Web Weavers
Address Unknown
Speed Demons
The Gatekeepers
Other
100

This term describes the internet's structure, where no single entity has central control.

Double Jeopardy: Why is the internet designed this way?

Fully Distributed Network

100

This unique number identifies a device on a network, much like a mailing address

IP Address

Double Jeopardy: What does IP stand for?

100

This term refers to the volume of data that can be sent over a medium at a given time, measured in megabits per second (MB/s).

Bandwidth

100

This type of computer stores data that can be accessed by clients over the internet.

A Server

100

Secure websites use this encrypted protocol instead of HTTP.

HTTPS

200

This term refers to a set of rules that define how data is transmitted across networks.

Protocols

200

What is the current widely used version of IP addresses contains and how many bits long is it?

IPv4, 32 Bits

Double Jeopardy: This next-generation IP addressing system will replace IPv4 and features 128-bit addresses.

Triple Jeopardy: What is the largest possible IP address in decimal form?

200

This term describes the time it takes for a single bit of data to travel from one device to another and back.

Ping

200

These devices act as traffic managers, directing packets along the best route.

Routers

200

Cookies store information about your browsing habits. Where are cookies saved?

Locally, on your device

300

These physical cables, often made of glass or plastic, form the backbone of the internet for long-range data transmission.

Fiber Optic Cables

300

This system translates human-friendly website names into IP addresses.

DNS (Domain Name System)

Double Jeopardy: Explain the 4 steps of how DNS is used to connect to a website.

Triple Jeopardy: Explain why we use the DNS system instead of just IP addresses.

300

These three methods are used to transmit bits over a network: electricity, light, and which third method. Give an example.

Radio Waves - 4G/5G/WiFi

300

This protocol ensures reliable transmission of packets and resends missing ones.

Double Jeopardy: Explain how this protocol works.

TCP (Transmission Control Protocol)

300

This type of cookie tracks users across different websites and is often used for targeted advertising.

Third-Party Cookie

400

Data travels over the internet in small chunks, which are later reassembled at their destination. What are these chunks called?

Packets

400

Give an 3 examples of a Top-Level Domain (TLD).

Double Jeopardy: What is a sponsored TLD and give one example.

.org, .com, .edu, .net, etc

400

This term refers to the specific location of a file or directory on a web server, often appearing after a domain name in a URL.

Path

Double Jeopardy: Given the following information, describe where the file is located.

downloads/images/dog_photos/polly.jpg

400

This term describes the process of a client asking for data and server sending back the requested data over the internet.

Request-Response Cycle

400

Who are considered the "founders of the internet"?

Vint Cerf and Bob Khan

500

What are the benefits and downsides of using copper cables to connect a network?

Pro: Cheap

Cons: Signal loss over long distances

500

A DNS attack that tricks users into visiting fraudulent websites by altering DNS records is called this.

DNS Spoofing

500

How do internet routers determine where to send packets?

They use the IP address and calculate the "cheapest route possible".

Double Jeopardy: Describe the 3 factors discussed in class for determining the cheapest route possible.

500

Describe what packets are and how they are used to transmit data over the internet.

Small chunks of data that travel independently across networks and are reassembled at their destination to form complete files.

500

Different protocols were created for different purposes. Name a protocol for each of the following purposes:

Reliability: ______

Security: ______

Hardware: ______

Reliability: TCP, IP

Security: HTTPS, TLS, SSL

Hardware: USB, HDMI

M
e
n
u