Filters
Question type

Study Flashcards

When using ________ addressing, a computer is assigned a temporary address from available IP addresses.

Correct Answer

verifed

verified

dynamic
DH...

View Answer

In http://example.gov, what is the second-level domain?

Correct Answer

verifed

verified

Client-side programs run on a web server rather than on your computer.

A) True
B) False

Correct Answer

verifed

verified

________ is the most commonly used scripting language for creating DHTML effects.

Correct Answer

verifed

verified

The IPv4 protocol is beginning to be replaced by the ________ protocol.

Correct Answer

verifed

verified

IPv6
IP version 6
In...

View Answer

Strong encryption now requires ________-bit keys.


A) 40
B) 128
C) 256
D) 512

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

A(n)________ program is a computer program that runs on the client computer and requires no interaction with a web server.

Correct Answer

verifed

verified

client-side

IPv6 uses six groups of 16-bit numbers.

A) True
B) False

Correct Answer

verifed

verified

An IP address in the form 197.169.100.1 is called a(n) ________.


A) sequential access number
B) dotted quad
C) encryption key
D) random number

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

________ is a consortium of organizations that develops web protocols and sets standards.

Correct Answer

verifed

verified

World Wide...

View Answer

HTML is a simple programming language.

A) True
B) False

Correct Answer

verifed

verified

Match each of the following terms to its definition:

Premises
private-key
Internet cache
cascading style sheet
instant messaging
second-level domain
Responses
communication between two or more people over the Internet in real time
list of rules that define how to display HTML elements
section of a hard drive that stores web page information
used to decode an encrypted message
unique domain within another domain

Correct Answer

private-key
Internet cache
cascading style sheet
instant messaging
second-level domain

Transport Layer Security (TLS)and ________ are two protocols that provide data integrity and security for Internet transmission.

Correct Answer

verifed

verified

Secure Sockets Layer...

View Answer

<i> is an example of an HTML ________.

Correct Answer

verifed

verified

When a(n)________ address is assigned to a computer, its IP address will not change.

Correct Answer

verifed

verified

static

The United States government is in charge of the Internet.

A) True
B) False

Correct Answer

verifed

verified

A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.


A) dynamic
B) static
C) assigned
D) transition

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

The main path of the Internet along which data travel the fastest is known as the Internet ________.


A) protocol
B) highway
C) backbone
D) cache

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

C

A typical ________ is made up of one or more network switches to which ISPs connect.

Correct Answer

verifed

verified

Internet e...

View Answer

________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time.

Correct Answer

verifed

verified

Showing 1 - 20 of 74

Related Exams

Show Answer