Soru
4. __ standard specifies that computers and devices on the network share or pass a special signal. [a]TCP/IP [b]Token Ring [c]Ethernet [d]RFID 5. It can be a software program or a hardware device that filters all data packets coming through th internet, a network, etc it is known as the __ [a]Antivirus(b]Firewall [c]Cookies [d]Malware 6. The term "TCP/P"stands for __ [a]Transmission Contribution protocol internet protocol [b] Transmission Control Protocol/ int protocol [c] Transaction Control protocol internet protocol [d] Transmission Control Protocol/ protocol 7. This type of authentication reads a unique personal characteristic to identify the user. [a]password [b] PIN [c] biometrics [d] PUK 8. __ compares data with a set of rules or values to determine if the data meets criteria
Çözüm
4.1163 Voting
Okan
Uzman · 3 yıl öğretmeniUzman doğrulaması
Cevap
4. The correct answer is [b] Token Ring. Token Ring is a network protocol that specifies that computers and devices on the network share or pass a special signal called a token. This token is used to control access to the network and prevent collisions.<br /><br />5. The correct answer is [b] Firewall. A firewall is a software program or a hardware device that filters all data packets coming through the internet, a network, etc. It acts as a barrier between a trusted network and an untrusted network, and it can be used to block unauthorized access, prevent certain types of traffic, and protect against malicious attacks.<br /><br />6. The correct answer is [b] Transmission Control Protocol/Internet Protocol. TCP/IP stands for Transmission Control Protocol/Internet Protocol. It is a suite of communication protocols used to interconnect network devices on the internet. TCP provides reliable, end-to-end data transport, while IP provides routing and addressing for data packets.<br /><br />7. The correct answer is [c] biometrics. Biometric authentication is a type of authentication that reads a unique personal characteristic, such as a fingerprint, face, or voice, to identify the user. This method is considered more secure than traditional methods, such as passwords or PINs, because it is difficult for others to replicate or steal a person's unique biometric characteristics.<br /><br />8. The correct answer is [a] password. Passwords are used to compare data with a set of rules or values to determine if the data meets the criteria. When a user enters a password, it is compared with the stored password for the account. If the passwords match, the user is granted access to the account. Passwords are commonly used as a form of authentication to protect sensitive information and prevent unauthorized access.
Derecelendirmek için tıklayın: