Preview

Nt1310 Unit 7 Vocab Answers

Powerful Essays
Open Document
Open Document
4516 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 7 Vocab Answers
Networks and WWW VOCAB * upload - Used to send out data from a computer to another network. * download - Copies data from the main source to a nonessential source. * packets – Part of the message that is transmitted. * routers – A tool that helps to send forth information in networks. * host – A computer that is accessed by a person that is working at a lone location. * client – An application that works on a individual computer which then relies on another piece of equipment to perform operations. * nodes – A node refers to something like a computer or a printer or any sort of piece of equipment. * server network interface card (NIC) – A specific tool that is put into a computer so that you may gain access to a network. …show more content…
How can one "forge metadata" ? (BTB)
One can forge metadata by forging information.

9. What is steganography? How does it differ from cryptography? (BTB)
Steganography is task of hiding information by putting messages within one another. Whereas, cryptography is when you change information into an illegible layout. this format is called cipher text. http://www.webopedia.com/TERM/C/cipher_text.html 10. What happens to the data in deleted files (files you delete by clicking on the delete key)?(BTB)
You can restore deleted files by simply clicking on the recycling bin on your desktop. Once you open the recycling bin simply right click the document and choose restore to restore the file from being deleted.

11. Give a brief outline of the history of the Internet by listing the main developments and the dates of those developments.

Hey guys the timeline for the networks and www review guide has some dates which are unnecessary to memorize some dates which are important however are 1969- Birth of the internet via ARPANET ..... www was made in 1991 Switzerland by Tim Berners Lee who created the html.....Charles Babbage 1834 (“Father of Computing”) created the computer as we know it today :D

1962 -

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1210 Week 1 Lab 1

    • 107 Words
    • 1 Page

    The Physical storage location of the file changed. Once it was saved the Networking folder the data went from memory to the hard drive.…

    • 107 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    a group of personal computers or terminals located in the same general area and connected by a common cable so they can exchange information.…

    • 1464 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 1 Study Guide

    • 846 Words
    • 4 Pages

    22. What two components are created when you back up an XP system using the Automated System Recovery process?…

    • 846 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Computer network: A combination of many components that work together so that many different devices can communicate.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    His 145 Matrix

    • 740 Words
    • 3 Pages

    References: Howe, w. (2010). An anecdotal history of the people and communities that brought about the Internet and the Web . Creative Commons Attribution- Noncommercial-Share Alike 3.0 United States License. Based on a work at www.walthowe.com.. Retrieved from http://www.walthowe.com/navnet/history.html…

    • 740 Words
    • 3 Pages
    Good Essays
  • Best Essays

    References: The Internet Revolution history and significance . (n.d.). SICS. Retrieved February 20, 2012, from http://www.sics.se/~psm/ar97/…

    • 1565 Words
    • 7 Pages
    Best Essays
  • Good Essays

    Numerous applications run in a client/server environment, this means that client computers contact a server, generally a very powerful computer in terms of input/output, which provides services to the client computers. These services are programmers which provide data such as the time, files, a connection, etc. The services are used by programs client programs which run on client computers. This is why the term "client" is…

    • 496 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Before you actually retrieve your files, you have the possibility of previewing them, so that you can choose which ones you want back.…

    • 1078 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Computer Hacking

    • 6350 Words
    • 26 Pages

    Naughton, J. (2000) A Brief History of the Future: The Origins of the Internet, London:…

    • 6350 Words
    • 26 Pages
    Powerful Essays
  • Good Essays

    shared data centre. All you have to do is plug in and log on, making it cheaper and faster to get…

    • 332 Words
    • 2 Pages
    Good Essays
  • Better Essays

    · In a distributed system, to the user it appears to be a single computer system but in fact is made up from a number of different host computers, which are connected…

    • 1457 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Modern Steganography

    • 1774 Words
    • 8 Pages

    Steganography is the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret communication from a third party. Usually, a steganographic message will appear to be something else: a picture, an audio file, or some other message (the covertext). The advantage of steganography over cryptography alone is that steganographic message does not attract attention to communicating parties. An apparent encrypted message, no matter how unbreakable it is, can arouse suspicion and may in itself be incriminating. If suspicion is raised, then the goal of steganography is defeated. Since there is always a possibility that secret communication will be uncovered, steganography is often used together with cryptography. A steganographic message (the plaintext) is first encrypted by some modern encryption algorithms, and then a covertext is modified in some way to contain the encrypted message (the ciphertext), resulting in stegotext.…

    • 1774 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    While recovering images, you can preview and select the particular files that you want to get back. This saves your time as well as memory. You also get the comfort of pausing the recovery process at your convenience, and resuming it later from the same scan…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Nowadays, nobody is unfamiliar with the internet. Considering the past hundred years, many people believe has been the greatest invention. Some people feel strongly that it is necessary for their lives. However, it is important to look at both sides of the discussion.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Bwuazns

    • 2448 Words
    • 10 Pages

    - Machines, which are in the middle of microcomputers and mainframes in terms of cost and capability. These acts as “servers” w/c are connected to several workstations or terminals.…

    • 2448 Words
    • 10 Pages
    Powerful Essays