Information Technology
_____________ is a type of wireless transmission that operates at the frequencies of the speed of light.
_________ layer of OSI takes care of the actual transfer of data between two computers on the same network.
What is the name for cables that utilize light, rather than voltage, to transmit data?
__________ is basically a journal that is available on the web.
__________ refers to a set of rules that defines an exact format for communication between systems.
_____________ is an algorithm for encryption developed by Ron Rivest, Adi Shamir and Len Adleman.
The '.au' extension in the domain name specifies geographical venue of
__________ is an internet service that allows the user to browse internet resources using lists and menus.
___________ is a message sent by a webserver to be stored in user's computer.
'America Online' is an example of _____________ software.
Internet Explorer, Mozilla Firefox, Safari, Opera and Netscape are examples of
___________ is a secured E-mail protocol, which is file based and developed by the Phil Zimmermann.
________ is the protocol that provides store-and-forward service for textual e-mail messages.
__________ is the suite of protocols that defines the internet.
____________ is a device that passes a connection from a client on one side of the firewall to a server on the other side.
Which of the following categories of e-commerce is a business model in which consumers offer products to companies and companies pay them?
________ is a cell relay network protocol, which encodes data traffic into fixed-size cells instead of variable sized packets.
Assuming someone else's identity, whether it is a login ID, an IP address, a server, or an e-commerce mechant, is referred to as
_________ is a standard that defines the format of textual messages exchanged on the internet.
_________ is offering its digital signature technology for authenticating users as a component separate from encryption.
Which of the following electronic payment methods contains a computer chip for processing information?
__________ is a protocol which provides mapping between host names and network addresses.
__________ is a software agent that acts on behalf of a user.
_________ is a protocol used mainly by the U.S government and government agencies to provide security for e-mail.
MPEG refers to __________