Search Header Logo
Internet Addressing

Internet Addressing

Assessment

Presentation

Computers

11th Grade

Practice Problem

Medium

Created by

Sherry Smith

Used 4+ times

FREE Resource

15 Slides • 7 Questions

1

Multiple Choice

According to the Internet Protocol (IP), what information is contained in a packet?

1

The entirety of the data being transmitted

2

A small chunk of the data being transmitted

3

The entirety of the data being transmitted, as well as control information for routing the data

4

A small chunk of the data being transmitted, as well as control information for routing the data

2

Internet Addressing

3

Open Ended

How do you know where to send an email or a letter (not that any of you send letters)?

4

Protocols

·In order to send information from one computer to another, each computer must use the same protocols.

·Protocols are the official rules and sets of procedures that computers follow to make sure that other computers know how to read and transmit the data being sent.

·The protocols used in the Internet are open, which allows users to easily connect additional computing devices to the Internet.

5

·Some common Internet protocols include:

oTCP/IP (Transmission Control Protocol/Internet Protocol): These are the main building blocks of the internet; they help computers find each other and make sure data gets delivered correctly.

oHTTP (Hypertext Transfer Protocol): This is the protocol for your web pages; it's how your computer asks a web server to send a webpage so you can see it in your browser.

oSMTP (Simple Mail Transfer Protocol): This is the protocol for sending emails; when you hit "send" on your email, SMTP makes sure it gets to the right email server.

6

Multiple Choice

Which protocol helps computers find each other and make sure data gets delivered correctly?

1

TCP/IP

2

HTTP

3

SMTP

7

IP Addresses

·An IP Address is a unique number is given to EVERY device when it connects to the Internet

·An IP address is usually expressed in human-readable form as a series of four numbers, each within the range of 0 through 255, separated by periods (e.g., 123.45.67.89)

·The lowest possible numerical value for any address would be 0.0.0.0 and the highest possible value would be 255.255.255.255.

·These 32 bits of total information can be used to identify each device on a network.

·This method of naming is called IPv4 and those 32 bits generate 4 billion IP address.

8

media

While this seems like a lot, that number is still finite and the available number of addresses has almost run out.

This prompted the creation of IPv6, which uses 128 bits to generate 340 undecillion (1 followed by 36 zeros) IP addresses.

9

Multiple Choice

Which of the following is not a valid IPv4 address?

1

1.234.56.78

2

12.34.56.78

3

1.2.3.4

4

123.45.6.789

10

DNS
DNS stands for "Domain Name System" but you can think of it as the internet's phonebook.

How does it work?

·Let's say you want to visit a website, like "www.example.com."

·When you type that into your web browser and hit Enter, your computer doesn't immediately know where to find "example.com."

·It asks a special computer called a DNS server for help.

·The DNS server's job is to know the IP address associated with "www.example.com."

11

Multiple Choice

Which of the following best describes the primary function of the Domain Name System (DNS) in internet communication?

1

DNS encrypts internet traffic to protect user data.

2

DNS assigns unique IP addresses to domain names.

3

DNS routes data packets between different networks.

4

DNS distributes web content to internet browsers.

12

HTTP

·a set of rules that computers use to communicate with each other on the web. It's the protocol that makes the World Wide Web work.

13

HTML

·HTML (Hypertext Markup Language) is the language of webpages.

·When you visit a website, your browser gets an HTML file from the web server.

·HTML tells the browser how to display the web page, like where to put text, images, and links.



The Internet is completely open, all connections are shared, and all information sent over the Internet is sent in plain text. This makes it possible for hackers to snoop on any personal information you could be sending.

14

How do you know a website is secure?

·Secure Sockets Layer and Transport Layer Security (SSL/TLS) is a layer of security wrapped around your communications.

·These protocols are active when you see the little lock symbol in front of your URL, next to your HTTPS (Hypertext Transfer Protocol Secure) which ensures your HTTP requests are secure and protected.

·When a website asks your browser to engage in a secure connection it first provides a digital certificate, which is like an official ID card proving that it’s the website it claims to be.

·These digital certificates are published by certificate authorities (CA), which are trusted entities that verify the identities of websites and issue certificates for them.

15

·Computer cookies are tiny pieces of information that websites store on your computer when you visit them. Think of them as small notes that websites leave on your device to remember certain things.

·Cookies have a bad reputation, but they can actually contribute to making the most positive user-experience possible.

·Cookies are sent from a server of a website you visit, to your computer to be saved for later, and can pass data back to places.

Cookies

media

16

The Pros of Cookies

​Remembering you

​Personalization

​Shopping carts

​Cookies can help websites remember you and your preferences. For example, when you log into a website, a cookie can remember that you're already logged in, so you don't have to do it every time you visit.

​Cookies can make your online experience better by showing you content that's relevant to your interests. For instance, if you visit a shopping website and look at shoes, cookies might remember this and show you shoe-related ads or recommendations.

​When you add items to an online shopping cart, cookies can keep track of what's in there, even if you leave the website and come back later.

17

The Cons of Cookies

​Privacy Concerns

​Security Risks

​Storage Space

​Some people worry that cookies can invade their privacy. Since cookies track your online activities, they can be used to build a profile of your interests and behavior. This data can be shared with advertisers, which can sometimes feel intrusive.

​While most cookies are harmless, some can be used for malicious purposes, like stealing your login information. It's essential to be cautious about the websites you trust and the cookies you accept.

​Over time, cookies can accumulate and take up storage space on your device, although they're usually very small and don't cause significant storage issues.

18

Multiple Choice

What is the primary disadvantages of using cookies in a web browser for user interactions and website functionality?

1

They take up storage space on your computer

2

privacy concerns and potential tracking

3

limited website functionality

4

increased security threat from malware

19

The World Wide Web is a system of linked pages, programs, and files.

It's a way of saying that something is part of the internet.

WWW

media

20

URLs

A URL (uniform resource locator) is the web address.

It's how you find and access things on the internet, like web pages, documents, images, and videos

The following are the main parts to a URL:

  • Protocol: This tells your web browser how to access the resource.

  • Domain: This is the main address of the website or resource you want to access.

  • Path: more specific directions to find a particular page or resource on the website.

21

media

22

Multiple Choice

What is the relationship between the World Wide Web (WWW) and a Uniform Resource Locator (URL)?

1

WWW and a URL are synonymous and can be used interchangeably.

2

WWW is a type of URL used exclusively for educational websites.

3

A URL is a software program, while the WWW refers to the hardware infrastructure of the internet.

4

A URL is a specific website, while the WWW is a system of linked pages, programs, and files.

According to the Internet Protocol (IP), what information is contained in a packet?

1

The entirety of the data being transmitted

2

A small chunk of the data being transmitted

3

The entirety of the data being transmitted, as well as control information for routing the data

4

A small chunk of the data being transmitted, as well as control information for routing the data

Show answer

Auto Play

Slide 1 / 22

MULTIPLE CHOICE