Créer jeu
Jouer Relier
1. Network used for
2. Network types by geographical area
3. Examples of ISP
4. types of broadband
5. IP address consist of………
6. Example of web browsers
7. Protect yourself against cyber attack
8. about (HTTP )
9. Resource name in URL contain of parts:
10. A Gray hat hackers
11. Adware———

MAN

Use strong passwords.

Do not open email attachments from unknown senders.

Are a bit of a cross between black and white

set four groups of numbers

illegally break into systems

HyperText Transfer Protocol

Domain name

WAN

DSL

Fiber optic

Displays as pop-up box

Each group separated by dot .

sometimes annoying

most current browsers no longer require you to enter the http:// protocol

protocol is what the web is based on.

Facilitate communication via email, video conferencing, instant messaging, etc.

Update your software and operating system.

Make information easier to access

Firefox

Each group range should be 0-255

Use anti-virus software.

file sharing

It’s considered a legitimate

STC

Cable

Safari

Top Level Domain

Mobily

Google chrome

Avoid using unsecure WiFi networks in public places.

Satellite

is software that displays sponsored advertisements in a section of your browser window

allows files to be transferred from a web server—a computer that hosts the website you’re requesting

Zain

Sub Domain

LAN

Microsoft Edge

To flaunt their expertise

share a hardware device & sofrware