Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please fill in the vocabulary words with the paragraph Word Bank applet backbone circuit switching DNS FTP HTML HTTP ICANN IP address OC line packet

Please fill in the vocabulary words with the paragraph

Word Bank

applet

backbone

circuit switching

DNS FTP

HTML

HTTP

ICANN

IP address

OC line

packet switching

PGP

point of presence

public-key encryption

SMTP

SSL

TCP/IP

Tier 2

XML

Instructions: Fill in the blanks using the words from the Word Bank above.

As a network administrator, Patricia knows that she can count on the organization (1) _____to ensure that she has an appropriate range of IP addresses for her worksite. Her high-speed connection to her companys ISP was vital to providing the connectivity her employees need to get their jobs done. Recently, the company moved up from a DSL connection to a(n) (2) ___ line because of the high volume of Internet traffic they were generating. Hopefully, Patricia thinks, the government will continue to fund projects to continue research to improve the Internet (3) ____, the main highway to the Internet, and other vital technologies.

But Patricia has indulged in enough daydreaming. It is time to ensure that the Internet connection to the bank of modems, or (4) ______provided by the ISP her company is using, is fully functional before the majority of the employees arrive for work. Because Patricias company sends a tremendous amount of e-mail, old-fashioned (5) ______technology would never have sufficed for sending messages. Fortunately, the Internet employs (6) ____ to enable messages to be sent over widely varying routes. Of course, she knows that the main suite of protocols that controls Internet data traffic is called (7) ____.

After ensuring that all is functional, Patricia begins to assist the Web development team with Web page creation. To provide robust interaction with company databases, (8) _____ is being used to code Web pages for the corporate Web site instead of (9) _____, which requires developers to use a standard set of tags. Unsure of her instructions, she e-mails the director of Web development for clarification, knowing that the (10) _____protocol will ensure that the e-mail is delivered to the director at the companys U.K. office. Requiring secure communications, she encrypts the e-mail using a(n) (11) _______ algorithm, knowing that the director can retrieve Patricias key from her personal Web site.

After reading the response to her e-mail, she quickly writes a Java (12) _____to produce an interactive form to collect customer information. Using the (13) ______protocol, Patricia posts her Web page to the corporate site. Of course, users will view the Web page using the (14) _____ protocol. And because the Web page contains potentially sensitive information, Patricia makes sure to use the (15) ____protocol to provide added security for the data.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Refactoring Databases Evolutionary Database Design

Authors: Scott Ambler, Pramod Sadalage

1st Edition

0321774515, 978-0321774514

More Books

Students also viewed these Databases questions

Question

1.The difference between climate and weather?

Answered: 1 week ago

Question

1. What is Fog ?

Answered: 1 week ago

Question

How water vapour forms ?

Answered: 1 week ago

Question

What is Entrepreneur?

Answered: 1 week ago

Question

Which period is known as the chalolithic age ?

Answered: 1 week ago

Question

What is digital literacy? Why is it necessary?

Answered: 1 week ago