9. An FTP client can choose to download a file in different formats (binary/ASCII) and use the following commands for interacting with files:
o put—To copy a file to a remote site
o get—To retrieve a file from a remote site
o mput—To copy multiple files to a remote site
o mget—To retrieve multiple files from a remote site
10. Name resolution can translate names into addresses by using any of the following methods:
o HOSTS file—Resolves host names to IP addresses.
o LMHOSTS file—Resolves NetBIOS names to IP addresses on computers running Windows operating systems.
o DNS—The hierarchical system used on the Internet.
o WINS—The method associated with Windows NT. WINS uses a distributed database.
11. The configuration of TCP/IP can be automated through the use of DHCP (Dynamic Host Configuration Protocol) servers. Whereas static IP addresses must be manually assigned, DHCP servers can dynamically configure the assignment of client IP addresses.
12. MIME (Multipurpose Internet Mail Extensions) makes it possible to send non-ASCII files by email.
13. Cookies hold values about a user's preferences locally on the user's machine. Browsers can be configured to control the behavior of cookies. For example, cookies can be automatically accepted, or the user can be prompted before a cookie is sent from a server.
14. Application programming interfaces (APIs) serve as building blocks for creating software that interacts with the operating-system components.
15. CGI (Common Gateway Interface) is a common language used for creating server-based applications.
16. Java allows programs to be run in a Java Virtual Machine in almost any operating system.
17. XML (Extensible Markup Language) surpasses HTML (Hypertext Markup Language) in features and allows for multiple links from one hot spot.
18. Active Server Pages (ASP) allow processing to be done on the server or on the client. When processing is done on the server, the client sees only the result as pure HTML.
19. Open Database Connectivity (ODBC) allows Web servers to interact with SQL Server.
20. BinHex converts binary data into ASCII.
21. Use Shockwave to create interactive content. Because Flash uses vector-based imaging, it is ideal for creating smooth and spectacular effects.
22. GIF, JPEG, and PNG are image file formats used for Web graphics. JPEG is better suited for photographs, and GIF is better suited for simple graphics. PNG is a newer specification designed to replace GIF and avoid licensing problems.
23. GIF89, a newer GIF specification, adds support for transparency and animation.
24. The following are basic HTML tags and their functions
Opening
Tag Closing
Tag
Function
A tag common to all Web pages; used to enclose the Web page.
A tag common to all Web pages; used to enclose other tags, which will apply to the entire document.
A tag common to all Web pages; used to enclose the content of the Web page.
Allows comments to be inserted that will not be displayed by the browser.
Makes text bold.
Makes text italic.
Creates a form to solicit user input.
25. The following are the character entity codes for special characters.
Character Entity Name Entity Number
Less than (<) < <
Greater than (>) > >
Copyright (©) © ©
Registered
trademark (®) ® ®
27. The following are characteristics of the three primary classes of networks.
Class First
Octet Networks
Aailable Hosts
Available
A 1-26 126 116,777,214
B 128-191 16,384 65,534
C 192-223 2,097,152 254
28. Memorize the following default subnet masks:
o Class A—255.0.0.0
o Class B—255.255.0.0
o Class C—255.255.255.0
29. Subnetting divides the maximum number of hosts available in an IP address set into a number of subnetworks with a limited number of hosts for each. The following are examples for a Class C network:
o 255.255.255.192 provides 2 networks with 62 hosts each.
o 255.255.255.224 provides 6 networks with 30 hosts each.
o 255.255.255.240 provides 14 networks with 14 hosts each.
o 255.255.255.248 provides 30 networks with 6 hosts each.
o 255.255.255.252 provides 62 networks with 2 hosts each.
30. Class D networks are used for multicasting.
31. 127.0.0.1 is reserved for loopback.
32. Private IP addresses are used when you do not need your network to connect to the outside world.
33. SLIP is the oldest line protocol, offering no error correction or support for dynamic IP addressing. PPP replaces SLIP and allows for error correction, dynamic IP addressing, and the use of protocols other than TCP/IP.
34. Tunneling protocols include PPTP, L2F, L2TP, and IPsec. All are Layer 2 protocols, except IPsec, which is a Layer 3 protocol.
35. PPTP is newer than PPP and adds the ability to tunnel and create secure connections. One alternative to PPTP is L2F.
36. IP addresses on a host can be seen with the Ipconfig, Winipcfg, or Ifconfig utilities.
37. PING is the all-purpose connectivity diagnostic utility. It is surpassed in operation by TRACERT, which traces a packet over the various hops from a computer to a host.
38. Types of modems that can be used for connectivity include:
o Analog—The traditional modem used over the Public Switched Telephone Network (PSTN).
o Integrated Services Digital Network (ISDN)—Provides high-speed digital connectivity over a communications network optimized for data, voice, and video transmissions.
o Digital Subscriber Line (DSL)—Provides high-speed digital connectivity over upgraded telephone lines.
o Cable—Provides high-speed connection using the coaxial cable used for cable television.
39. ISDN is a digital system that provides for the simultaneous transfer of voice and data. Data speeds can reach up to 128Kbps.
40. The two main categories of DSL include ADSL and SDSL.
41. Networks can be connected via bridges, routers, brouters, or gateways.
42. Internet bandwidth technologies include T1 and its European equivalent, E1.
43. The top-level domains include:
o com—Commercial organizations
o edu—Educational organizations
o gov—Government institutions
o mil—Military groups
o net—Internet infrastructure organizations
o org—Non-profit organizations and those not covered above
No comments:
Post a Comment