–
0 of 3 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 3 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0) 0 Essay(s) Pending (Possible Point(s): 0)
Match the statements
Use the words in the table below to fill-in-the-gaps in the text. Each word may only be used once.
A protocol is an agreed set of Fill in the blank 1 of 16 about how to do something. Â A network protocol is an agreed way of how to Fill in the blank 2 of 16 over a network. Â A good communications protocol should include:
There are a number of different protocols that are commonly used to communicate over a network. Â One of them is the TCP/IP protocol. Â The TCP part prepares messages for transmission and reassembles any received messages. Â It does this by:
The IP part of the protocol is responsible for providing the Fill in the blank 8 of 16 address and the source address to each packet. Â It accepts data packets that have the correct address and ignore those which do not.
Another protocol is HTTP.  This is the protocol that is used on the World Wide Web / Internet.  It allows a Fill in the blank 9 of 16 to request individual files from a web server.  Once they are received they are rendered into a web page.  You might sometimes see web pages with HTTPS in their address.  The ‘s’ means that it is a Fill in the blank 10 of 16 web page.  On pages using this protocol, data is encrypted prior to being sent out of the browser to ensure that only the authorised site can read the data.
FTP is a protocol which is used to transfer (upload and download) files between a client and server on a computer network.
There are a number of protocols which are related to emails. Â Fill in the blank 11 of 16 allows emails to be download and/or deleted from a mail server and viewed offline by an email client. Â However, POP does have a number of disadvantages:
IMAP is similar in many ways to POP but it:
Fill in the blank 13 of 16 protocols are responsible for sending and receiving data along a network cable. The Ethernet protocol specifies:
When thinking about protocols we often use something called ‘the Fill in the blank 14 of 16 layer model’  This is a concept, not something which actually exists.  It has been developed to help people understand how the different network protocols interact with one another.  There are four layers in the model, the Fill in the blank 15 of 16 layer, the transport layer, the internet layer and the network access layer.  A protocol in a specific layer can only communicate with other protocols in the layers directly Fill in the blank 16 of 16 to it.  Some of the reasons that we use the four layer model are:
Instructions
Below are a number of statements. Decide whether each is true and tick the box
Username or Email Address
Password
Remember Me
Username
Email
Registration confirmation will be emailed to you.