This is responsible for converting URLs to IP addresses.
What is the Domain Name System (DNS)?
These languages are used for accessing data stored in databases
What are database query languages?
In this type of encryption, letters of the alphabet are shifted by a set number.
What is a Caesar Cipher?
This problem with IPv4 will be solved by IPv6
There are not enough IP addresses for all the devices that will be connected to the Internet
A set of instructions, often used to tell computers how to do a certain task
What is an algorithm?
This is the first thing that happens when a new device is connected to the Internet.
What is 'It is assigned an IP address'?
This term describes data about data
What is metadata?
The process by which a message is scrambled using a key
What is Encryption?
This process reduces the number of bits it takes to store a file while preserving all aspects of the file
What is lossless compression?
In the following code segment, this value is stored in b.
a ← 1 b ← a a ← 2
What is 1?
This characteristic of the Internet allows it to continue to function despite router and connection failures.
What is fault-tolerant?
Machine-readable information is all in this format
What is binary?
You should do this to make it harder for hackers to crack your encryption
What is increase the number of bits in your encryption key?
This protocol for sending information checks for errors and makes sure that all packets are sent
What is the Transmission Control Protocol (TCP)?
This process begins with taking the biggest problem and breaking it down into smaller problems that are easier to solve
What is top down design?
An attempt to deny users access to a Web site's resources by flooding the website with requests from multiple systems.
What is a Distributed Denial of Service (DDoS) attack?
The ability of computers to learn and adapt information and draw inferences by themselves as large amounts of data is processed?
What is Machine Learning?
This problem with symmetric encryption makes it hard to use
What is 'people have to meet up ahead of time to exchange a private key'?
The s in https stands for
What is secure?
The following expression evaluates to:
(9 ≠ 13 AND 12 < 4) OR 15 < 9
What is False?
These allow different devices from different manufacturers to all communicate with each other over the Internet
What are protocols?
This term refers to throwing out data that is not usable because it is not in a good format
What is data sanitization?
Public key encryption is an example of what type of encryption?
What is asymmetric encryption?
In this type of attack, someone spams a web server repeatedly until it crashes, causing it to spit out valuable information as it crashes.
What is a Distributed Denial of Service (DDoS) attack?
This initial value of number would cause the loop to be skipped
REPEAT UNTIL(number MOD 2 = 0) { number ← number - 1 }
What is any even number