Term
The individual serial bits of data are converted into 8-bit parallel data that the PC can understand through the _____ chip. |
|
Definition
|
|
Term
A modem does what is called _____ communication: It transmits data as a series of ones and zeros. |
|
Definition
|
|
Term
_____ has the port number 443. |
|
Definition
|
|
Term
To keep everything running smoothly the Interneet is broken down into groups called _____. |
|
Definition
|
|
Term
_____ has the port number of 25. |
|
Definition
|
|
Term
FTP, using ports 20 and 21, is a great way to _____ files between systems. |
|
Definition
|
|
Term
POP has the port number _____. |
|
Definition
|
|
Term
Remote _____ enables you to give anyone control of your desktop. |
|
Definition
|
|
Term
This process of sending telephone transmissions across fully digital lines end-to-end is called _____ service. |
|
Definition
|
|
Term
A _____ is software that enables multiple connections to the internet to go though one protected PC. |
|
Definition
|
|
Term
Every Tier 1 and Tier 2 provider leases connections to the Internet to companies called _____. |
|
Definition
|
|
Term
Phone lines have a speed based on a unit called a _____ which is one cycle per second. |
|
Definition
|
|
Term
_____ is a streaming protocol developed espeically for dial-up Internet access. |
|
Definition
|
|
Term
Telnet is a _____ emulation program for TCP/IP networks that enable you to connect to a server or fancy router and run commands on that machine as if you were sitting in front of it. |
|
Definition
|
|
Term
_____ uses port 22, and the entire connection is encryped, preventing any eavesdroppers from reading your data. |
|
Definition
|
|
Term
The SMTP server handles your _____ e-mail. |
|
Definition
|
|
Term
The most famous service is the _____, the service that provides the structure for the World Wide Web, the graphical face of the Internet. |
|
Definition
|
|
Term
Standards have been created that use encrypted tunnels between a computer to create a private network through the Internet, resulting in what is called a _____. |
|
Definition
|
|
Term
_____ providers own smaller, regional networks and must pay the Tier 1 providers. |
|
Definition
|
|
Term
_____ has the port number 20 and 21. |
|
Definition
|
|
Term
_____ connections to ISPs use a standard telephone line but special equipment on each end to create always on Internet connections at fast speeds. |
|
Definition
|
|
Term
_____ has the port number 23 |
|
Definition
|
|
Term
_____ provide Web sites that you access by using the HTTP protocol on port 80. |
|
Definition
|
|
Term
The main tier, called _____, consists of nine companies called Tier 1 providers. |
|
Definition
|
|
Term
HTTP has the port number _____. |
|
Definition
|
|
Term
Backbone _____ connect to more than on other backobone router, creating a big, interwoven framework for communication. |
|
Definition
|
|
Term
_____ enable computers to talk to each other via standard commercial telephone lines by converting analog signals to digital signals, and vice versa. |
|
Definition
|
|
Term
You can use _____ to make calls over your computer network. |
|
Definition
|
|
Term
Flow Control, also known as _____, is the process by which two serial devices verify a conversation. |
|
Definition
|
|
Term
_____ provides control over a remote server with the fully graphical interface. |
|
Definition
|
|
Term
_____ providers are even more regional and connect to Tier 2 providers. |
|
Definition
|
|
Term
_____ enables one system to share its Internet connection with other system on the network, providing an easy method for multiple systems to use one Internet connection. |
|
Definition
|
|
Term
The _____ or IMAP server is the computer that handles incoming (to you) email. |
|
Definition
|
|
Term
_____ uses port number 143. |
|
Definition
|
|
Term
Central switches connect to each other through highpcapacity _____. |
|
Definition
|
|
Term
A _____ uses only one physical line, but each B channel sends 64 K, doubling the throughput total to 128 K. |
|
Definition
|
|