1 | 12 | ||||||||||||||||||||||||
17 | |||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | 14 | ||||||||||||||||||||||||
4 | 16 | ||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
18 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
13 | 9 | ||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
1. A unique value used to identify the packet, primarily for reassembly purposes.
2. A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service.
3. A feature that enables multiple users to participate in a single chat conversation within an instant messaging client.
4. A type of malicious software that can replicate itself and spread to other computers.
5. A type of HTTP cookie that is stored on the user's computer for a longer period of time and remains even after closing the web browser.
6. The actual data being transported by a packet, excluding header and trailer information.
7. Software designed to detect and remove malicious software, such as viruses, from computer systems.
8. An indicator that shows the availability or current status of a user in an instant messaging client.
9. Indicates the entire packet size, including both header and data, in bytes.
10. A software application or service that allows users to access, manage, and store data in a cloud storage system.
11. A type of network topology in which all the nodes are connected to a single cable called a bus.
12. An organization or company that manages the reservation and registration of domain names for individuals or businesses.
13. Software application used to access and view information on the World Wide Web.
14. The percentage of data packets that are lost or discarded during transmission on a network.
15. The process of combining and applying multiple CSS stylesheets and inline styles, resolving conflicts and producing the final style for an element.
16. A data structure in a networking device that maps MAC addresses to physical ports.
17. The capability to share files, such as documents, images, or videos, through an instant messaging client.
18. A social engineering tactic where attackers pretend to be someone else to deceive individuals and gain access to confidential information.