Shared Flashcard Set

Details

Internet Technology
n/A
25
Internet/New Media
Undergraduate 4
04/10/2012

Additional Internet/New Media Flashcards

 


 

Cards

Term

What communications protocol is used by streaming video files? 

Definition
User Datagram Protocol (UDP)
Term

Per class discussion, data transmission delivery over the Internet may best be described as____ 

Definition
best effort delivery
Term

In a public key technology system, Susan responds to John's message. If Susan signs the messae with John's public key, John may decrypt the message from Susan with....... 

Definition
John's private key
Term

What communication protocol is used by Instant Messaging (IM)? 

Definition
TCP
Term

How do you subscribe to a mailing list? 

Definition
Send a 'subscribe' email to the appropriate organization
Term

Which of the following is true regarding identifying color in web pages? 

 

Definition
You can identify the color by its hexadecimal number value and You can identify the color by entering the name of the color
Term

This term refers to protection from unauthorized modification

Definition
 (Integrity)
Term

This Internet Protocol address type assigns a new IP address each time you connect. 

Definition
(Dynamic Protocol Address)
Term

According to class discussion, this element of security addresses the information secrecy or privacy

Definition
 (Confidentiality)
Term

Authentication requires ...

Definition
Verifying the identity of a communicating party and May be implemented through biometrics
Term

What tags are required to make a link from one page to another are: 

Definition
<A> </A>
Term

This term refers to 'proof of participation' 

Definition
(Non-repudiation)
Term

This type of malicious logic that has the ability to propage itself

Definition
 (Worm)
Term

In a public key technology system, John wants to send send a message to Susan. If John signs his message with his public key, who may decrypt this message? 

Definition
None of the above. Neither Only Susan or Everyone that has access to John’s public key.
Term

In a public key technology system, John wants to send a message to Susan. John signs his message with his private key. Susan may decrypt this message from John with _______ 

Definition
John's public key
Term

What communications protocol is used by Real Player? 

Definition
UDP
Term

Which of the following is NOT true regarding cookie files?


Definition

Setting cookies is NOT optional; it is required by the browser. However, using the cookie file, a web server may keep track of the web pages you visit and Cookies are stored on your disk; not the server.

 

Term

Where is a bookmark (or a 'favorite' if you are using an Internet Explorer browser) information recorded? 

Definition
In a file on the hard drive on the user's computer
Term

An individual may minimize spam by............ 

Definition

Use a client-based spam blocker, Request to remove your name off mailing lists, and Edit headers from information you post in public forums 

 

Term

A 'cookie' is a ________ file.

Definition
 .txt
Term

Which of the following is true regarding Digital Certificates

Definition
 (The U.S. standard format for digital certificates is X.509)
Term

This is a piece of html code that is placed on a web page or in an email mesage that gathers information about the user 

Definition
(Web bug)
Term

This is a type of malicious logic that embeds itself into another program. It requires a host to survive. 

Definition
(Virus)
Term

If a browser fetches a page that contains three images, the browser will pass ___ separate request(s) to the server. 

Definition
Four
Supporting users have an ad free experience!