1. What the rules are called for exchanging data Between computers | | | | a. URL | b. Protocol | c. Medium | d. Browser | 2. Which device is used as a communication device in internet. | | | a. Mouse | b.
Video 4.0 * SSL * Used by web browser * Encrypts data being sent from your pc to the server * Https:// Terms SSL- secure sockets layer Summary This segment went over SSL or secure sockets layer and what it used for. Also it covered what to look for when trying to see if the site your on is using SSL. My Thoughts This was a short and to the point video. I liked how it showed the user where to look for the SSL location or https:// . Video 4.14 * Email * SMTP * POP3 and IMAP4 Terms SMTP- simple mail transfer protocol is used to SEND email to the mail server and to the internet POP3- Post office protocol is the service used to download emails from the mail server to the client.
NT1210T January 13th, 2015 Computer Basics Review Chapter 2 Review Activities 1. Which of the following terms is the closest synonym to the term computer networking? C. Datacom 2. Ann uses her email address, me@here.com, to send an email to Bob, whose email address is you@there.com. The message contains a few paragraphs of text.
Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network? * c. Net view 29. To view eDirectory information on a NetWare 5.1 server, which of the following tools should you use? * d. Novell Client 30. The Nbtstat command is used to enumerate *nix systems.
Zubin Panna NT2640 IP Networking 1. Given the following routing table on a router, which next hop will the router select given the IP packet with the destination address of : 19.48.254.3? Address/Mask Next hop 19.46.0.0/16 Interface 0 19.47.0.0/16 Interface 1 19.52.43.0/24 Router 1 default Router 2 a) Router 2 b) Router 1 c) Interface 0 d) Interface 1 2. Which one of the following is a feature- of a connectionless protocol like UDP? a) Port Number b) Flow control c) Secure d) Error recovery 3.
Chapter 2 1. Which of the following terms is the closest synonym to the term computer networking? a. Telecom b. Protocol c. Datacom d. Stuff 2. Ann uses her email address, me@here.com to send an email to Bob, whose email address is you@there.com. The message contains a few paragraphs of text.
When the Save As window appears, select the folder in the Save In drop-down list where you wish to save your data files. In the File Name box, key Comprehensive Problem 02 Your Name (for example, Comprehensive Problem 02 John Doe) to identify the file containing your work. Click on the Save button. 2. Click on the Journal toolbar button and key the journal entries for July, 2012 in the General Journal.
1. Which of the following terms is the closest synonym to the term computer networking? a. Telecom b. Protocol c. Datacom d. Stuff 2. Ann uses her email address, me@here.com, to send an email to Bob, whose email address is you@there.com. The message contains a few paragraphs of text.
Unit 3 Assignment 1: Networking Models Review Multiple-choice questions 1. B. The network uses standards defined in TCP/IP RFCs, plus other standards. 2. C. Ethernet D. TCP/IP mapping 3.
Exchange your public key file (YourLastName_public.asc) with your partner through an email or a thumb drive. 2. Import your partner’s public key into your keyring editor and Sign the public key that you have just imported. a. Right click on the public key file that your partner sent you b. Click on More GpgEx Options and Import keys.