COMPUTER FUNDAMENTALS

INTRODUCTION TO COMPUTERS

COMPUTER NETWORKS AND THE INTERNET

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following would pose the greatest threat to a user’s personal privacy if it were to be leaked to the public?
A
The IP address of the user’s computer
B
The user’s browser cookies
C
The user’s email address
D
The user’s public key used for encryption
Explanation: 

Detailed explanation-1: -Which of the following best describes whether these two computers can communicate with each other across the Internet? The computers can communicate directly because Internet communication uses standard protocols that are used by all computers on the Internet.

Detailed explanation-2: -Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet? The ability to provide data transmission even when some connections have failed. The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works.

There is 1 question to complete.