AP Classroom Review Questions for Unit 2 APSC Principles
According to the domain name system (DNS), which of the following is a subdomain of the domain example.com? A)about.example.com B) example.co.uk C) example.com.org D example.org
A)about.example.com
Which of the following best explains how IP addresses are assigned? A) As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network. B) IP addresses are assigned only to servers that host Web sites; user devices do not require an IP address. C) New devices are connected to the Internet without an IP address, but are eventually assigned an IP address once they can be verified by a certificate authority. D) New devices are connected to the Internet without an IP address; IP addresses are assigned only for encrypted communications.
A) As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network.
Researchers have developed a simulation of packets traveling between server computers and client computers in a network. Of the following, which two outcomes are most likely to be results of the simulation? Select two answers. A) Better understanding of the effect of temporarily unavailable network connections B) Better understanding of the effect of using hexadecimal representations for binary data C) Better understanding of the impact of access to public data in identifying solutions to problems D) Better understanding of the impact of increased connection speeds for frequently visited servers
A) Better understanding of the effect of temporarily unavailable network connections D) Better understanding of the impact of increased connection speeds for frequently visited servers
Which of the following best describes the role of the Internet Engineering Task Force (IETF) ? A) Developing standards and protocols for Internet communication B) Preventing copyrighted materials from being illegally distributed online C) Preventing malicious software from being distributed online D) Verifying the ownership of encrypted keys used in secured messages
A) Developing standards and protocols for Internet communication
Which of the following best explains how data is typically assembled in packets for transmission over the Internet? A) Each packet contains data to be transmitted, along with metadata containing information used for routing the data. B) Each packet contains an encrypted version of the data to be transmitted, along with metadata containing the key needed to decrypt the data. C) Each packet contains only the metadata used to establish a direct connection so that the data can be transmitted. D) Each packet contains multiple data files bundled together, along with metadata describing how to categorize each data file.
A) Each packet contains data to be transmitted, along with metadata containing information used for routing the data.
Which of the following is a primary benefit of making a computing system fault-tolerant? A) If one component of the system fails, users of the system can often still access it. B) If one component of the system is hacked, no information will be stolen. C) If the system becomes too expensive, making it fault-tolerant will save money. D) If the system cannot operate efficiently, making it fault-tolerant will speed up its operation.
A) If one component of the system fails, users of the system can often still access it.
Which of the following explains a benefit of using open standards and protocols for Internet communication? A) Open standards and protocols allow different manufacturers and developers to build hardware and software that can communicate with hardware and software on the rest of the network. B) Open standards and protocols provide ways for users to eliminate the latency of messages they send on the Internet. C) Open standards and protocols allow users to freely share or reuse material found on the Internet for noncommercial purposes. D) Open standards and protocols prevent developers from releasing software that contains errors.
A) Open standards and protocols allow different manufacturers and developers to build hardware and software that can communicate with hardware and software on the rest of the network.
A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent to the user? A) The file is broken into packets for transmission. The packets must be reassembled upon receipt. B) The file is broken into packets for transmission. The user's browser must request each packet in order until all packets are received. C) The server attempts to connect directly to the user's computer. If the connection is successful, the entire file is sent. If the connection is unsuccessful, an error message is sent to the user. D) The server repeatedly attempts to connect directly to the user's computer until a connection is made. Once the connection is made, the entire file is sent.
A) The file is broken into packets for transmission. The packets must be reassembled upon receipt.
Which of the following best explains how fault tolerance in a network is achieved? A) By providing high-bandwidth connections between devices, enabling data packets to be transmitted as quickly as possible B) By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component C) By providing open network protocols, ensuring that all devices on the network are interacting in a standard way D) By providing software to monitor all network traffic, ensuring that data packets are sent and received in the proper order
B) By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component —————— Explaination:When a system can support failures and still continue to function, it is considered fault-tolerant. This redundant routing within a network allows it to support failures and still continue to function.
Which of the following best explains how data is transmitted on the Internet? A) Data is broken into packets, which are all sent to the recipient in a specified order along the same path. B) Data is broken into packets, which can be sent along different paths. C) All data is transmitted in a single packet through a direct connection between the sender and the recipient. D) Multiple data files are bundled together in a packet and transmitted together.
B) Data is broken into packets, which can be sent along different paths.
Which of the following actions are likely to be helpful in reducing the digital divide? Select two answers. A) Designing new technologies intended only for advanced users B) Designing new technologies to be accessible to individuals with different physical abilities C) Implementing government regulations restricting citizens' access to Web content D) Having world governments support the construction of network infrastructure
B) Designing new technologies to be accessible to individuals with different physical abilities D) Having world governments support the construction of network infrastructure
Internet protocol version 6 (IPv6) has been introduced to replace the previous version (IPv4). Which of the following best describes a benefit of IPv6 over IPv4? A)IPv6 addresses are shorter than IPv4 addresses, which allows for faster routing of packets. B) IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet. C) IPv6 eliminates the use of hierarchy in addressing, making addresses easier to use. D)IPv6 allows users to bypass older security protocols so that data can be sent peer-to-peer without the use of routers.
B) IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet.
A state government is attempting to reduce the digital divide. Which of the following activities has the greatest potential to contribute to the digital divide rather than reducing it? A) Providing programs that focus on technology literacy at local libraries B) Requiring applicants for government jobs to apply using an online platform C) Working with technology companies to offer computing devices at discounted prices to individuals with reduced incomes D) Working with telecommunications companies to build network infrastructure in remote areas
B) Requiring applicants for government jobs to apply using an online platform
Which of the following statements about the Internet is true? A) The Internet is a computer network that uses proprietary communication protocols. B) The Internet is designed to scale to support an increasing number of users. C) The Internet requires all communications to use encryption protocols. D) The Internet uses a centralized system to determine how packets are routed.
B) The Internet is designed to scale to support an increasing number of users.
Which of the following best explains how the Internet is a fault-tolerant system? A) The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace. B) The Internet is fault-tolerant because there are usually multiple paths between devices, allowing messages to sometimes be sent even when parts of the network fail. C) The Internet is fault-tolerant because users can transmit messages using a variety of different protocols, allowing them to use devices from any manufacturer. D) The Internet is fault-tolerant because users usually understand and accept the fact that servers sometimes fail, allowing network engineers to repair faulty devices as quickly as possible.
B) The Internet is fault-tolerant because there are usually multiple paths between devices, allowing messages to sometimes be sent even when parts of the network fail.
Which of the following school policies is most likely to have a positive impact on the digital divide? A) A school allows students to bring a graphing calculator from home to complete in-class mathematics assignments. B) A school allows students to bring a tablet computer to class every day to participate in graded quizzes. C) A school provides a laptop or tablet computer to all students enrolled at the school. D) A school recommends that all students purchase a computer with as much processing speed as possible so that projects run faster.
C) A school provides a laptop or tablet computer to all students enrolled at the school.
Which of the following is a true statement about Internet communication? A) Devices from different manufacturers are required to run the same operating system to communicate over the Internet. B) Every device connected to the Internet is assigned a digital certificate by a certificate authority. C) Every device connected to the Internet is assigned an Internet protocol (IP) address. D) Every device connected to the Internet requires a high-bandwidth connection to enable redundant routing to each device.
C) Every device connected to the Internet is assigned an Internet protocol (IP) address.
Which of the following actions is most likely to be effective in reducing the digital divide at a local level? A) Creating an application that offers coupons and discounts for local businesses B) Offering a discount to utility customers who pay their bills online instead of by mail C) Providing free community access to computers at schools, libraries, and community centers D) Requiring applicants for local government jobs to complete an online application
C) Providing free community access to computers at schools, libraries, and community centers
A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following activities is LEAST likely to be effective in this purpose? A) Holding basic computer classes at community centers B) Providing free wireless Internet connections at locations in low-income neighborhoods C) Putting all government forms on the city Web site D) Requiring that every city school has computers that meet a minimum hardware and software standard
C) Putting all government forms on the city Web site
Which of the following best describes a direct benefit in using redundant routing on the Internet? A)Redundancy enables messages to be transmitted with as few packets as possible. B) Redundancy enables network devices to communicate with as few network connections as possible. C) Redundancy often allows messages to be sent on the network even if some network devices or connections have failed. D) Redundancy prevents network communications from being intercepted by unauthorized individuals
C) Redundancy often allows messages to be sent on the network even if some network devices or connections have failed.
Which of the following is LEAST likely to be a contributing factor to the digital divide? A) Some individuals and groups are economically disadvantaged and cannot afford computing devices or Internet connectivity. B) Some individuals and groups do not have the necessary experience or education to use computing devices or the Internet effectively. C) Some parents prefer to limit the amount of time their children spend using computing devices or the Internet. D) Some residents in remote regions of the world do not have access to the infrastructure necessary to support reliable Internet connectivity.
C) Some parents prefer to limit the amount of time their children spend using computing devices or the Internet.
Which of the following best describes the relationship between the World Wide Web and the Internet? A) The World Wide Web is a protocol that is accessed using a data stream called the Internet. B) The World Wide Web is a system of linked pages, programs, and files that is accessed using a data stream called the Internet. C) The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet. D) The World Wide Web is a Web site that is accessed using a protocol called the Internet.
C) The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.
A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth? A) The amount of time it takes guest users to send and receive large files is likely to decrease. B) The number of packets required for guest users to send and receive data is likely to decrease. C) Guest users will be prevented from having fault-tolerant routing on the Internet. D) Guest users will be restricted in the maximum amount of data that they can send and receive per second.
D) Guest users will be restricted in the maximum amount of data that they can send and receive per second.
Which of the following best explains the relationship between the Internet and the World Wide Web? A) Both the Internet and the World Wide Web refer to the same interconnected network of devices. B) The Internet is an interconnected network of data servers, and the World Wide Web is a network of user devices that communicates with the data servers. C) The Internet is a local network of interconnected devices, and the World Wide Web is a global network that connects the local networks with each other. D) The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.
D) The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.
Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes the ability of the two computers to communicate with each other across the Internet? A) The computers cannot communicate because different manufacturers use different communication protocols. B) The computers can communicate, but additional hardware is needed to convert data packets from one computer's protocol to the other computer's protocol. C) The computers can communicate directly only if the messages consist of text; other formats cannot be interpreted across computers. D) The computers can communicate directly because Internet communication uses standard protocols.
D) The computers can communicate directly because Internet communication uses standard protocols.
Which of the following best explains what happens when a new device is connected to the Internet? A) A device driver is assigned to the device. B) An Internet Protocol (IP) address is assigned to the device. C) A packet number is assigned to the device. D) A Web site is assigned to the device.
B) An Internet Protocol (IP) address is assigned to the device.
Which of the following actions is most likely to help reduce the digital divide? A) Adding a requirement that all users of a popular social media site link their accounts with a phone number. B) Deploying satellites and other infrastructure to provide inexpensive Internet access to remote areas of Earth C) Digitizing millions of books from university libraries, making their full text available online D) Offering improved Internet connections to Internet users who are willing to pay a premium fee for more bandwidth
B) Deploying satellites and other infrastructure to provide inexpensive Internet access to remote areas of Earth
Which of the following is a primary reason for the use of open protocols on the Internet? A) Open protocols allow devices to specify how data packets are to be routed on the Internet in advance. B) Open protocols ensure that all data transmission on the Internet is kept secure. C) Open protocols ensure that all Internet users are provided connections with equal bandwidth. D) Open protocols provide a way to standardize data transmission between different devices.
D) Open protocols provide a way to standardize data transmission between different devices.
Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet? A) The ability to use a hierarchical naming system to avoid naming conflicts B) The ability to provide data transmission even when some connections have failed C) The ability to resolve errors in domain name system (DNS) lookups D)The ability to use multiple protocols such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (SMTP) to transfer data
B) The ability to provide data transmission even when some connections have failed
Which of the following best explains how messages are typically transmitted over the Internet? A)The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient's device. B) The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device. C) The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient's device. D) The message is transmitted as a single file and received in whole by the recipient's device.
B) The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device. —- explanation:Messages are broken into packets. Each packet contains data to be transmitted, as well as metadata for routing and reassembling the data upon receipt. This allows the packets to be received in any order and still be reassembled correctly.
The transmission control protocol (TCP) and Internet protocol (IP) are used in Internet communication. Which of the following best describes the purpose of these protocols? A) To ensure that communications between devices on the Internet are above a minimum transmission speed B) To ensure that private data is inaccessible to unauthorized devices on the Internet C) To establish a common standard for sending messages between devices on the Internet D) To validate the ownership of encryption keys used in Internet communication
C) To establish a common standard for sending messages between devices on the Internet
Which of the following actions could be used to help reduce the digital divide? I. Providing free education and training on how to use computing devices II. Providing free or low-cost computing devices to low-income individuals III. Providing networks and infrastructure to people in remote areas
I, II, and III
Which of the following statements correctly explain how the Internet is able to facilitate communication at a large scale? I. A central monitoring computer is used to track and maintain the connections of the Internet. II. Data is routed between points in multiple ways so that if a connection fails, the data can be rerouted around the inoperative connections. III. Protocols for packets and routing are used so that computers from different manufacturers can communicate in a standard way.
II and III only