Vocab
Internet Protocols
Web Infrastructure
Cloud & Security
Internet Technology
100

Storing, accessing and processing data using remote servers over a network rather than a local server or computer.

What is cloud computing?

100

This protocol is what email servers use for sending remote mail and places information about the origin of an email in a header.

What is SMTP?

100

This system provides a mapping from domain names to IP addresses, functioning like an "internet phonebook."

What is DNS?

100

When using e-commerce services, this security factor is most important to consider to protect payment details.

What are secure transactions?

100

Tim Berners-Lee's employers at CERN made the World Wide Web's underlying code publicly available so that it would have this benefit.

What is increased adoption and use by many individuals, institutions, and companies?

200

The process of moving information (or packets) over a network via a device called a router.

What is routing?

200

This is assigned to every device connected to the Internet, allowing other devices to send information to it.

What is an IP address?

200

This approach to computing allows individual computers to form a network across geographic areas with a common goal, where each processor uses its own private memory.

What is distributed computing?

200

This is a benefit of cloud computing where multiple users can work on the same document simultaneously.

What is collaborative interaction with shared data?

200

When a user browses a website, files are broken into these smaller units and reassembled upon receipt.

What are packets?

300

The protocol by which data is sent form one computer to another on the Internet.

What is Internet protocol?

300

This newer standard allows for many more possible addresses than its predecessor, which is vital for the future of the internet.

What is IPv6?

300

This type of attack floods a target (usually a web server) with incoming traffic from many different sources, making it difficult to block.

What is a DDoS attack?

300

When encrypting messages with asymmetric key encryption, using someone's public key means only this person can read the message.

What is the intended recipient (or the person with the corresponding private key)?

300

Unlike search engines, these collaborative platforms help consolidate and organize information into an online reference.

What are Wikis?

400

A unique numeric identification for each device that is connected to a computer network and uses Internet Protocol.

What is an IP address?

400

This model describes how requests are sent to servers by clients for information on the internet, with data broken into packets for transmission.

What is the client-server model?

400

These standardized rules or "protocols" must be followed by all traffic on a network, allowing devices from different manufacturers to communicate directly.

What are standard protocols?

400

The internet is built around the notion of free and open access to information with no blocking, no throttling or paid prioritization.

What is net neutrality?

400

This process describes how subdomains are specified by additional alphanumeric characters to the left of the domain, separated with a dot.

What is domain hierarchy or subdomain structure?

M
e
n
u