1 | 9 | 10 | 12 | 15 | 17 | ||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4/11 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
7 | 16 | ||||||||||||||||||||||||
8/13 | |||||||||||||||||||||||||
1. A widely accepted and recognized specification or protocol used for uniformity and compatibility.
2. A process in which two devices establish communication by exchanging predetermined signals or messages.
3. A protocol used for retrieving email from a server.
4. The most recent version of the Internet Protocol, designed to replace IPv4, using a 128-bit address scheme.
5. A protocol used for the secure transmission of data over the internet, often used for online transactions and other sensitive information.
6. A protocol used for the transmission of data over the internet, often used to retrieve web pages and other resources.
7. Cryptographic protocols designed to provide secure communication over a computer network.
8. A protocol used for accessing email stored on a server.
9. A network protocol used for reliable communication between devices.
10. A protocol used for synchronizing the time between devices on a network.
11. A protocol used for secure communication over the internet, often used for virtual private networks (VPNs).
12. A protocol used for automatically assigning IP addresses to devices on a network.
13. A version of the Internet Protocol that uses a 32-bit address scheme for identifying devices on a network.
14. A protocol used for translating domain names into IP addresses on the internet.
15. A protocol used for secure remote access to a device over the internet.
16. A protocol used for sending and receiving email over the internet.
17. A set of rules that govern the exchange of data between devices in a network.