1) A self-contained packet of information, that has sufficient information to be routed from the source to destination without reliance on earlier exchanges between the source and destination and the transporting network. a) registries b) port c) datagram d) imap 2) An inefficient method of a communication link whereby the two parties to a conversation temporarily shared a single channel for as long as the communication takes place for, even if no data is transmitted all of the time. a) imap b) encryption c) routers d) circuitswitching 3) These are 48-bit identifiers allocated to network devices by the manufacturer. Normally, they are quoted in human readable groups of six bytes or octets (octets because each byte is eight bits) and displayed as hexadecimal digits. a) mac b) hops c) wap d) trojans 4) An algorithm originally used by Google that orders thr popularity of websites on several statistical measures, such as the number of incoming and outgoing links. a) payload b) pagerank c) ftp d) dns 5) Website's are predominantly writen in this format, it describes the content and structure of the webpage so that a browser is able to render the page for the viewer. a) html b) tcp/ip c) dns d) datagram 6) When a packet passes through a router , i.e. it is depackaged and the most efficent route is recalculated to the destination address, it is repackaged and then sent on its way. This event is called a ..... a) gateway b) ftp c) switch d) hops 7) The network that attaches devices to a common backbone. This backbone is typically based on copper wire and is limited in its potential size. This is because signals become attenuated (weakened) with distance and this leads to errors in transmission. Another drawback is that if the backbone is compromised, the network as a whole fails. a) gateway b) routers c) bus d) tcp/ip 8) One technique which uses polynomials and generates a checksum for error detection in a "packet" is the …………. a) wap b) host c) crc d) mac 9) Similar to a router except that when it depackages a packet looking at addresses and repackages the packets on a network it translates between two different protocols, something that a router cannot do. a) fqdn b) switch c) gateway d) crc 10) A very efficient method to transfer data across the internet. It works as a high level protocol in the application layer using appropriate software. a) ftp b) port c) routers d) www 11) In a DNS the name furthest to the left is called the ………….. name and is the name of the computer where the resource originates. a) host b) tcp/ip c) dns d) cache 12) A packet entering or leaving the network must have the destination address but also the …………… /…………… a) proxy b) sourceaddress c) gateway d) bus 13) These are circuits that in the past were plugged into a computer's bus to produce signals that are placed on the transmission medium and also to receive signals from it. a) cache b) dns c) port d) nics 14) The transformation of data in such a way that unauthorised people cannot make sense of it. a) imap b) cache c) hops d) encryption 15) The central part of a star network topolgy, this redirects traffic to the correct node from the server and via-versa, it increases security as not every node now has access to the data. a) lan b) pagerank c) switch d) mac 16) A mail protocol that is designed to keep the email on the server, thus maintaining synchronisation between devices. a) wap b) imap c) trojans d) circuitswitching 17) This word means that the network exists at a defined and limited location. It could be a room, a building or a campus. a) lan b) ftp c) nics d) gateway 18) This is used to provide a systematic human-friendly substitute for IP addresses. a) dns b) www c) fqdn d) sourceaddress 19) These are identified by a hash symbol in HTML files preceding the id name, they must be unique to every webpage a) www b) identifiers c) lan d) hops 20) A device that connects networks. It receives data packets from one network and forwards them to another network based on the address information in the packet. They determine where to send a packet according to either a table of information about neighbouring networks or by using an algorithm to determine the optimum next step for a packet. a) fqdn b) identifiers c) bus d) routers 21) A piece of hardware that converts digital traffic carried through the waves into physical pulses that can be transmitted along cables and through routers. a) tcp/ip b) encryption c) wap d) proxy 22) Applications have an associated one of these, for instance telnet uses 23, HTTP uses 80, mail uses 25. Any incoming messages can be filtered by administrators settings such as if the administartor disables telnet, then any packet destined for ............ 23 and therefore that application can be rejected. a) identifiers b) hops c) gateway d) port 23) A collection of web pages that reside on computers connected to the internet. a) www b) ftp c) hops d) sourceaddress 24) The data in a packet is usually refered to as the ……….. a) www b) fqdn c) payload d) imap 25) A set of internet protocols containing 4 levels. a) payload b) tcp/ip c) ftp d) hops 26) A program that when installed delivers its payload and opens up your computer via the backdoor, they cannot self replicate a) circuitswitching b) www c) trojans d) encryption 27) There are 5 of these goverened by ICANN that hold records of all the domain names currently issued to companies and their details. They also allocate IP addresses. a) routers b) registries c) trojans d) payload 28) The proxy server maintains one of these to ensure higher speeds of access to the same websites in the future. a) host b) circuitswitching c) cache d) lan 29) These servers can act as firewalls. They are computers interposed between a network and a remote resource. a) switch b) datagram c) proxy d) nics 30) This is the website domain name which also includes the host name on the furthest left. e.g mail.websitename.co.uk a) proxy b) fqdn c) trojans d) gateway

Leaderboard

Visual style

Options

Switch template

Continue editing: ?