Asynchronous communicationsis

a) that one person posts a message using the Internet.

b) is linked to your ISP and is online whenever your computer and modem are on, even if you are not actively accessing the Internet.

c) can be accessed by logging in without a password by using the user ID “anonymous.” Some anonymous sites request users to enter their e‑mail addresses as a pass‑word, but rarely is that piece of information used for verification or tracking.

d) a file sharing protocol that distrib‑utes the role of a file server across a collection of dispersed computers

e) is similar to an online diary; it is maintained by a person, a company, or an organization, and contains a series of entries on one or more topics.

 

BitTorrent

a) is a file sharing protocol that distrib‑utes the role of a file server across a collection of dispersed computers

b) is linked to your ISP and is online whenever your computer and modem are on, even if you are not actively accessing the Internet.

c) can be accessed by logging in without a password by using the user ID “anonymous.” Some anonymous sites request users to enter their e‑mail addresses as a pass‑word, but rarely is that piece of information used for verification or tracking.

d) that one person posts a message using the Internet.

e) is similar to an online diary; it is maintained by a person, a company, or an organization, and contains a series of entries on one or more topics.

 

Blog

a) is similar to an online diary; it is maintained by a person, a company, or an organization, and contains a series of entries on one or more topics.

b) is linked to your ISP and is online whenever your computer and modem are on, even if you are not actively accessing the Internet.

c) can be accessed by logging in without a password by using the user ID “anonymous.” Some anonymous sites request users to enter their e‑mail addresses as a pass‑word, but rarely is that piece of information used for verification or tracking.

d) that one person posts a message using the Internet.

e) is a file sharing protocol that distrib‑utes the role of a file server across a collection of dispersed computers

 

Cable Internet service

a) is a means of distributing always‑on broadband Internet access over the same infrastructure that offers cable television service.

b) which converts your computer’s signal into one that can travel over the CATV network.

c) the doorway that allows a computer to exchange data with other devices

d) a fixed Internet connection that uses a voiceband modem and telephone lines to transport data between your computer and your ISP.

e) has been used by governments to keeps citizens away from Web sites that supply politically or culturally inflammatory information.

 

Cable modem

a) which converts your computer’s signal into one that can travel over the CATV network.

b) is a means of distributing always‑on broadband Internet access over the same infrastructure that offers cable television service

c) the doorway that allows a computer to exchange data with other devices

d) a fixed Internet connection that uses a voiceband modem and telephone lines to transport data between your computer and your ISP.

e) has been used by governments to keeps citizens away from Web sites that supply politically or culturally inflammatory information.

 

Communications portis

a) the doorway that allows a computer to exchange data with other devices

b) is a means of distributing always‑on broadband Internet access over the same infrastructure that offers cable television service.

c) which converts your computer’s signal into one that can travel over the CATV network.

d) a fixed Internet connection that uses a voiceband modem and telephone lines to transport data between your computer and your ISP.

e) has been used by governments to keeps citizens away from Web sites that supply politically or culturally inflammatory information.

 

Dial up connection

a) is a fixed Internet connection that uses a voiceband modem and telephone lines to transport data between your computer and your ISP.

b) is a means of distributing always‑on broadband Internet access over the same infrastructure that offers cable television service.

c) which converts your computer’s signal into one that can travel over the CATV network.

d) the doorway that allows a computer to exchange data with other devices

e) has been used by governments to keeps citizens away from Web sites that supply politically or culturally inflammatory information.

 

DNS cache poisoning

a) has been used by governments to keeps citizens away from Web sites that supply politically or culturally inflammatory information

b) is a means of distributing always‑on broadband Internet access over the same infrastructure that offers cable television service.

c) which converts your computer’s signal into one that can travel over the CATV network.

d) the doorway that allows a computer to exchange data with other devices

e) a fixed Internet connection that uses a voiceband modem and telephone lines to transport data between your computer and your ISP.

DOCSIS

a) (Data Over Cable Service Interface Specification) is a data transport technology that includes security filters.

b) is a key component of Web page addresses and e‑mail addresses

c) computer that hosts this database is referred to

d) Every domain name corresponds to a unique IP address that has been entered into a huge database

e) s the rate of data downloaded to your computer. Many ISPs limit these speeds to make sure everyone gets an equal share of the bandwidth.

 

Domain name

a) is a key component of Web page addresses and e mail addresses

b) (Data Over Cable Service Interface Specification) is a data transport technology that includes security filters.

c) computer that hosts this database is referred to

d) Every domain name corresponds to a unique IP address that has been entered into a huge database

e) s the rate of data downloaded to your computer. Many ISPs limit these speeds to make sure everyone gets an equal share of the bandwidth.

 

Domain Name System

a) Every domain name corresponds to a unique IP address that has been entered into a huge database

b) (Data Over Cable Service Interface Specification) is a data transport technology that includes security filters.

c) is a key component of Web page addresses and e‑mail addresses

d) computer that hosts this database is referred to

e) s the rate of data downloaded to your computer. Many ISPs limit these speeds to make sure everyone gets an equal share of the bandwidth.

 

Downstream speed

a) is the rate of data downloaded to your computer. Many ISPs limit these speeds to make sure everyone gets an equal share of the bandwidth.

b) (Data Over Cable Service Interface Specification) is a data transport technology that includes security filters.

c) is a key component of Web page addresses and e‑mail addresses

d) computer that hosts this database is referred to

e) Every domain name corresponds to a unique IP address that has been entered into a huge database

 

DSL

a) (digital subscriber line) is a high speed, digital, always on, Internet access technology that runs over standard phone lines. It is one of the fastest Internet connections that’s affordable to individual consumers.

b) prevents voiceband signals from interfering with DSL signals.

c) is a device that connects a computer to a telephone line and converts computer data signals into signals compatible with DSL.

d) is software or hardware designed to filter out suspicious packets attempting to enter or leave a computer

e) links your computer to an ISP from a stationary point, such as a wall socket or roof‑mounted antenna.

 

DSL filter

a) prevents voiceband signals from interfering with DSL signals.

b) (digital subscriber line) is a high speed, digital, always on, Internet access technology that runs over standard phone lines. It is one of the fastest Internet connections that’s affordable to individual consumers.

c) is a device that connects a computer to a telephone line and converts computer data signals into signals compatible with DSL.

d) is software or hardware designed to filter out suspicious packets attempting to enter or leave a computer

e) links your computer to an ISP from a stationary point, such as a wall socket or roof‑mounted antenna.

 

DSL modem

a) is a device that connects a computer to a telephone line and converts computer data signals into signals compatible with DSL.

b) (digital subscriber line) is a high speed, digital, always on, Internet access technology that runs over standard phone lines. It is one of the fastest Internet connections that’s affordable to individual consumers.

c) prevents voiceband signals from interfering with DSL signals.

d) is software or hardware designed to filter out suspicious packets attempting to enter or leave a computer

e) links your computer to an ISP from a stationary point, such as a wall socket or roof mounted antenna.

 

Firewall

a) is software or hardware designed to filter out suspicious packets attempting to enter or leave a computer

b) (digital subscriber line) is a high speed, digital, always on, Internet access technology that runs over standard phone lines. It is one of the fastest Internet connections that’s affordable to individual consumers.

c) prevents voiceband signals from interfering with DSL signals.

d) is a device that connects a computer to a telephone line and converts computer data signals into signals compatible with DSL.

e) links your computer to an ISP from a stationary point, such as a wall socket or roof‑mounted antenna.

 

Fixed Internet access

a) links your computer to an ISP from a stationary point, such as a wall socket or roof mounted antenna.

b) (digital subscriber line) is a high speed, digital, always on, Internet access technology that runs over standard phone lines. It is one of the fastest Internet connections that’s affordable to individual consumers.

c) prevents voiceband signals from interfering with DSL signals.

d) is a device that connects a computer to a telephone line and converts computer data signals into signals compatible with DSL.

e) is software or hardware designed to filter out suspicious packets attempting to enter or leave a computer