Question
Please fill in the vocabulary words with the paragraph Word Bank applet backbone circuit switching DNS FTP HTML HTTP ICANN IP address OC line packet
Please fill in the vocabulary words with the paragraph
Word Bank
applet
backbone
circuit switching
DNS FTP
HTML
HTTP
ICANN
IP address
OC line
packet switching
PGP
point of presence
public-key encryption
SMTP
SSL
TCP/IP
Tier 2
XML
Instructions: Fill in the blanks using the words from the Word Bank above.
As a network administrator, Patricia knows that she can count on the organization (1) _____to ensure that she has an appropriate range of IP addresses for her worksite. Her high-speed connection to her companys ISP was vital to providing the connectivity her employees need to get their jobs done. Recently, the company moved up from a DSL connection to a(n) (2) ___ line because of the high volume of Internet traffic they were generating. Hopefully, Patricia thinks, the government will continue to fund projects to continue research to improve the Internet (3) ____, the main highway to the Internet, and other vital technologies.
But Patricia has indulged in enough daydreaming. It is time to ensure that the Internet connection to the bank of modems, or (4) ______provided by the ISP her company is using, is fully functional before the majority of the employees arrive for work. Because Patricias company sends a tremendous amount of e-mail, old-fashioned (5) ______technology would never have sufficed for sending messages. Fortunately, the Internet employs (6) ____ to enable messages to be sent over widely varying routes. Of course, she knows that the main suite of protocols that controls Internet data traffic is called (7) ____.
After ensuring that all is functional, Patricia begins to assist the Web development team with Web page creation. To provide robust interaction with company databases, (8) _____ is being used to code Web pages for the corporate Web site instead of (9) _____, which requires developers to use a standard set of tags. Unsure of her instructions, she e-mails the director of Web development for clarification, knowing that the (10) _____protocol will ensure that the e-mail is delivered to the director at the companys U.K. office. Requiring secure communications, she encrypts the e-mail using a(n) (11) _______ algorithm, knowing that the director can retrieve Patricias key from her personal Web site.
After reading the response to her e-mail, she quickly writes a Java (12) _____to produce an interactive form to collect customer information. Using the (13) ______protocol, Patricia posts her Web page to the corporate site. Of course, users will view the Web page using the (14) _____ protocol. And because the Web page contains potentially sensitive information, Patricia makes sure to use the (15) ____protocol to provide added security for the data.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started