The Internet

Learning Steps

LAP CC-6

Instructions: Checkout the Computer Concepts textbook and CD. Check off each step as you complete it.

_____ 1.Read:Chapter Six, The Internet, beginning on page 300.

_____ 2.Do:Quick Checks at the end of each section. Check your

answers with the proof book at the back of the room.

_____ 3.Do:Interactive Summary. Check your

answers with the proof book at the back of the room.

_____ 4.Turn In:LAP to be graded.

_____ 5.GoTo:CH Web, Business Office Technology, and click on tab

that says test. Take test.

_____ 6.Continue:To next LAP.



INTERACTIVE SUMMARY

Chapter 6

SECTION A:

a)The Internet infrastructure is based on high-capacity communication links referred to as the Internet 1.______tied together at network 2.______points where data can cross over form one NSP’s equipment to another’s.

b)An Internet 3.______provider offers Internet access to individuals, businesses, and smaller ISPs.

c)The Internet uses several communications protocols, including 4.______, which breaks a message or file into packets, and 5.______, which is responsible for addressing packets.

d)Every device on the Internet has an IP address. 204.127.128.1 is a(n) 6.______-bit IPv4 address.

e)7.______IP addresses are permanently assigned to computers, whereas 8.______IP addresses are temporarily assigned by a DHCP server.

f)Most high-speed Internet connections use 9.______technology, and even dynamic IP addresses might seem permanent because they don’t change unless you turn off your modem or your ISP has an outage.

g)A(n) 10.______name server converts numeric IP addresses into familiar names, such as Travelocity.com

h)The speed of an Internet connection measured by utilities such as Ping and Traceroute refers to 11.______, the elapsed time for data to make a round trip from point A to point B.

i)The speed advertised by Internet service providers is a measure of the amount of data that travels between two points in a given amount of time. Many Internet connections are 12.______, meaning the downstream speed is different than the upstream speed.

SECTION B:

a)A(n) 1.______connection is a fixed Internet connection that uses a(n) 2.______modem and telephone lines to transport data between your computer and your ISP.

b)Most modems use a standard called V.90 to provide a theoretical maximum speed of 3.______Kbps.

c)4.______is a high-speed, digital, always –on Internet access technology that runs over standard phone lines.

d)5.______Internet Service is a means of distributing always-on broadband Internet access over the same infrastructure that offers cable television service.

e)Satellite Internet service is a means of distributing always-on, high-speed asymmetric Internet access by broadcasting signals to and from a personal a satellite 6.______.

f)Fixed wireless Internet technologies are 7.______area network standards, in contrast to technologies such as Wi-Fi, which are local area network standards.

g)One of the most well-know wireless wide area network standards is 8.______, and Ethernet-compatible network standard designated as IEEE 802.16.

SECTION C:

a)1.______Internet access can be defined as the ability to easily move your Internet service from one location to another.

b)2.______Internet access offers a continuous Internet connection as you are walking or riding in a bus, car, train, or plane.

c)Wi-Fi is an example of portable Internet access technology that allows public access to the Internet within the network’s area of coverage called a Wi-Fi 3.______.

d)Portable WiMAX and portable satellite offer additional Internet access options in the portable category. Cellular phone service providers offer two ways to access the Internet. 4.______is a communications protocol that provides limited access to e-mail and Internet information from handheld devices with small screens and cell phone keypads.

e)Mobile 5.______services using 3G and 4G technologies offer faster access using conventional browsers and e-mail clients.

SECTION D:

a)1.______computing is the idea that consumers use their computers or handheld devices to access applications, storage, and other computing resources supplied by Internet-based servers, rather than from their local devices.

b)Network-based one-on-one messaging is usually referred to as 2.______messaging and group communications are referred to as 3.______

c)Most messaging is based on a client/server model that uses a server to handle communication packets between the participants. Voice over Internet 4.______is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system.

d)In contrast to synchronous communications technologies, such as IM and VoIP 5.______communications technologies, such as blogs, do not require participants to be online at the same time

e)6.______is sometimes referred to as microblogging because messages are limited to 140 characters or less.

f)A grid computing system is a network of computers harnessed together to perform processing tasks. One of the most famous examples of a grid system is the SETI@ home project, but grid technology has also been used to crack codes, analyze earthquake data, and crunch numbers for medical research.

g) File Transfer 7.______provides a way to transfer files from one computer to another over any TCP/IP network, such as a LAN or the Internet.

h)The purpose of FTP is to make it easy to upload and download computer files without having to deal directly with the 8.______system or file management system of a remote computer.

i)9.______file sharing uses protocols that allow users to obtain files from other users located anywhere on the Internet.

j)10.______is an example of file sharing technology that links clients in a “swarm” of distributing files.

SECTION E:

a)In the context of computers a(n) 1.______is any access to data or programs by hackers, criminals, or other unauthorized persons. As the result of an intrusion, data can be stolen or altered, system configurations can be changed to allow even intrusions, and software can be surreptitiously installed and operated under the remote control of a hacker.

b)One of the most common ways of gaining unauthorized access to a network-based computer is by looking for open 2.______.

c)A port 3.______is the use of automated software to locate computers that have open ports and are vulnerable to unauthorized access. One of the easiest steps to enhance your computer’s security is to turn it off when you aren’t using it.

d)You should also keep your computer up to date with the latest operating system security 4.______and service packs.

e)You can also install 5.______software designed to filter out suspicious packets attempting to enter or leave a computer.

f)One of the most effective steps you can take to secure your computer from intrusions is to set up a (n) 6.______, which assigns private OP addresses to the computers it controls.

g)The process a router uses to keep track of packets and their corresponding private or public IP addresses is called 7.______address translation.

h)Corporations try to limit intrusions by setting up virtual 8.______networks that offer encrypted connections for access to a remote server.