Deck 6: Data Communication and the Cloud

Full screen (f)
exit full mode
Question
A computer network between Seattle and Philadelphia is made possible through a LAN.
Use Space or
up arrow
down arrow
to flip the card.
Question
An intranet is a private internet that is used exclusively within an organization.
Question
Wired LAN connections use the IEEE 802.3 protocol, while wireless LAN connections use the IEEE 802.11 protocol.
Question
UTP cable contains sets of wires that are twisted together to improve signal quality.
Question
Wired LAN connections use a protocol standard called Ethernet to communicate.
Question
With a WAN, an organization is allowed to place communications lines wherever it wants, because all lines reside on its premises.
Question
An internet is a network of networks that connects LANs, WANs, and other internets.
Question
The abbreviations k, M, and G have the same meaning for computer memory as they have for communication speeds.
Question
When you connect to the Internet, you are actually connecting to an ISP.
Question
As DSL signals interfere with telephone signals, DSL data transmission and telephone conversations cannot occur simultaneously.
Question
Bluetooth is a wireless protocol designed for transmitting data over long distances.
Question
The World Wide Web sponsors committees that create and publish protocols and other standards.
Question
A university would use a WAN to connect its campuses in two cities.
Question
An ISP provides the customer with a legitimate Internet address.
Question
A switch is a special-purpose computer that receives and transmits wired traffic on a LAN.
Question
NICs which support 10/100/1000 Ethernet allow for transmission at a rate of 10, 100, or 1,000 Mbps.
Question
A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly.
Question
An NIC is a device that connects a computer's or printer's circuitry to network wires.
Question
Communication speeds are expressed in bytes, whereas memory sizes are expressed in bits.
Question
For two devices to communicate, they must use the same protocol.
Question
To ensure security, VPN client software decrypts the original message so that its contents are protected from snooping.
Question
Cable modems modulate in such a way that their signals interfere with TV signals.
Question
ICANN controls the assignment of all IP addresses, both public and private.
Question
A URL usually consists of a protocol followed by a domain name or public IP address.
Question
A domain name is a worldwide-unique name that is affiliated with a public IP address.
Question
FTP is the protocol used between browsers and Web servers.
Question
TCP provides internet routing and IP provides reliable internet transport.
Question
In three-tier architecture, the user tier consists of computers that run Web servers and process application programs.
Question
The owner of a domain name is capable of changing the affiliated IP addresses at its discretion.
Question
Broadband lines typically have transmission speeds less than 56 Kbps.
Question
Unlike HTTP, FTP does not have a secure version.
Question
Web servers run on a server-tier computer and manage HTTP traffic by sending and receiving Web pages to and from clients.
Question
TCP/IP Protocol architecture is a scheme of four protocol types arranged in layers.
Question
If you had a private IP address for your computer, every time you moved it, the Internet would have to update its addressing mechanisms to route traffic to your new location.
Question
SMTP is the protocol used between browsers and Web servers.
Question
The primary protocol of the Internet is called IP.
Question
HTTPS is the secure version of HTTP.
Question
HTML is the most common language for defining the structure and layout of Web pages.
Question
A packet is a piece of a message that is handled by programs that implement IP.
Question
DSL modems use their own protocols for data transmission.
Question
Teleaction increases the value of robotics.
Question
One of the advantages of cloud-based hosting is the in-depth visibility of security and disaster preparedness.
Question
Teleaction reduces the need for local support staff.
Question
An organization that provides software as a service provides only operating systems and application programs.
Question
For a printer or laptop to connect to a wireless LAN, it must have a ________.

A)hyperlink
B)UTP cable
C)WNIC
D)DSL
Question
Which of the following is the distinguishing feature of a LAN as compared to a WAN?

A)single location
B)number of users
C)bandwidth
D)hardware requirements
Question
Most LAN connections are made using ________.

A)Sc/TP cable
B)UTP cable
C)STP cable
D)F/TP cable
Question
A ________ is a set of rules that programs on two communicating devices follow.

A)codec
B)URL
C)packet
D)protocol
Question
Computers that reside in different geographic locations are connected using a(n)________.

A)WAN
B)LAN
C)URL
D)IP address
Question
The term "cloud" is used to refer to the elastic leasing of pooled computer resources over the Internet.
Question
The most basic cloud offering is platform as a service (PaaS), which is the cloud hosting of a bare server computer or disk drive.
Question
Which of the following is the device that connects a computer's or printer's circuitry to network wires?

A)port
B)switch
C)router
D)NIC
Question
A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN.

A)codec
B)modem
C)switch
D)port
Question
Amazon EC2 and Amazon S3 are both examples of platform as a service.
Question
To enable the seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.

A)layered protocol
B)virtual private network
C)three-tier system
D)remote access system
Question
Web pages include hyperlinks, which are pointers to other Web pages.
Question
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

A)database
B)application
C)network
D)server
Question
Salesforce.com is an example of a cloud vendor who provides software as a service.
Question
A private internet that is used exclusively within an organization is called a(n)________.

A)Ethernet
B)intranet
C)cloud
D)server
Question
Remote access systems save time and travel expense and make the skills and abilities of an expert available in places where he or she is not physically located.
Question
________ modems modulate in such a way that they do not interfere with TV signals, even though they use the same lines.

A)DSL
B)Dial-up
C)Cable
D)ADSL
Question
Which of the following statements is true about the IEEE 802.11 protocol?

A)It is also known as Ethernet.
B)It is used for wired LAN connections.
C)It cannot be processed by access points.
D)It allows speeds of up to 600 Mbps.
Question
Which of the following statements is true about IEEE 802.3?

A)It is the protocol for wireless LAN connections.
B)It is the protocol for Bluetooth.
C)It is the protocol for wired LAN connections.
D)It is the universal standard protocol for WNICs.
Question
The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.

A)FTP
B)VOIP
C)ICANN
D)TCP/IP
Question
Which of the following is a component of a LAN device that processes wireless traffic and communicates with the wired switch?

A)access point
B)packet
C)server
D)router
Question
Which of the following TCP/IP application-layer protocols is used for email transmission?

A)FTP
B)HTTPS
C)SMTP
D)IP
Question
A(n)________ is a piece of a message that is handled by programs that implement IP.

A)email
B)packet
C)tag
D)attribute
Question
The primary protocol of the Internet layer of the TCP/IP protocol architecture is called ________.

A)IP
B)SMTP
C)HTTP
D)TCP
Question
Which of the following protocols guarantees secure data transmission?

A)HTTP
B)FTP
C)HTTPS
D)SMTP
Question
Communications speeds are expressed in ________.

A)bits
B)bytes
C)hertz
D)packets
Question
The IEEE 802.3 protocol standard is also known as ________.

A)Bluetooth
B)Ethernet
C)Intranet
D)Internet
Question
Which of the following protocols is concerned with the application layer of TCP/IP Protocol architecture?

A)HTTP
B)IEEE 802.3
C)IEEE 802.11
D)IP
Question
Which of the following is true of DSL modems?

A)DSL modem signals do not interfere with telephone signals.
B)DSL modems use the same protocols as cable modems for data transmission.
C)DSL modem signals replace phone signals and are sent to the ISP.
D)DSL data transmission and telephone conversations cannot occur simultaneously.
Question
Which of the following is a function of an ISP?

A)It transmits data over short distances, replacing cables.
B)It serves as a gateway to the Internet.
C)It describes how messages must be processed for wired transmission.
D)It connects computers within a LAN.
Question
Which of the following transmission lines is used for Local Area Networks?

A)DSL Telephone
B)Cable TV Lines
C)UTP
D)Wireless connection
Question
________ is a wireless protocol designed for transmitting data over short distances, replacing cables.

A)IPv6
B)PaaS
C)Bluetooth
D)Silverlight
Question
________ typically have transmission speeds less than 56 Kbps.

A)Narrowband lines
B)Digital subscriber lines
C)Cable modems
D)WAN wireless connections
Question
The top layer of TCP/IP Protocol architecture is related to ________.

A)internets
B)transport
C)applications
D)data links
Question
Which of the following is true about cable modems?

A)They provide high-speed data transmission using telephone cables.
B)They offer consistent performance, irrespective of the number of users sending and receiving data.
C)They rely on high-capacity optical fiber cables and use their own protocols for data transmission.
D)They provide faster download speeds than DSL modems.
Question
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and to maintain Web sites?

A)FTP
B)IP
C)HTTPS
D)HTTP
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/130
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Data Communication and the Cloud
1
A computer network between Seattle and Philadelphia is made possible through a LAN.
False
2
An intranet is a private internet that is used exclusively within an organization.
True
3
Wired LAN connections use the IEEE 802.3 protocol, while wireless LAN connections use the IEEE 802.11 protocol.
True
4
UTP cable contains sets of wires that are twisted together to improve signal quality.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
5
Wired LAN connections use a protocol standard called Ethernet to communicate.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
6
With a WAN, an organization is allowed to place communications lines wherever it wants, because all lines reside on its premises.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
7
An internet is a network of networks that connects LANs, WANs, and other internets.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
8
The abbreviations k, M, and G have the same meaning for computer memory as they have for communication speeds.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
9
When you connect to the Internet, you are actually connecting to an ISP.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
10
As DSL signals interfere with telephone signals, DSL data transmission and telephone conversations cannot occur simultaneously.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
11
Bluetooth is a wireless protocol designed for transmitting data over long distances.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
12
The World Wide Web sponsors committees that create and publish protocols and other standards.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
13
A university would use a WAN to connect its campuses in two cities.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
14
An ISP provides the customer with a legitimate Internet address.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
15
A switch is a special-purpose computer that receives and transmits wired traffic on a LAN.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
16
NICs which support 10/100/1000 Ethernet allow for transmission at a rate of 10, 100, or 1,000 Mbps.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
17
A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
18
An NIC is a device that connects a computer's or printer's circuitry to network wires.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
19
Communication speeds are expressed in bytes, whereas memory sizes are expressed in bits.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
20
For two devices to communicate, they must use the same protocol.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
21
To ensure security, VPN client software decrypts the original message so that its contents are protected from snooping.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
22
Cable modems modulate in such a way that their signals interfere with TV signals.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
23
ICANN controls the assignment of all IP addresses, both public and private.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
24
A URL usually consists of a protocol followed by a domain name or public IP address.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
25
A domain name is a worldwide-unique name that is affiliated with a public IP address.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
26
FTP is the protocol used between browsers and Web servers.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
27
TCP provides internet routing and IP provides reliable internet transport.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
28
In three-tier architecture, the user tier consists of computers that run Web servers and process application programs.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
29
The owner of a domain name is capable of changing the affiliated IP addresses at its discretion.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
30
Broadband lines typically have transmission speeds less than 56 Kbps.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
31
Unlike HTTP, FTP does not have a secure version.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
32
Web servers run on a server-tier computer and manage HTTP traffic by sending and receiving Web pages to and from clients.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
33
TCP/IP Protocol architecture is a scheme of four protocol types arranged in layers.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
34
If you had a private IP address for your computer, every time you moved it, the Internet would have to update its addressing mechanisms to route traffic to your new location.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
35
SMTP is the protocol used between browsers and Web servers.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
36
The primary protocol of the Internet is called IP.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
37
HTTPS is the secure version of HTTP.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
38
HTML is the most common language for defining the structure and layout of Web pages.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
39
A packet is a piece of a message that is handled by programs that implement IP.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
40
DSL modems use their own protocols for data transmission.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
41
Teleaction increases the value of robotics.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
42
One of the advantages of cloud-based hosting is the in-depth visibility of security and disaster preparedness.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
43
Teleaction reduces the need for local support staff.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
44
An organization that provides software as a service provides only operating systems and application programs.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
45
For a printer or laptop to connect to a wireless LAN, it must have a ________.

A)hyperlink
B)UTP cable
C)WNIC
D)DSL
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following is the distinguishing feature of a LAN as compared to a WAN?

A)single location
B)number of users
C)bandwidth
D)hardware requirements
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
47
Most LAN connections are made using ________.

A)Sc/TP cable
B)UTP cable
C)STP cable
D)F/TP cable
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
48
A ________ is a set of rules that programs on two communicating devices follow.

A)codec
B)URL
C)packet
D)protocol
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
49
Computers that reside in different geographic locations are connected using a(n)________.

A)WAN
B)LAN
C)URL
D)IP address
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
50
The term "cloud" is used to refer to the elastic leasing of pooled computer resources over the Internet.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
51
The most basic cloud offering is platform as a service (PaaS), which is the cloud hosting of a bare server computer or disk drive.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following is the device that connects a computer's or printer's circuitry to network wires?

A)port
B)switch
C)router
D)NIC
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
53
A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN.

A)codec
B)modem
C)switch
D)port
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
54
Amazon EC2 and Amazon S3 are both examples of platform as a service.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
55
To enable the seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.

A)layered protocol
B)virtual private network
C)three-tier system
D)remote access system
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
56
Web pages include hyperlinks, which are pointers to other Web pages.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
57
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

A)database
B)application
C)network
D)server
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
58
Salesforce.com is an example of a cloud vendor who provides software as a service.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
59
A private internet that is used exclusively within an organization is called a(n)________.

A)Ethernet
B)intranet
C)cloud
D)server
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
60
Remote access systems save time and travel expense and make the skills and abilities of an expert available in places where he or she is not physically located.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
61
________ modems modulate in such a way that they do not interfere with TV signals, even though they use the same lines.

A)DSL
B)Dial-up
C)Cable
D)ADSL
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following statements is true about the IEEE 802.11 protocol?

A)It is also known as Ethernet.
B)It is used for wired LAN connections.
C)It cannot be processed by access points.
D)It allows speeds of up to 600 Mbps.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following statements is true about IEEE 802.3?

A)It is the protocol for wireless LAN connections.
B)It is the protocol for Bluetooth.
C)It is the protocol for wired LAN connections.
D)It is the universal standard protocol for WNICs.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
64
The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.

A)FTP
B)VOIP
C)ICANN
D)TCP/IP
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following is a component of a LAN device that processes wireless traffic and communicates with the wired switch?

A)access point
B)packet
C)server
D)router
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following TCP/IP application-layer protocols is used for email transmission?

A)FTP
B)HTTPS
C)SMTP
D)IP
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
67
A(n)________ is a piece of a message that is handled by programs that implement IP.

A)email
B)packet
C)tag
D)attribute
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
68
The primary protocol of the Internet layer of the TCP/IP protocol architecture is called ________.

A)IP
B)SMTP
C)HTTP
D)TCP
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following protocols guarantees secure data transmission?

A)HTTP
B)FTP
C)HTTPS
D)SMTP
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
70
Communications speeds are expressed in ________.

A)bits
B)bytes
C)hertz
D)packets
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
71
The IEEE 802.3 protocol standard is also known as ________.

A)Bluetooth
B)Ethernet
C)Intranet
D)Internet
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following protocols is concerned with the application layer of TCP/IP Protocol architecture?

A)HTTP
B)IEEE 802.3
C)IEEE 802.11
D)IP
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following is true of DSL modems?

A)DSL modem signals do not interfere with telephone signals.
B)DSL modems use the same protocols as cable modems for data transmission.
C)DSL modem signals replace phone signals and are sent to the ISP.
D)DSL data transmission and telephone conversations cannot occur simultaneously.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following is a function of an ISP?

A)It transmits data over short distances, replacing cables.
B)It serves as a gateway to the Internet.
C)It describes how messages must be processed for wired transmission.
D)It connects computers within a LAN.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following transmission lines is used for Local Area Networks?

A)DSL Telephone
B)Cable TV Lines
C)UTP
D)Wireless connection
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
76
________ is a wireless protocol designed for transmitting data over short distances, replacing cables.

A)IPv6
B)PaaS
C)Bluetooth
D)Silverlight
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
77
________ typically have transmission speeds less than 56 Kbps.

A)Narrowband lines
B)Digital subscriber lines
C)Cable modems
D)WAN wireless connections
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
78
The top layer of TCP/IP Protocol architecture is related to ________.

A)internets
B)transport
C)applications
D)data links
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
79
Which of the following is true about cable modems?

A)They provide high-speed data transmission using telephone cables.
B)They offer consistent performance, irrespective of the number of users sending and receiving data.
C)They rely on high-capacity optical fiber cables and use their own protocols for data transmission.
D)They provide faster download speeds than DSL modems.
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and to maintain Web sites?

A)FTP
B)IP
C)HTTPS
D)HTTP
Unlock Deck
Unlock for access to all 130 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 130 flashcards in this deck.