Presentation is loading. Please wait.

Presentation is loading. Please wait.

Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

Similar presentations


Presentation on theme: "Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8."— Presentation transcript:

1

2 Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8

3 A _________ is a clip of audio or video content that is broadcast over the Internet using compressed audio files such as MP3s. podcast

4 Which of the following is the relatively new scam that attempts to trick you into giving away confidential information through the use of official-looking e- mails and phony Web sites? phishing

5 Often used to personalize a Web site and make return visits more efficient, a ___________ is stored on your computer by the Web server. cookie

6 A computer is identified by a(n) __________ so that data sent over the Internet gets sent to the correct computer. IP Address

7 The technology that allows you to listen to a music file while it is being downloaded from a Web site to your browser, without waiting for the download to finish, is called Streaming audio

8 _______ refers to the process of coding e-mail so that only the person with the key to the code can decode and read the message. Encryption

9 ____________ is a client-side, small application that resides on a server. applet

10 The communications method whereby data is broken into smaller chunks that are sent over various routes at the same time is Packet switching

11 Secure Sockets Layer: a.) provides an authentication and password protection. b.) creates a safe connection between a client and a server. c.) is an extension to the HTTP protocol. d.) was created especially for the transfer of hypertext documents. b.) creates a safe connection between a client and a server.

12 Which protocol is used on the Internet for data transmission? TCP/IP HTTP UDP FTP TCP/IP

13 All network nodes (computers and peripherals) are connected to each other and to the network by Transmission media

14 Which of the following attaches to a network and provides wireless nodes with a means of wirelessly connecting to the network? Wireless Access Point

15 Public places at which you can wirelessly connect to the Internet are known as hotspots

16 A _____________ is defined as anyone who breaks into a computer system (whether an individual computer or a network) unlawfully. hacker

17 Whatis the weakest link in a computer security system? The user

18 A LAN is most likely to be used for which geographical area? a.) building. b.) metropolitan area. c.) town. d.) country. a. building

19 ___________ topology is the most widely deployed client/server network layout in businesses today because it offers the most flexibility. Star

20 To flow through a network, data is broken into small segments called packets

21 Which of the cable types has the highest run length and the highest installation cost? Fiber-optic

22 A firewall ensures that incoming data came from a valid source by using a technique known as Packet screening


Download ppt "Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8."

Similar presentations


Ads by Google