Networks Flashcards
ability to prevent a file from being accidentally erased or damaged
file protection
a degree to which a network can continue to function despite one or more of its processes or components breaking or being unavailable
fault-tolerance
a device that sends data from one network to another
router
a number used within a computer to identify a specific process
port
a numerical reference to a particular device in a network
IP address
a computer that handles requests and returns data to other computers in a network
server
Which term describes the degree to which a network can continue to function despite one or more of its processes or components breaking or being unavailable?
fault-tolerance
Which part of a network controls the flow of information among computers within a network?
switch
A _____ handles requests and returns data to other computers in a network.
server
A _____ is a device that sends data from one network to another.
router
a company that provides Internet access to customers for a fee
ISP
a protocol (a set of rules) for how web content should be sent and received by a web browser
HTTP
the address of a webpage or website, such as www.microsoft.com/homepage.htm
URL
a service on the Internet that translates back and forth between IP addresses and domain names
DNS
a secure version of the protocol a web browser uses to request a webpage
HTTPS
a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on world wide web pages
HTML
The internet’s data pathways rely on what kind of hardware device to route data to its destination?
routers
Which term describes a web address such as www.edgenuity.com?
domain name
Which of these is a network of servers that store and deliver web content?
the World Wide Web
each computer in a network can act as a server for all the other computers, sharing files and access to devices.
peer-to-peer
Which term means a cryptographic protocol used to manage network devices securely when they are used with a network that is not secure, such as when remotely accessing a computer?
Secure Shell (SSH)
rules used by a computer network.
Network protocol
Which term describes a protocol used to retrieve email, deleting the email and its attachments from the server after the email is retrieved?
Post Office Protocol version 3 (POP 3)