No student devices needed. Know more
20 questions
What is Faster than Electricity?
Ethernet cable
Radio Waves
Wi-Fi
Light
Choose valid ip addresses
d938:2da7:b596:6d34:3970:6789:c941:2340
258.151.50.253
119.67.44.86
94.49.190.138
d938:2da7:b596:6d3:3970:6789
BANDWITH is - ...
minimum transmission capacity of a device
maximum rate capacity of a device
minimum rate capacity of a device
maximum transmission capacity of a device
a secret password for unlocking a message
caeser cipher
key
decryption
encryption
If Internet connection speed is 64 Kbps (kilobits per second).
How many bits per second could that transfer?
640 bits per second
64,000 bits per second
640,000 bits per second
6,400 bits per second
Uses radio signal to send bits from one place to another
Ethernet Cable
Wireless
Fiber Optic
Arpanet
Choose security protocols
DNS
SSL
IPV4
TLS
IPv6
Bandwidth is measured by ...
megabyte rate
byte rate
bit rate
gygabyte rate
How many paths are there from the router in Utah to the router in UCLA?
4
3
2
1
Latency is measured in ...
miliseconds
seconds
megabytes per second
bits per second
IPv4 provides more than ... unique addresses
4 billion
400 billion
4 million
4000 billion
Scrambling or changing a message to hide it
cracking
caeser cypher
decryption
encryption
... associates names like www.example.com with the corresponding addresses.
IPv4
DNS
IPv6
Internet system
One of the earliest encryption techniques is ...
Decryption
Encryption
Caesar Cipher
Cracking
LAN is ...
logically area network
local available network
local area network
logical another network
Time it takes for a bit to travel fro one place to another is called ...
Copper cable
Bandwidth
Bit rate
Latency
How many bits per address uses IPv6 protocol ?
512 bits
256 bits
64 bits
128 bits
... gives us humans an easy way to identify where we want to go on the Internet.
DNS
IPS
IPv4
IPv6
How many paths are there from the computer in BBN to the computer in UCSB?
4
3
2
1
different keys for encrypting and decrypting
caeser cipher
symmetric encryption
asymmetric encryption
symmetric decryption
Explore all questions with a free account