How does information go from one computer to another? - Information goes from one computer to another in a packet of information and a packet travels from one place to another on the internet., What acts like traffic managers to keep packets moving smoothly? - Routers act like traffic managers, What does TCP stand for? - Transmission control protocol, What does TCP do? - Manages the sending and receiving of all your data as packets., What does URL stand for? - Uniform Resource Locator, What does HTTP stand for? - Hypertext Transfer Protocol, What are cookies? - What websites use to remember who you are., What are Secure Sockets Layer (SSL) and Transport Layer Security (TLS)? - A layer of security wrapped around communication to prevent snooping and tampering., How do you know that SSL and TLS are active? - A digital certificate is properly issued., Who co-created the internet - Vint , What does ARPANET stand for? - Advanced Research Project Agency Network, Who controls the internet? - No one and everyone. The internet is made up of a large number of independently operated networks., 8 bits strung together = ? - One byte, 1024 Bytes = ? - 1 kilobyte, 1024 kilobytes = ? - 1 megabyte, What is bandwidth? - Bandwidth is measured by bit rate, What is the bit rate? - The number of bits that we can send over a given period of time., What is latency? - The amount of time it takes for one bit to travel from one place to another., What is a fiber optic cable? - A thread of glass engineered to reflect light., What is wireless? - They typically use a radio signal to send bits from one place to another., What is encryption? - Scrambling or changing a message, What is decryption? - Unscrambling the message, What is a key? - A secret password for unlocking a message, What is the standard key length for today’s secure communications? - There are 10 billion possible key solutions. 256 bit keys are the standard length., What is symmetric encryption? - The same key used to decrypt and encrypt, What is asymmetric encryption? - Different keys used for decrypting and encrypting., What is a Public Key? - In terms of a private mailbox, anybody can deposit mail but they need a key to do it and there can be many copies of that key to give out or even use it to make it public., What is a Private Key? - The exchange of secure messages, What is a virus - An organism that spreads through airborne or physical contact., What does DDOS stand for? - Distributed Denial of Service,
0%
How the internet works 1-3
Kopīgot
autors:
Schung32
Rediģēt saturu
Iegult
Vairāk
Līderu saraksts
Rādīt vairāk
Rādīt mazāk
Šī līderu grupa pašlaik ir privāta. Noklikšķiniet uz
Kopīgot
, lai to publiskotu.
Mācību līdzekļa īpašnieks ir atspējojis šo līderu grupu.
Šī līderu grupa ir atspējota, jo jūsu izmantotās iespējas atšķiras no mācību līdzekļa īpašnieka iespējām.
Atjaunot sākotnējās iespējas
Saderību meklēšana
ir atvērta veidne. Tā neģenerē rezultātus līderu grupai.
Nepieciešams pieteikties
Vizuālais stils
Fonts
Nepieciešams abonements
Iespējas
Pārslēgt veidni
Rādīt visus
Atskaņojot aktivitāti, tiks parādīti vairāki formāti.
Atvērtie rezultāti
Kopēt saiti
QR kods
Dzēst
Atjaunot automātiski saglabāto:
?