigns dynamic IP addresses
IP
transfers data from servers to browsers
IP
prepares data for transmission providing for error checking and resending lost data
IP
sends data between computers on the Internet
HTTP
used for transmission of e-mail messages across the Internet
HTTP
protocol that assigns dynamic IP addresses
HTTP
transfers data from servers to browsers
HTTP
prepares data for transmission providing for error checking and resending lost data
HTTP
sends data between computers on the Internet
SMTP
used for transmission of e-mail messages across the Internet
SMTP
protocol that assigns dynamic IP addresses
SMTP
transfers data from servers to browsers
SMTP
prepares data for transmission providing for error checking and resending lost data
SMTP
sends data between computers on the Internet
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
71
Match between columns
packet switching
a dedicated connection is formed between two communicating parties
packet switching
public-key package
packet switching
exchange of control packets between computers
packet switching
breaks information down into pieces that can take different paths
packet switching
allocates IP address
circuit switching
a dedicated connection is formed between two communicating parties
circuit switching
public-key package
circuit switching
exchange of control packets between computers
circuit switching
breaks information down into pieces that can take different paths
circuit switching
allocates IP address
ICANN
a dedicated connection is formed between two communicating parties
ICANN
public-key package
ICANN
exchange of control packets between computers
ICANN
breaks information down into pieces that can take different paths
ICANN
allocates IP address
PGP
a dedicated connection is formed between two communicating parties
PGP
public-key package
PGP
exchange of control packets between computers
PGP
breaks information down into pieces that can take different paths
PGP
allocates IP address
handshaking
a dedicated connection is formed between two communicating parties
handshaking
public-key package
handshaking
exchange of control packets between computers
handshaking
breaks information down into pieces that can take different paths
handshaking
allocates IP address
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
72
Match between columns
computer protocol
a unique identification number that defines each computer, service, or other device that connects to the Internet
computer protocol
used in a common encryption technique
computer protocol
a set of rules for exchanging electronic information
computer protocol
IP address for a computer does not change
computer protocol
temporary IP address for a computer that is assigned from a pool of available IP addresses
static addressing
a unique identification number that defines each computer, service, or other device that connects to the Internet
static addressing
used in a common encryption technique
static addressing
a set of rules for exchanging electronic information
static addressing
IP address for a computer does not change
static addressing
temporary IP address for a computer that is assigned from a pool of available IP addresses
key pair
a unique identification number that defines each computer, service, or other device that connects to the Internet
key pair
used in a common encryption technique
key pair
a set of rules for exchanging electronic information
key pair
IP address for a computer does not change
key pair
temporary IP address for a computer that is assigned from a pool of available IP addresses
IP address
a unique identification number that defines each computer, service, or other device that connects to the Internet
IP address
used in a common encryption technique
IP address
a set of rules for exchanging electronic information
IP address
IP address for a computer does not change
IP address
temporary IP address for a computer that is assigned from a pool of available IP addresses
dynamic addressing
a unique identification number that defines each computer, service, or other device that connects to the Internet
dynamic addressing
used in a common encryption technique
dynamic addressing
a set of rules for exchanging electronic information
dynamic addressing
IP address for a computer does not change
dynamic addressing
temporary IP address for a computer that is assigned from a pool of available IP addresses
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
73
Match between columns
private-key
unique domain within another domain
private-key
list of rules that define how to display HTML elements
private-key
communication between two or more people over the Internet in real time
private-key
section of a hard drive that stores web page information
private-key
used to decode an encrypted message
Internet cache
unique domain within another domain
Internet cache
list of rules that define how to display HTML elements
Internet cache
communication between two or more people over the Internet in real time
Internet cache
section of a hard drive that stores web page information
Internet cache
used to decode an encrypted message
cascading style sheet
unique domain within another domain
cascading style sheet
list of rules that define how to display HTML elements
cascading style sheet
communication between two or more people over the Internet in real time
cascading style sheet
section of a hard drive that stores web page information
cascading style sheet
used to decode an encrypted message
instant messaging
unique domain within another domain
instant messaging
list of rules that define how to display HTML elements
instant messaging
communication between two or more people over the Internet in real time
instant messaging
section of a hard drive that stores web page information
instant messaging
used to decode an encrypted message
second-level domain
unique domain within another domain
second-level domain
list of rules that define how to display HTML elements
second-level domain
communication between two or more people over the Internet in real time
second-level domain
section of a hard drive that stores web page information
second-level domain
used to decode an encrypted message
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
74
Match between columns
web
translates a domain name into an IP address
web
assigns users IP addresses for the duration of a session
web
enables users to purchase items over the Internet
web
delivers HTML documents on request
web
specifically deals with the SMTP communication method
DNS
translates a domain name into an IP address
DNS
assigns users IP addresses for the duration of a session
DNS
enables users to purchase items over the Internet
DNS
delivers HTML documents on request
DNS
specifically deals with the SMTP communication method
e-mail
translates a domain name into an IP address
e-mail
assigns users IP addresses for the duration of a session
e-mail
enables users to purchase items over the Internet
e-mail
delivers HTML documents on request
e-mail
specifically deals with the SMTP communication method
DHCP
translates a domain name into an IP address
DHCP
assigns users IP addresses for the duration of a session
DHCP
enables users to purchase items over the Internet
DHCP
delivers HTML documents on request
DHCP
specifically deals with the SMTP communication method
commerce
translates a domain name into an IP address
commerce
assigns users IP addresses for the duration of a session
commerce
enables users to purchase items over the Internet
commerce
delivers HTML documents on request
commerce
specifically deals with the SMTP communication method
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 74 flashcards in this deck.