How does information go from one computer to another? - Information goes from one computer to another in a packet of information and a packet travels from one place to another on the internet., What acts like traffic managers to keep packets moving smoothly? - Routers act like traffic managers, What does TCP stand for? - Transmission control protocol, What does TCP do? - Manages the sending and receiving of all your data as packets., What does URL stand for? - Uniform Resource Locator, What does HTTP stand for? - Hypertext Transfer Protocol, What are cookies? - What websites use to remember who you are., What are Secure Sockets Layer (SSL) and Transport Layer Security (TLS)? - A layer of security wrapped around communication to prevent snooping and tampering., How do you know that SSL and TLS are active? - A digital certificate is properly issued., Who co-created the internet - Vint , What does ARPANET stand for? - Advanced Research Project Agency Network, Who controls the internet? - No one and everyone. The internet is made up of a large number of independently operated networks., 8 bits strung together = ? - One byte, 1024 Bytes = ? - 1 kilobyte, 1024 kilobytes = ? - 1 megabyte, What is bandwidth? - Bandwidth is measured by bit rate, What is the bit rate? - The number of bits that we can send over a given period of time., What is latency? - The amount of time it takes for one bit to travel from one place to another., What is a fiber optic cable? - A thread of glass engineered to reflect light., What is wireless? - They typically use a radio signal to send bits from one place to another., What is encryption? - Scrambling or changing a message, What is decryption? - Unscrambling the message, What is a key? - A secret password for unlocking a message, What is the standard key length for today’s secure communications? - There are 10 billion possible key solutions. 256 bit keys are the standard length., What is symmetric encryption? - The same key used to decrypt and encrypt, What is asymmetric encryption? - Different keys used for decrypting and encrypting., What is a Public Key? - In terms of a private mailbox, anybody can deposit mail but they need a key to do it and there can be many copies of that key to give out or even use it to make it public., What is a Private Key? - The exchange of secure messages, What is a virus - An organism that spreads through airborne or physical contact., What does DDOS stand for? - Distributed Denial of Service,
0%
How the internet works 1-3
Поделиться
от
Schung32
Редактировать контент
Внедрить
Больше
Таблица лидеров
Показать больше
Показать меньше
Эта таблица лидеров в настоящее время является частной. Нажмите
Поделиться
, чтобы сделать ее общедоступной.
Эта таблица лидеров была отключена владельцем ресурса.
Эта таблица лидеров отключена, так как у вас и у владельца ресурса разные значения параметров.
Варианты отмены изменения
Сопоставить
— это открытый шаблон. Он не создает баллы для таблицы лидеров.
Требуется вход в систему
Визуальный стиль
Шрифты
Требуется подписка
Параметры
Переключить шаблон
Показать все
Дополнительные форматы будут отображаться при выполнении занятия.
Открыть результаты
Скопировать ссылку
QR-код
Удалить
Восстановить автоматически сохраненное:
?