1,185
16
Essay, 3 pages (650 words)

Misy160 3 and 13

interneta network of networks that’s the largest network in the world, connecting billions of computers globally

clienta computer that requests info from a server in a client/server network (such as a computer when you are connected to the internet)

servera computer that provides resources to other computer networks

IP addressA number that uniquely identifies each computer or device connected to the Internet. Consists of four numbers separated by dots such as 123. 45. 178. 91

internet backbonesthe main pathway of high-speed communications lines over which all internet traffic flows

Hypertext Transfer Protocol (HTTP)The protocol that allows files to be transferred from web server so that you can see them on your computer by using a browser

What does the S in HTTPS stand for? secure; HTTPS protect sensitive information from interception by hackers

Uniform Resource Locator (URL)A websites unique address; ex. Microsoft. com

What are the parts of a URL? Give an example of each part. parts of a URL include protocol (such as http:) domain name (such as www. nytimes. com) and, path or sub- directories (such as/pages/crosswords)

breadcrumb trailA navigation aid that shows users the path they taken to get to a web page or where the page located within the website; it usually appears in the top of a page

e-commerceThe process of conducting business online for purposes ranging from fundraising to advertising to selling products.

plug-in (player)A small software that ” plug in” to a web browser to enable a specific function- for example to view or hear certain multimedia files on the web

File transfer protocol (FTP)A protocol used to upload and download files from one computer to another over the internet

How are ISPs connected to each other? IXP- A way of connecting internet service providers (ISPs) that’s made up of one or more network switches to which the ISPs connect

How do individuals connect to an ISP? Individual internet users enter an ISP through a point of presence (POP)

Point of presence (POP)A bank of modems, servers, routers, and switches through which internet users connect to an internet service provider

packet switchingA communication methodology that makes computer communication efficient; in packet switching, data is broken into smaller chunks called packets

packet (data packet)A small segment of data that’s bundled for sending over transmission media. Each packet contains the address of the computer or peripheral device to which its being sent

Transmission Control Protocol (TCP)One of the original two protocol developed for the internet

TCP/IPthe main suite of protocols used for transmitting data over the internet. Named after Transmission Control Protocol (TCP) and Internet Protocol (IP)

Dotted decimal number (dotted quad)The form of an internet protocol address, where sets of numerals are separated by decimals i. e 197. 169. 73. 63

Static vs Dynamic IP addressingStatic addressing- IP address for computer never changes and is most likely assigned manually by a network administrator or an ISP. Dynamic Addressing – computer is assigned a temporary address from an available pool of IP addresses. Dynamic is better because it offers more security.

HTMLa set of rules fro making up blocks of text so that a browser knows how to display them. They are used to format text documents.

How is a URL converted to an IP Address? The computer consults the database maintained on a domain name system server that functions like a phone book for the internet.. Looks up domain name

DHCP serverA protocol for assigning dynamic internet protocol addresses

Root DNS serverA domain name system (DNS) server that contains the master listings for an entire top level domain

Simple Mail Transfer Protocol (SMTP)The protocol responsible for sending e-mail along the Internet to its destination; part of the Internet Protocol suite

public key encryption keyA type of encryption where two keys, known as key pair are created. One key is used for coding the other for decoding. They key for coding is distributed as a public key, while the private key is retained for coding

private-key encryptionA type of encryption where only two parties involved in sending the message have the code

Key Paircoding/decoding

Java ScriptIt is a scripting language for creating DHTML effects. Documents can be made responsive to mouse clicks and typing.

ONMISY160 3 AND 13 SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder Now

Thank's for Your Vote!
Misy160 3 and 13. Page 1
Misy160 3 and 13. Page 2
Misy160 3 and 13. Page 3
Misy160 3 and 13. Page 4
Misy160 3 and 13. Page 5

This work, titled "Misy160 3 and 13" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Misy160 3 and 13'. 31 August.

Reference

AssignBuster. (2022, August 31). Misy160 3 and 13. Retrieved from https://assignbuster.com/misy160-3-and-13/

References

AssignBuster. 2022. "Misy160 3 and 13." August 31, 2022. https://assignbuster.com/misy160-3-and-13/.

1. AssignBuster. "Misy160 3 and 13." August 31, 2022. https://assignbuster.com/misy160-3-and-13/.


Bibliography


AssignBuster. "Misy160 3 and 13." August 31, 2022. https://assignbuster.com/misy160-3-and-13/.

Work Cited

"Misy160 3 and 13." AssignBuster, 31 Aug. 2022, assignbuster.com/misy160-3-and-13/.

Get in Touch

Please, let us know if you have any ideas on improving Misy160 3 and 13, or our service. We will be happy to hear what you think: [email protected]