Professional Documents
Culture Documents
AS Chapter 2 Comunication
AS Chapter 2 Comunication
AS Chapter 2 Comunication
(Chapter 2)
Public & Private Networks:
The networks can be categorized as public or private.
Private Networks:
Private networks are owned by a single company or organization (they are often LANs or
intranets with restricted user access, for example, passwords and user ids are required to join the
network); the companies are responsible for the purchase of their own equipment and software,
maintenance of the network and the hiring and training of staff.
Public Networks:
LANs are usually contained within one building, or within a small geographical area. A typical
LAN consists of a number of computers and devices (such as printers) connected to hubs or
switches.
1
Today, a typical LAN is characterized by the following:
WANs:
Wide area networks (WANs) are used when computers or networks are situated a long distance
from each other (for example, they may be in different cities or on different continents). If a
number of LANs are joined together using a router or modem, they can form a WAN.
Example:
The network of automated teller machines (ATMs) used by banks is one of the most common
examples of the use of a WAN.
Because of the long distances between devices, WANs usually make use of a public
communications network (such as telephone lines or satellites), but they can use dedicated or
leased communication lines which can be less expensive and more secure (less risk of hacking).
1) a ‘job’ could be run on a remote computer that had the required application software.
2) a data archive that was stored on a remote computer could be accessed.
3) a message could be transmitted electronically to a user on a remote computer.
MANs:
In recent years, another type of network – a metropolitan area network (MAN) – has emerged.
MANs are larger than LANs as they can connect together many small computer networks (e.g.
LANs) housed in different buildings within a city (for example, a university campus). MANs are
restricted in their size geographically to, for example, a single city.
2
PANs:
It is an interconnection of personal technology devices to communicate over a short distance,
which is less than 33 feet or 10 meters or within the range of an individual person, typically using
some form of wireless technologies. (In other words, a home system).
WLANs:
Wireless LANs (WLANs) are similar to LANs but there are no wires or cables. In other words,
they provide wireless network communications over fairly short distances (up to 100 meters)
using radio or infrared signals instead of using cables.
WAPs:
Devices, known as wireless access points (WAPs), are connected into the wired network at
fixed locations. Because of the limited range, most commercial LANs (such as those on a college
campus or at an airport) need several WAPs to permit uninterrupted wireless communications.
WAPs Technologies:
The WAPs use either spread spectrum technology (which is a wideband radio frequency with a
range from a few meters to 100 meters) or infrared (which has a very short range of about 1 to 2
meters and is easily blocked, and therefore has limited use.
3
Client-server and peer-to-peer networking models
Client-server Model
Benefits:
1) The client-server model uses separate dedicated servers and specific client workstations;
client computers will be connected to the server computer(s).
2) Users are able to access most of the files, which are stored on dedicated servers.
3) The server dictates which users are able to access which files.
4) The client-server model allows the installation of software onto a client’s computer.
5) The model uses central security databases which control access to the shared resources.
(Note: passwords and user IDs are required to log into the network.)
6) Client-server networks can be as large as you want them to be and they are much easier to
scale up than peer-to-peer networks.
7) This model offers the most stable system, for example, if someone deletes a shared
resource from the server, the nightly back-up would restore the deleted resource.
8) Client-server networks can become bottlenecked if there are several client requests at the
same time.
1) Central storage and management of data files, thus enabling other network users to access
files.
2) Allowing users to share information without the need for offline devices (such as a memory
stick).
3) Allowing any computer to be configured as the host machine and act as the file server.
Benefits:
1) The provision of services to all other network users; the services available are listed on a
nominated ‘look up’ computer – when a node requests a service, the ‘look up’ computer is
contacted to find out which of the other network nodes can provide the required service.
2) other users on the network to simply access data from another node
3) Communication with other peers connected to the network
4
4) Peers to be both suppliers and consumers (unlike the client-server model where consumers and
resources are kept entirely separate from each other)
5) Peers to participate as equals on the network (again this is different to the client-server model
where a webserver and client have different responsibilities).
Drawbacks:
Thick Clients:
5
Thin client software Thick client software
Relies on a good, stable and fast network More tolerant of a slow network
connection for it to work. connection.
Pros Cons
Clients have more control (they Data integrity issues, since many clients
can store their own programs access the same data which can lead to
and data/files). inconsistencies.
Pros Cons
All devices are linked to a server Despite cheaper hardware, the start-up
(data updates and new software costs are generally higher than for thick
installation done centrally) clients.
6
Network Topologies:
1) Bus Networks
2) Star Networks
3) Mesh Networks
4) Hybrid Networks.
Bus Networks:
A bus network topology uses a single central cable to which all computers and devices are
connected.
Note:
Terminators are needed at each end to prevent signal reflection (bounce). Bus networks are
typically peer-to-peer.
Benefits:
Drawbacks:
Suitability:
These are most suitable for situations with a small number of devices with light traffic occurring.
For example, a small company or an office environment.
7
Star Networks:
A star network topology uses a central hub/switch and each computer/device is connected to
the hub/switch. Data going from host to host is directed through the central hub/switch. Each
computer/device has its own dedicated connection to the central node.
Note:
Benefits:
Drawbacks:
Suitability:
Star networks are useful for evolving networks where devices are frequently added or removed.
They are well suited to applications where there is heavy data traffic.
8
Mesh Networks:
There are two types of Mesh Network Topologies:
1) Routing
2) Flooding
Routing
Routing works by giving the nodes routing logic (in other words, they act like a router) so that data
is directed to its destination by the shortest route and can be re-routed if one of the nodes in the
route has failed.
Flooding
Flooding simply sends the data via all the nodes and uses no routing logic, which can lead to
unnecessary loading on the network.
Note:
Benefits:
Drawbacks:
9
Suitability:
Hybrid Network:
A hybrid network is a mixture of two or more different topologies (bus and star, bus and mesh).
The main advantages and disadvantages depend on which types of network are used
to make up the hybrid network.
Additional disadvantage:
Additional advantages:
Public cloud
A storage environment where the customer/client and cloud storage provider are
different companies.
Private cloud
Hybrid cloud
A combination of private and public clouds. Some data resides in the private
cloud and less sensitive/fewer commercial data can be accessed from a public cloud storage
provider.
10
Pros of using cloud storage Cons of using cloud storage
Customer/client files stored on the cloud can If the customer/client has a slow or
be accessed at any time from any device unstable internet connection, they would
anywhere in the world provided internet have problems accessing or downloading
access is available their data/files
No need for a customer/client to carry an Costs can be high if large storage capacity
external storage device with them, or use the is required
same computer to store and retrieve Expensive to pay for high
information download/upload data transfer limits with
Provides the user with remote back-up of data the customer/client internet service
to aid data loss and disaster recovery provider (ISP)
Recovers data if a customer/client has a hard Potential failure of the cloud storage
disk or back-up device failure company is possible – this poses a risk of
Offers almost unlimited storage capacity loss of all back-up data
Bluetooth sends and receives radio waves in a band of 79 different frequencies (known as
channels). These are all centered on a 2.45 GHz frequency. Devices using Bluetooth automatically
detect and connect to each other, but they do not interfere with other devices since each
communicating pair uses a different channel.
When a device wants to communicate, it picks one of the 79 channels at random. If the
channel is already being used, it randomly picks another channel. This is known as spread
spectrum frequency hopping.
To further minimize the risks of interference with other devices, the communication pairs
constantly change the frequencies they are using.
Uses:
1) Transferring data between two or more devices which are less than 30 meters apart.
2) The speed of data transmission is not critical.
3) Using low bandwidth applications (for example, sending music files from a mobile phone to
a headset).
11
WIFI:
Wi-Fi also uses spread spectrum technology. However, WIFI is best suited to operating full-scale
networks, since it offers much faster data transfer rates, better range and better security than
Bluetooth.
Bandwidth: Bandwidth specifically refers to the capacity at which a network can transmit data.
Penetration: Penetration depth is one term that describes the decay of electromagnetic waves
inside of a material.
12
Wired:
There are three main types of cable used in wired network.
1) Twisted Pair Cables
2) Coaxial Cable
3) Fiber Optic
Twisted pair cables are the most common cable type used in LANs.
Uses electricity pulses to transfer data.
Drawbacks:
Benefits:
Types:
There are two types of twisted pair cable: unshielded and shielded.
2) Coaxial Cable:
Coaxial cables are the most commonly used cables in MANs and by cable television companies.
Uses electricity pulses to transfer data.
Drawbacks:
Benefits:
Fiber optic cables are most commonly used to send data over long distances.
Fiber optics use light pulses to transmit data.
Drawbacks:
13
Benefits:
Single-mode uses a single mode light source and has a smaller central core, which results in less
light reflection along the cable. This allows the data to travel faster and further, making them a
good choice for CATV and telecommunications.
Multi-mode allows for a multi-mode light source; the construction causes higher light reflections
in the core, so they work best over shorter distances (in a LAN, for example).
1) Hub
2) Switch
3) Repeater
4) Bridge
5) Router
6) Gateway
7) Modems
1) Hub:
Hubs are hardware devices that can have a number of devices or computers connected to them.
They are often used to connect a number of devices to form a local area network (LAN), for
example a star network. A hub’s main task is to take any data packet (a group of data being
transmitted) received at one of its ports and then send the data to every computer in the
network.
14
Using hubs is not a very secure method of data distribution and is also wasteful of bandwidth.
Note:
2) Switch:
Switches are hardware devices that can have a number of devices or computers connected to
them.
The switch checks the data packet received and works out its destination address (or addresses)
and sends the data to the appropriate computer(s) only.
This makes using a switch a more secure and efficient way of distributing data.
Each device or computer on a network has a media access control (MAC) address which
identifies it uniquely. Data packets sent to switches will have a MAC address identifying the
source of the data and additional addresses identifying each device which should receive the
data.
Note:
3) Repeater:
Repeaters are devices which are added to transmission systems to boost the signal so it can travel
greater distances.
Repeating Hubs:
Sometimes, hubs contain repeaters and are known as repeating hubs. All signals fed to the hub
are boosted before being sent to all devices in the network, thus increasing the operational range.
1) They have only one collision domain. When the signals are boosted and then broadcast to
devices, any collisions which might occur are not resolved there and then. One way to deal
with this problem is to make use of jamming signals – while this manages the collisions, it
also reduces network performance since it involves repeated broadcasts as the collisions are
resolved.
15
2) The devices are referred to as unmanaged since they are unable to manage delivery paths and
also security in the network.
4) Bridge
Bridges are devices that connect one LAN to another LAN that uses the same protocol
(communication rules). They are often used to connect together different parts of a LAN so that
they can function as a single LAN.
Bridges are used to interconnect LANs (or parts of LANs), since sending out every data packet
to all possible destinations would quickly flood larger networks with unnecessary traffic. For
this reason, a router is used to communicate with other networks, such as the internet.
Note:
16
5) Router:
Routers enable data packets to be routed between the different networks for example, to join a
LAN to a WAN. The router takes data transmitted in one format from a network (which is
using a particular protocol) and converts the data to a protocol and format understood by
another network, thereby allowing them to communicate via the router.
Role of Routers:
6) Gateway:
A gateway is a network point (or node) that acts as an entrance to another network. It is a key
point for data on its way to or from other networks. It can be used to connect two or more
dissimilar LANs (LANs using different protocols). The gateway converts data packets from one
protocol to another.
7) Modems:
To allow the transmission of digital data over analogue communication channels we need to use a
modem (modulator demodulator). Modems converts digital data to analogue data. It also does
the reverse and converts data received over the analogue network into digital data which can
be understood by the computer.
17
Important:
Routers Gateways
Forwards packets of data from one network to Convert one protocol (or data format) to
another; routers read each incoming packet of another protocol (format) used in a different
data and decide where to forward the packet network.
Ethernet
Ethernet is a protocol used by many wired LANs. It was adopted as a standard by the Institute
of Electrical and Electronic Engineers (IEEE) and Ethernet is also known as IEEE 802.3.
Ethernet supports broadcast transmission (communications where pieces of data are sent from
sender to receiver) and are used to send messages to all devices connected to a LAN. The risk is
that two messages using the same data channel could be sent at the same time, leading to a
collision.
A collision occurs when two devices send a packet at the same time on the shared network
segment. The packets collide and both devices must send the packets again, which reduces
network efficiency.
18
CSMA/CD:
Carrier sense multiple access with collision detection (CSMA/CD) was developed to resolve
collisions in ethernet.
When a frame is sent it causes a voltage change on the Ethernet cable. When a collision is
detected, a node stops transmitting a frame and transmits a ‘jam’ signal and then waits for a
random time interval before trying to resend the frame. CSMA/CD protocol will define the
random time period for a device to wait before trying again.
Bit Streaming:
Bit streaming is a contiguous sequence of digital bits sent over the internet or a network that
requires a high-speed data communication link (such as fast broadband).
The data transmission rate from the file server (containing the video, for example) to the buffer
must be greater than the rate at which data is transmitted from buffer to media player. The larger
the buffer, the better the control over the bit rate being sent to the media player. The media
player will always check to ensure data lies between a minimum value (often referred to as low
water mark) and a maximum value (often referred to as a high-water mark). The difference
between the two values is usually about 80% of the total buffer capacity.
19
On demand:
1) Digital files stored on a server are converted to a bit streaming format (encoding takes place
and the encoded files are uploaded to a server).
2) A link to the encoded video/music file is placed on the web server to be downloaded.
3) The user clicks on the link and the video/music file is downloaded in a contiguous bit stream.
4) Because it is on demand, the streamed video/music is broadcast to the user as and when
required.
5) It is possible to pause, rewind and fast forward the video/music if required.
Real time:
The Internet:
Public switched telephone network (PSTN)
Communication systems that were not originally designed for computer networking provide
significant infrastructure support for the Internet. The longest standing example is what is
often referred to as POTS (plain old telephone service) but is more formally described as
a PSTN (public switched telephone network).
Phone calls using the internet use either an internet phone or microphone and speakers.
The internet connection is only ‘live’ while data (sound/video image) is being transmitted.
Voice over Internet Protocol (VoIP) converts sound to digital packages (encoding) which can be
sent over the internet. VoIP uses packet switching; the networks simply send and retrieve data as
it is needed so there is no dedicated line, unlike PSTN. Data is routed through thousands of
possible pathways, allowing the fastest route to be determined.
20
Cellular networks and satellites:
Satellites are an important part of all network communications that cover vast distances. Due to
the curvature of the Earth, the height of the satellite’s orbit determines how much coverage it can
give.
Satellites have the advantage that they will always give complete coverage and don’t suffer from
signal attenuation to the same extent as underground/undersea cables. It is also difficult to
isolate and resolve faults in cables on the sea bed.
21
Internet Protocol (IP) Address:
It is a unique address allocated to each device on the internet by the network/ISP (internet
service providers).
It is used to identify the location of a device on the Internet/network.
IP addresses can be IPv4 (32 bit) or IPv6 (128 bit).
It can be static meaning it doesn’t change each time a device is connected to the Internet.
It can be dynamic meaning that it can change each time a device is connected to the Internet.
It can be used in place of URL.
Example: 198.167.214.1
192.168.0.255
Purpose of IP address:
It is an address given to each device that is unique within the network.
It is used to locate a device on a network.
It allows a device/gateway to send data to the correct destination i.e., specific device/gateway.
Characteristics of an IP address:
It consists of values between 0–255 / 0–FFFF.
The values are separated by full stops/colons.
It is a unique address.
It can be static or dynamic.
It can be public or private.
It can be IPv4 having four groups of digits.
It can be IPv6 having eight groups of digits.
The consecutive groups of 0000 can be replaced with double colons (::) in IPv6.
22
Static & Dynamic IP Address:
Static IP Address:
In this type of address, when a computer/device disconnects and rejoins a network, the
address does not change.
This address is permanently assigned to a device by the internet service provider (ISP).
It is usually assigned to:
remote servers which are hosting a website
an online database
a File Transfer Protocol (FTP) server.
FTP servers are used when files need to be transferred to various computers throughout
the network.
Dynamic IP Address:
In this type of address, each time the computer/device rejoins a network, the address changes.
This address is temporarily assigned by the network OS.
It is automatically temporarily assigned using a Dynamic Host Configuration Protocol (DHCP)
server.
The static IP does not change whereas a dynamic IP address does change.
In the static IP, the DNS does not need updating which might be delayed causing ‘address
not found’ errors.
The web server may be accessed directly using just the IP address as it is still held in cache
memory.
This gives a device consistent location and also means less bandwidth is used reducing the
network traffic (and takes less time to retrieve data).
23
The following table compares Dynamic & Static IP addresses:
It provides greater privacy since it changes It allows each device to be fully traceable since
each time a user logs on. it does not change.
It can be an issue when using, for example, It allows for faster upload & download speeds.
VoIP since this type of addressing is less
reliable as it can disconnect and change the IP It is more expensive to maintain since the
address causing the VoIP connection to fail. device must be constantly running so that
information is always available.
VoIP: Voice over Internet Protocol (VoIP), is a technology that allows you to make voice calls using
a broadband Internet connection instead of a regular (or analog) phone line.
IPv4 address:
Features of IPv4 address:
1. 192.168.0.1
2. 128.12.2.30
3. 254.25.28.77
24
Classes in IPv4:
The first approach developed for improving the addressing scheme is called ‘classless
inter-domain routing’ (CIDR). This retains the concept of a netID and a hostID but removes
the rigid structure and allows the split between the netID and the hostID to be varied to
suit individual need. The simple method used to achieve this is to add an 8-bit suffix to the
address that specifies the number of bits for the netID. If, for instance, we define the suffix as
21, that means that 21 bits are used for the netID and there are 11 bits remaining (of a 32-bit
address) to specify hostIDs allowing 211 (i.e. 2048) hosts. One example of an IP address using
this scheme is shown in Figure. The 21 bits representing the netID have been highlighted.
The remaining 11 bits represent the hostID which would therefore have the binary value
11000001110.
25
IPv6 address:
Features of IPv6 address:
1. 12F3:2356:AB12:2015:0000:0000:1234:5123
2. A8FB:7A88:F FF0:0FFF:3D21:2085:66FB:F0FA
3. 12F3:2356:AB12:2015:0000:0000:1234:5123
The use of IPv4 is only 32-bit addresses which considerably reduces potential number of
devices and routers used on the internet at any one time.
A newer version called IPv6 is now used which is 128-bit addresses and so considerably
increases number of devices and routers used on the internet at any one time.
Why is there a need for IPv6 addressing:
The number of IP addresses needed will exceed the number available using IPv4.
26
Zero compression:
IPv6 addresses can be quite long; but there is a way to shorten them using zero compression.
The zero compression can only be applied ONCE to an IPv6 address, otherwise it would be
impossible to tell how many zeros were replaced on each occasion where it was applied.
8055:F2F2:0000:FFF1:0000:0000:0000:DD04
or
8055:F2F2:0000:0000:0000:FFF1:0000:DD04
or
8055:F2F2:0000:0000:FFF1:0000:0000:DD04
Sub-netting
CIDR is actually based on sub-netting and the two are similar in many ways. Sub-netting
divides a LAN into two or more smaller networks. This helps reduce network traffic and can also
hide the complexity of the overall network.
Subnets are subdivisions of networks that are treated logically as separate networks. The standard
definition of a LAN is 'a set of connected computers within a limited geographical range'. However
this can also be qualified with 'all the devices should also be in the same IP network'. The network
id of each subnet is different.
27
NAT (Network Address Translation)
With NAT, a pool of public IP addresses is held by an edge router (at the point where it connects
to the internet). Any packet heading out to the internet, with a private IP address as its source
address, has swapped the private address for a public, routable address. This is then routable over
the internet and the response comes back to the right place. A single routable IP address can be
used for an entire private network.
As a result, a large organization can share a small number of public IP addresses between
outgoing conversations and dynamically allocate them as needed.
IPv4 IPv6
Statement
(✓) (✓)
True False
Statement
(✓) (✓)
IP addresses are used to ensure that messages and data reach their
✓
correct destinations
28
A few examples are given below which will help you better understand the formats of IPv4 & IPv6
addresses. The examples will show whether the given IP addresses are valid or invalid and the
justification needed for proving that according to the examination question.
Example 1:
The following table shows four IPv6 addresses. State if each address is valid or invalid.
21E5:69AA:FFFF:E100:B691:1285:F56E Valid
::255.255.255.255 Valid
59FB::1005:CC57:6571 Valid
56FE::2159:5BBC::6594 Invalid
Example 2:
The following table shows four IPv4 addresses. Indicate for each IP address whether it is valid
or invalid and give a reason.
29
Example 3:
The following table shows four possible IP addresses. Indicate for each IP address whether it
is valid or invalid and give a reason.
Denary/ Valid or
IP Address Reason
Hexadecimal Invalid
6.0.257.6 Denary Invalid 257 is above 255 // third group is above 255
Example 4:
The following is an IPv6 address:
15EF:5L63::2014:BB::60AA
Example 5:
The following is an IPv6 address:
C100:2235::1000:25AA:AA50
30
Exam Style Questions:
Question 1:
Answer:
Question 2:
31
Answer:
Question 3:
Answer:
32
Question 4:
33
4
Answer:
Question 5:
Answer:
34
Question 6:
Answer:
35
Question 7:
Answer:
36
IP address & MAC address:
The IP address gives the location of a device on the internet. It is an address given to each device
on the internet by the network/ISP.
The MAC address identifies the device connected to the internet. It is a unique address given to a
device on a network by the manufacturer.
The following True & False statements compare IP addresses & MAC addresses:
True False
Statement
(✓) (✓)
37
Exam Style Questions:
Question 1:
Answer:
38
Question 2:
Answer:
39
Question 3:
Answer:
40
Uniform Resource Locator (URL):
A uniform resource locator (URL) is a text-based address for a web page.
It contains the domain name, protocol used and the web page/file name.
It is the website address that is typed into the browser’s address bar used to access websites.
It directs a browser to a specific page online called a web page.
In essence, it's a set of directions and every web page has a unique one.
In a web browser, the address bar (also URL bar) shows the current URL. The user can either click on
a link or type a URL into the bar manually to navigate to a chosen website.
It is typed into the browser address bar using the following format:
The path is the web page, which is often omitted and it then becomes the root directory of
the website.
The file name is the item on the web page.
For example, the web browser will break up the URL into three parts:
The first part: It is the access protocol used. It can only be either http or https.
The second part: It is the domain name or also called web servers name.
41
Exam Style Questions:
Question 1:
Answer:
Question 2:
Answer:
https = protocol
cambridgeassessment.org.uk = domain name
/index.html = file name/web page
42
Question 3:
Answer:
http = enables browser to know what protocol is being used to access information in domain
43
Question 4:
Answer:
Question 5:
Answer:
44
Retrieval, Location & Displaying Of Web Pages:
Domain Name Server (DNS):
It is a system for finding IP addresses for a domain name given in a URL.
It stores an index of URL and matching IP address.
It searches for URL to obtain the IP address.
The DNS process involves converting a URL (such as www.visionacademy.com.pk) into an IP
address the computer can understand (such as 107.162.140.19).
So, it basically translates domain names to IP addresses so browsers can load Internet
resources.
Therefore, the URL and domain name servers eliminate the need for a user to memorize IP
addresses.
NOTE: The process of how web pages are located, retrieved, and displayed on a device when
a user enters a URL including the roles of the web browser, IP address, DNS, web server &
HTML involves using the same keywords for all kind of scenarios with little variations.
Therefore, a few examples according to questions asked in past examinations are given below
for you to understand this important concept better and easily.
However, the basic keywords, reasoning and concepts remain fairly same for all questions.
Description of how Web Pages for a Website is requested and displayed on a user’s computer:
The browser sends URL to DNS (domain name server) using HTTP/HTTPS.
The DNS finds matching IP addresses for URL and sends IP address to web browser.
The web browser sends request to IP address/web server for web pages.
The web server sends web pages back to browser.
The browser renders/interprets the HTML to display web pages.
Any security certificates are exchanged/authenticated.
How the web browser uses the URL to access the Web Pages:
The web browser sends the URL to DNS (domain name server) to find the IP address.
DNS stores an index of URL and matching IP address.
DNS searches for URL to obtain the IP address.
IP address is sent to the web browser, if found.
It connects to the web server (using the IP address) using HTTP/HTTPS.
Web server sends the web page to web browser.
Web browser interprets/translates HTML code to display the web page.
If URL is not found, DNS returns an error to the browser.
45
Explanation of role of browser when accessing the Web Pages:
The web browser sends the URL to DNS (domain name server) to find the IP address.
It connects to the webserver (using the IP address) using HTTP/HTTPS.
It renders/translates HTML.
It runs active/client-side scripts built into webpages.
It manages SSL/TLS certificate process.
It stores/retrieves cookies.
Question 1:
Requested:
The data for the website is stored on the company’s web server.
The web server sends the data for the website back to the web browser.
The web server uses the customer’s IP address to return the data.
The data is transferred into Hyper Text Mark-up Language (HTML).
HTML is interpreted by the web browser to display the website.
46
Question 2:
1. URL
2. https
3. Domain name
4. Web server
5. Browser
6. HTML
47
Question 3:
Answer:
48
Question 4:
Answer:
49