Deck 6: Data Communication and the Cloud

Full screen (f)
exit full mode
Question
An internet is a network of networks that connect LANs, WANs, and other internets.
Use Space or
up arrow
down arrow
to flip the card.
Question
Communications speeds are expressed in bytes, whereas memory sizes are expressed in bits.
Question
Bluetooth is a wireless protocol designed for transmitting data over long distances.
Question
As DSL signals interfere with telephone signals, DSL data transmission and telephone conversations cannot occur simultaneously.
Question
Wired LAN connections use the IEEE 802.3 protocol, while wireless LAN connections use the IEEE 802.11 protocol.
Question
A modem converts digital data into analog signals.
Question
An intranet is a private internet that is used exclusively within an organization.
Question
A university would use a WAN to connect its campuses in two cities.
Question
Wired LAN connections use a protocol standard called Ethernet to communicate.
Question
The abbreviations k, M, and G have the same meaning for computer memory as they have for communication speeds.
Question
A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly.
Question
For two devices to communicate, they must use the same protocol.
Question
With a WAN, an organization is allowed to place communications lines wherever it wants, because all lines reside on its premises.
Question
NICs which support 10/100/1000 Ethernet allow for transmission at a rate of 10, 100, or 1,000 Mbps.
Question
A computer network between Seattle and Philadelphia is made possible through a LAN.
Question
When you connect to the Internet, you are actually connecting to an ISP.
Question
The World Wide Web sponsors committees that create and publish protocols and other standards.
Question
A switch is a special-purpose computer that receives and transmits wired traffic on a LAN.
Question
UTP cable contains sets of wires that are twisted together to improve signal quality.
Question
An NIC is a device that connects a computer's or printer's circuitry to network wires.
Question
The owner of a domain name is capable of changing the affiliated IP addresses at its discretion.
Question
DSL modems use their own protocols for data transmission.
Question
ICANN controls the assignment of all IP addresses, both public and private.
Question
If you had a private IP address for your computer, every time you moved it, the Internet would have to update its addressing mechanisms to route traffic to your new location.
Question
TCP/IP Protocol architecture is a scheme of four protocol types arranged in layers.
Question
To ensure security, VPN client software decrypts the original message so that its contents are protected from snooping.
Question
A domain name is a worldwide-unique name that is affiliated with a public IP address.
Question
Cable modems modulate in such a way that their signals interfere with TV signals.
Question
Unlike HTTP, FTP does not have a secure version.
Question
A packet is a piece of a message that is handled by programs that implement IP.
Question
TCP provides internet routing and IP provides reliable internet transport.
Question
Web servers run on a server-tier computer and manage HTTP traffic by sending and receiving Web pages to and from clients.
Question
FTP is the protocol used between browsers and Web servers.
Question
HTML is the most common language for defining the structure and layout of Web pages.
Question
A URL usually consists of a protocol followed by a domain name or public IP address.
Question
In three-tier architecture, the user tier consists of computers that run Web servers and process application programs.
Question
The primary protocol of the Internet is called IP.
Question
Broadband lines typically have transmission speeds less than 56 Kbps.
Question
HTTPS is the secure version of HTTP.
Question
SMTP is the protocol used between browsers and Web servers.
Question
A private internet that is used exclusively within an organization is called a(n)________.

A) ethernet
B) intranet
C) cloud
D) server
Question
To enable the seamless flow of data across the networks that comprise an internet, an elaborate scheme called a(n)________ is used.

A) layered protocol
B) virtual private network
C) three-tier system
D) remote access system
Question
One of the advantages of cloud-based hosting is the in-depth visibility of security and disaster preparedness.
Question
Silverlight is an add-on to browsers that was developed by Adobe and is useful for providing animation, movies, and other advanced graphics inside a browser.
Question
The term "cloud" is used to refer to the elastic leasing of pooled computer resources over the Internet.
Question
Computers that reside in different geographic locations are connected using a(n)________.

A) WAN
B) LAN
C) URL
D) IP address
Question
A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN.

A) codec
B) modem
C) switch
D) port
Question
Which of the following is the device that connects a computer's or printer's circuitry to network wires?

A) port
B) switch
C) router
D) NIC
Question
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

A) database
B) application
C) network
D) server
Question
Remote access systems save time and travel expense and make the skills and abilities of an expert available in places where he or she is not physically located.
Question
An organization that provides software as a service provides only operating systems and application programs.
Question
The most basic cloud offering is platform as a service (PaaS), which is the cloud hosting of a bare server computer or disk drive.
Question
For a printer or laptop to connect to a wireless LAN, it must have a(n)________.

A) hyperlink
B) UTP cable
C) WNIC
D) DSL
Question
Teleaction reduces the need for local support staff.
Question
A ________ is a set of rules that programs on two communicating devices follow.

A) codec
B) URL
C) packet
D) protocol
Question
Amazon EC2 and Amazon S3 are both examples of platform as a service.
Question
Salesforce.com is an example of a cloud vendor who provides software as a service.
Question
Which of the following is the distinguishing feature of a LAN as compared to a WAN?

A) single location
B) number of users
C) bandwidth
D) hardware requirements
Question
Teleaction increases the value of robotics.
Question
Most LAN connections are made using ________.

A) Sc/TP cable
B) UTP cable
C) STP cable
D) F/TP cable
Question
________ typically have transmission speeds less than 56 Kbps.

A) Narrowband lines
B) Digital subscriber lines
C) Cable modems
D) WAN wireless connections
Question
Which of the following is true about cable modems?

A) They provide high-speed data transmission using telephone cables.
B) They offer consistent performance, irrespective of the number of users sending and receiving data.
C) They rely on high-capacity optical fiber cables and use their own protocols for data transmission.
D) They provide faster download speeds than DSL modems.
Question
Which of the following is true of DSL modems?

A) DSL modem signals do not interfere with telephone signals.
B) DSL modems use the same protocols as cable modems for data transmission.
C) DSL modem signals replace phone signals and are sent to the ISP.
D) DSL data transmission and telephone conversations cannot occur simultaneously.
Question
The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.

A) FTP
B) VOIP
C) ICANN
D) TCP/IP
Question
________ is a wireless protocol designed for transmitting data over short distances, replacing cables.

A) IPv6
B) PaaS
C) Bluetooth
D) Silverlight
Question
Which of the following TCP/IP application-layer protocols is used for e-mail transmission?

A) FTP
B) HTTPS
C) SMTP
D) IP
Question
A(n)________ converts an analog signal to a digital one during data transmission.

A) switch
B) access point
C) modem
D) ISP
Question
The top layer of TCP/IP Protocol architecture is related to ________.

A) internets
B) transport
C) applications
D) data links
Question
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and to maintain Web sites?

A) FTP
B) IP
C) HTTPS
D) HTTP
Question
________ modems modulate in such a way that they do not interfere with TV signals, even though they use the same lines.

A) DSL
B) Dial-up
C) Cable
D) ADSL
Question
The primary protocol of the Internet layer of the TCP/IP protocol architecture is called ________.

A) IP
B) SMTP
C) HTTP
D) TCP
Question
Communications speeds are expressed in ________.

A) bits
B) bytes
C) hertz
D) packets
Question
The IEEE 802.3 protocol standard is also known as ________.

A) Bluetooth
B) Ethernet
C) Intranet
D) Internet
Question
Which of the following protocols is concerned with the application layer of TCP/IP Protocol architecture?

A) HTTP
B) IEEE 802.3
C) IEEE 802.11
D) IP
Question
Which of the following protocols guarantees secure data transmission?

A) HTTP
B) FTP
C) HTTPS
D) SMTP
Question
Which of the following statements is true about IEEE 802.3?

A) It is the protocol for wireless LAN connections.
B) It is the protocol for Bluetooth.
C) It is the protocol for wired LAN connections.
D) It is the universal standard protocol for WNICs.
Question
Which of the following is a component of a LAN device that processes wireless traffic and communicates with the wired switch?

A) access point
B) packet
C) server
D) router
Question
Which of the following is a function of an ISP?

A) It transmits data over short distances, replacing cables.
B) It serves as a gateway to the Internet.
C) It describes how messages must be processed for wired transmission.
D) It connects computers within a LAN.
Question
Which of the following statements is true about the IEEE 802.11 protocol?

A) It is also known as Ethernet.
B) It is used for wired LAN connections.
C) It cannot be processed by access points.
D) It allows speeds of up to 600 Mbps.
Question
A(n)________ is a piece of a message that is handled by programs that implement IP.

A) e-mail
B) packet
C) tag
D) attribute
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/130
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Data Communication and the Cloud
1
An internet is a network of networks that connect LANs, WANs, and other internets.
True
2
Communications speeds are expressed in bytes, whereas memory sizes are expressed in bits.
False
3
Bluetooth is a wireless protocol designed for transmitting data over long distances.
False
4
As DSL signals interfere with telephone signals, DSL data transmission and telephone conversations cannot occur simultaneously.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
5
Wired LAN connections use the IEEE 802.3 protocol, while wireless LAN connections use the IEEE 802.11 protocol.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
6
A modem converts digital data into analog signals.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
7
An intranet is a private internet that is used exclusively within an organization.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
8
A university would use a WAN to connect its campuses in two cities.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
9
Wired LAN connections use a protocol standard called Ethernet to communicate.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
10
The abbreviations k, M, and G have the same meaning for computer memory as they have for communication speeds.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
11
A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
12
For two devices to communicate, they must use the same protocol.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
13
With a WAN, an organization is allowed to place communications lines wherever it wants, because all lines reside on its premises.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
14
NICs which support 10/100/1000 Ethernet allow for transmission at a rate of 10, 100, or 1,000 Mbps.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
15
A computer network between Seattle and Philadelphia is made possible through a LAN.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
16
When you connect to the Internet, you are actually connecting to an ISP.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
17
The World Wide Web sponsors committees that create and publish protocols and other standards.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
18
A switch is a special-purpose computer that receives and transmits wired traffic on a LAN.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
19
UTP cable contains sets of wires that are twisted together to improve signal quality.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
20
An NIC is a device that connects a computer's or printer's circuitry to network wires.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
21
The owner of a domain name is capable of changing the affiliated IP addresses at its discretion.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
22
DSL modems use their own protocols for data transmission.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
23
ICANN controls the assignment of all IP addresses, both public and private.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
24
If you had a private IP address for your computer, every time you moved it, the Internet would have to update its addressing mechanisms to route traffic to your new location.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
25
TCP/IP Protocol architecture is a scheme of four protocol types arranged in layers.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
26
To ensure security, VPN client software decrypts the original message so that its contents are protected from snooping.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
27
A domain name is a worldwide-unique name that is affiliated with a public IP address.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
28
Cable modems modulate in such a way that their signals interfere with TV signals.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
29
Unlike HTTP, FTP does not have a secure version.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
30
A packet is a piece of a message that is handled by programs that implement IP.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
31
TCP provides internet routing and IP provides reliable internet transport.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
32
Web servers run on a server-tier computer and manage HTTP traffic by sending and receiving Web pages to and from clients.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
33
FTP is the protocol used between browsers and Web servers.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
34
HTML is the most common language for defining the structure and layout of Web pages.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
35
A URL usually consists of a protocol followed by a domain name or public IP address.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
36
In three-tier architecture, the user tier consists of computers that run Web servers and process application programs.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
37
The primary protocol of the Internet is called IP.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
38
Broadband lines typically have transmission speeds less than 56 Kbps.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
39
HTTPS is the secure version of HTTP.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
40
SMTP is the protocol used between browsers and Web servers.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
41
A private internet that is used exclusively within an organization is called a(n)________.

A) ethernet
B) intranet
C) cloud
D) server
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
42
To enable the seamless flow of data across the networks that comprise an internet, an elaborate scheme called a(n)________ is used.

A) layered protocol
B) virtual private network
C) three-tier system
D) remote access system
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
43
One of the advantages of cloud-based hosting is the in-depth visibility of security and disaster preparedness.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
44
Silverlight is an add-on to browsers that was developed by Adobe and is useful for providing animation, movies, and other advanced graphics inside a browser.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
45
The term "cloud" is used to refer to the elastic leasing of pooled computer resources over the Internet.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
46
Computers that reside in different geographic locations are connected using a(n)________.

A) WAN
B) LAN
C) URL
D) IP address
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
47
A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN.

A) codec
B) modem
C) switch
D) port
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following is the device that connects a computer's or printer's circuitry to network wires?

A) port
B) switch
C) router
D) NIC
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
49
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

A) database
B) application
C) network
D) server
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
50
Remote access systems save time and travel expense and make the skills and abilities of an expert available in places where he or she is not physically located.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
51
An organization that provides software as a service provides only operating systems and application programs.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
52
The most basic cloud offering is platform as a service (PaaS), which is the cloud hosting of a bare server computer or disk drive.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
53
For a printer or laptop to connect to a wireless LAN, it must have a(n)________.

A) hyperlink
B) UTP cable
C) WNIC
D) DSL
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
54
Teleaction reduces the need for local support staff.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
55
A ________ is a set of rules that programs on two communicating devices follow.

A) codec
B) URL
C) packet
D) protocol
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
56
Amazon EC2 and Amazon S3 are both examples of platform as a service.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
57
Salesforce.com is an example of a cloud vendor who provides software as a service.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following is the distinguishing feature of a LAN as compared to a WAN?

A) single location
B) number of users
C) bandwidth
D) hardware requirements
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
59
Teleaction increases the value of robotics.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
60
Most LAN connections are made using ________.

A) Sc/TP cable
B) UTP cable
C) STP cable
D) F/TP cable
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
61
________ typically have transmission speeds less than 56 Kbps.

A) Narrowband lines
B) Digital subscriber lines
C) Cable modems
D) WAN wireless connections
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is true about cable modems?

A) They provide high-speed data transmission using telephone cables.
B) They offer consistent performance, irrespective of the number of users sending and receiving data.
C) They rely on high-capacity optical fiber cables and use their own protocols for data transmission.
D) They provide faster download speeds than DSL modems.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following is true of DSL modems?

A) DSL modem signals do not interfere with telephone signals.
B) DSL modems use the same protocols as cable modems for data transmission.
C) DSL modem signals replace phone signals and are sent to the ISP.
D) DSL data transmission and telephone conversations cannot occur simultaneously.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
64
The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.

A) FTP
B) VOIP
C) ICANN
D) TCP/IP
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
65
________ is a wireless protocol designed for transmitting data over short distances, replacing cables.

A) IPv6
B) PaaS
C) Bluetooth
D) Silverlight
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following TCP/IP application-layer protocols is used for e-mail transmission?

A) FTP
B) HTTPS
C) SMTP
D) IP
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
67
A(n)________ converts an analog signal to a digital one during data transmission.

A) switch
B) access point
C) modem
D) ISP
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
68
The top layer of TCP/IP Protocol architecture is related to ________.

A) internets
B) transport
C) applications
D) data links
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and to maintain Web sites?

A) FTP
B) IP
C) HTTPS
D) HTTP
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
70
________ modems modulate in such a way that they do not interfere with TV signals, even though they use the same lines.

A) DSL
B) Dial-up
C) Cable
D) ADSL
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
71
The primary protocol of the Internet layer of the TCP/IP protocol architecture is called ________.

A) IP
B) SMTP
C) HTTP
D) TCP
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
72
Communications speeds are expressed in ________.

A) bits
B) bytes
C) hertz
D) packets
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
73
The IEEE 802.3 protocol standard is also known as ________.

A) Bluetooth
B) Ethernet
C) Intranet
D) Internet
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following protocols is concerned with the application layer of TCP/IP Protocol architecture?

A) HTTP
B) IEEE 802.3
C) IEEE 802.11
D) IP
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following protocols guarantees secure data transmission?

A) HTTP
B) FTP
C) HTTPS
D) SMTP
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
76
Which of the following statements is true about IEEE 802.3?

A) It is the protocol for wireless LAN connections.
B) It is the protocol for Bluetooth.
C) It is the protocol for wired LAN connections.
D) It is the universal standard protocol for WNICs.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following is a component of a LAN device that processes wireless traffic and communicates with the wired switch?

A) access point
B) packet
C) server
D) router
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following is a function of an ISP?

A) It transmits data over short distances, replacing cables.
B) It serves as a gateway to the Internet.
C) It describes how messages must be processed for wired transmission.
D) It connects computers within a LAN.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
79
Which of the following statements is true about the IEEE 802.11 protocol?

A) It is also known as Ethernet.
B) It is used for wired LAN connections.
C) It cannot be processed by access points.
D) It allows speeds of up to 600 Mbps.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
80
A(n)________ is a piece of a message that is handled by programs that implement IP.

A) e-mail
B) packet
C) tag
D) attribute
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 130 flashcards in this deck.