0% found this document useful (0 votes)
50 views8 pages

Module 5 Test

Uploaded by

lau 1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
50 views8 pages

Module 5 Test

Uploaded by

lau 1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 8
Aueapersonal / Mis cusos / 2022-C-1-1339-2849.ING-110 J MODULES Faces of The Internet /- Module § test Comenzade el Tuesday, 12 de April de 2022, 15:19 Estado. finolzado Finallzado en Tuesday, 12 de Api de 2022, 1522 Tiempo 3 minutos 5 segundos cempleade Puntes 900/11 00, Califieactén 4.09 de 500 (82%) THEME (1) Choose the comrect answers, nino wiaonemnatmerea atmnintHSber IRN 64832 MT 2609 ws gama ‘The language used for data transfer on the internets called Selecione uns a. HTTP b. Teepe ADSL La respuesta correcta es: TCP/IP regan 2. Which device is used to connect a compute tothe telephone network? Selecione uns 3. modem: b, USS connector hub recta es modem anita wiasiuoansopremvammeta ieonntHGber SMH GM 3600 gama 3. Ifyou want to connect mutiple computers tothe internet without using cables, you need a Selecione uns 1. wired router b. modem tees router ¥ Ls respuesta corrects es: witless router regan 4. Which technology lets you have real-time conversations online, by typing messages? Selecione uns 2. vor b, Telnet Instant Messaging v ovecta es: Instant Messaging nino wiaonemnatmerea atmnintHSber IRN 64832 MT 2609 2 regan 5. What ia collection of web pages called? Selecione uns a. the ntemet b. a website homepage La respuesta correcta es: 3 website 6-This technique encodes data So that unauthorized users can't ead the information, —_ Selecione uns 3. decryption b. encryption firewall recta es: encryption nino wiaonemnatmerea atmnintHSber IRN 64832 MT 2609 us segamaT 7-The fraudulent attempt to steal passwords and personal data, usualy via emal is known as. Selecione uns phishing ¥ bs piracy spoofing a respuesta correcta es phishing ‘THEME @) Complete the sentences with Words from the box. [search for / online / upload /- mobile nino wiaonemnatmerea atmnintHSber IRN 64832 MT 2609 ss 1. commercial ‘online '¥ sevies function lke 1°Ss bur also provide ther own unique content La eospuesta correcta es online regina 2. Wireless technologies ae enabling the nest major wave the mobile Y incemet. La respuesta correcta es: motile anita wiasiuoansopremvammeta ieonntHGber SMH GM 3600 regana 10 3. Howde search for ‘information on the Web? La cespuesta corrects es: seateh for pega tT 4. You can upload 2X photos to Flickr va email, La respuesta correcta es: unload nian wiauiueasopremvasmera ieonne HOUSE MR 161552 0M 3600 = Modules Practice nian wiauiueasopremvasmera ieonne HOUSE MR 161552 0M 3600 Module 6»

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy