COMP SCI TEST UNIT 2
A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent to the user? A The file is broken into packets for transmission. The packets must be reassembled upon receipt. B The file is broken into packets for transmission. The user's browser must request each packet in order until all packets are received. C The server attempts to connect directly to the user's computer. If the connection is successful, the entire file is sent. If the connection is unsuccessful, an error message is sent to the user. D The server repeatedly attempts to connect directly to the user's computer until a connection is made. Once the connection is made, the entire file is sent.
A
Researchers have developed a simulation of packets traveling between server computers and client computers in a network. Of the following, which two outcomes are most likely to be results of the simulation? Select two answers. A Better understanding of the effect of temporarily unavailable network connections B Better understanding of the effect of using hexadecimal representations for binary data C Better understanding of the impact of access to public data in identifying solutions to problems D Better understanding of the impact of increased connection speeds for frequently visited servers
A
The following figure represents a network of physically linked devices labeled P through S. A line between two devices indicates a connection. Devices can communicate only through the connections shown. Which of the following statements best explains the ability of the network to provide fault tolerance? A The network is considered fault-tolerant because there are redundant paths between each pair of devices. B The network is considered fault-tolerant because it guarantees that no individual component will fail. C The network is not considered fault-tolerant because it relies on physical connections. D The network is not considered fault-tolerant because it provides more paths than are needed.
A
What is the minimum number of connections that would need to be removed from the network in order for device A to not be able to communicate with device F? A 2 B 3 C 4 D 5
A
Which of the following best describes the role of the Internet Engineering Task Force (IETF) ? A Developing standards and protocols for Internet communication B Preventing copyrighted materials from being illegally distributed online C Preventing malicious software from being distributed online D Verifying the ownership of encrypted keys used in secured messages
A
Which of the following best explains how IP addresses are assigned? A As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network. B IP addresses are assigned only to servers that host Web sites; user devices do not require an IP address. C New devices are connected to the Internet without an IP address, but are eventually assigned an IP address once they can be verified by a certificate authority. D New devices are connected to the Internet without an IP address; IP addresses are assigned only for encrypted communications
A
Which of the following best explains how IP addresses are assigned? A As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network. B IP addresses are assigned only to servers that host Web sites; user devices do not require an IP address. C New devices are connected to the Internet without an IP address, but are eventually assigned an IP address once they can be verified by a certificate authority. D New devices are connected to the Internet without an IP address; IP addresses are assigned only for encrypted communications.
A
Which of the following explains a benefit of using open standards and protocols for Internet communication? A Open standards and protocols allow different manufacturers and developers to build hardware and software that can communicate with hardware and software on the rest of the network. B Open standards and protocols provide ways for users to eliminate the latency of messages they send on the Internet. C Open standards and protocols allow users to freely share or reuse material found on the Internet for noncommercial purposes. D Open standards and protocols prevent developers from releasing software that contains errors.
A
Which of the following is a primary benefit of making a computing system fault-tolerant? A If one component of the system fails, users of the system can often still access it. B If one component of the system is hacked, no information will be stolen. C If the system becomes too expensive, making it fault-tolerant will save money. D If the system cannot operate efficiently, making it fault-tolerant will speed up its operation.
A
Which of the following statements are true about the ability for devices A and C to communicate? Select two answers. A If devices B and D were to fail, then information sent from device A could not reach device C. B If devices B and F were to fail, then information sent from device A could not reach device C. C If devices D and F were to fail, then information sent from device A could not reach device C. D If devices E and F were to fail, then information sent from device A could not reach device C.
A and C
A state government is attempting to reduce the digital divide. Which of the following activities has the greatest potential to contribute to the digital divide rather than reducing it? A Providing programs that focus on technology literacy at local libraries B Requiring applicants for government jobs to apply using an online platform C Working with technology companies to offer computing devices at discounted prices to individuals with reduced incomes D Working with telecommunications companies to build network infrastructure in remote areas
B
In configuration I, what is the minimum number of connections that must be broken or removed before device T can no longer communicate with device U? A One B Two C Three D Four
B
The following figures represent different ways of configuring a network of physically linked computers labeled P, Q, R, and S. A line between two computers indicates that the computers can communicate directly with each other. In which configuration is it NOT possible to have redundant routing between computers P and S? A B C D
B
What is the minimum number of connections that must be broken or removed before device B can no longer communicate with device C? A Three B Four C Five D Six
B
Which of the following actions is most likely to help reduce the digital divide? A Adding a requirement that all users of a popular social media site link their accounts with a phone number. B Deploying satellites and other infrastructure to provide inexpensive Internet access to remote areas of Earth C Digitizing millions of books from university libraries, making their full text available online D Offering improved Internet connections to Internet users who are willing to pay a premium fee for more bandwidth
B
Which of the following best explains how data is transmitted on the Internet? A Data is broken into packets, which are all sent to the recipient in a specified order along the same path. B Data is broken into packets, which can be sent along different paths. C All data is transmitted in a single packet through a direct connection between the sender and the recipient. D Multiple data files are bundled together in a packet and transmitted together.
B
Which of the following best explains how fault tolerance in a network is achieved? A By providing high-bandwidth connections between devices, enabling data packets to be transmitted as quickly as possible B By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component C By providing open network protocols, ensuring that all devices on the network are interacting in a standard way D By providing software to monitor all network traffic, ensuring that data packets are sent and received in the proper order
B
Which of the following best explains how messages are typically transmitted over the Internet? A The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient's device. B The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device. C The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient's device. D The message is transmitted as a single file and received in whole by the recipient's device.
B
Which of the following best explains how the Internet is a fault-tolerant system? A The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace. B The Internet is fault-tolerant because there are usually multiple paths between devices, allowing messages to sometimes be sent even when parts of the network fail. C The Internet is fault-tolerant because users can transmit messages using a variety of different protocols, allowing them to use devices from any manufacturer. D The Internet is fault-tolerant because users usually understand and accept the fact that servers sometimes fail, allowing network engineers to repair faulty devices as quickly as possible.
B
Which of the following best explains what happens when a new device is connected to the Internet? A A device driver is assigned to the device. B An Internet Protocol (IP) address is assigned to the device. C A packet number is assigned to the device. D A Web site is assigned to the device.
B
Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet? A The ability to use a hierarchical naming system to avoid naming conflicts B The ability to provide data transmission even when some connections have failed C The ability to resolve errors in domain name system (DNS) lookups D The ability to use multiple protocols such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (SMTP) to transfer data
B
Which of the following statements about the Internet is true? A The Internet is a computer network that uses proprietary communication protocols. B The Internet is designed to scale to support an increasing number of users. C The Internet requires all communications to use encryption protocols. D The Internet uses a centralized system to determine how packets are routed.
B
Which of the following actions are likely to be helpful in reducing the digital divide? Select two answers. A Designing new technologies intended only for advanced users B Designing new technologies to be accessible to individuals with different physical abilities C Implementing government regulations restricting citizens' access to Web content D Having world governments support the construction of network infrastructure
B and D
A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following activities is LEAST likely to be effective in this purpose? A Holding basic computer classes at community centers B Providing free wireless Internet connections at locations in low-income neighborhoods C Putting all government forms on the city Web site D Requiring that every city school has computers that meet a minimum hardware and software standard
C
The figure below represents a network of physically linked computers labeled A through G. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. For example, information can be sent directly between computers A and B, but information sent between computers A and C must go through other computers. What is the minimum number of connections that must be broken or removed in the network before computer E can no longer communicate with computer F? A 1 B 2 C 3 D 4
C
The figure below shows two possible network configurations for devices P through V. A line between two devices indicates a connection. Devices can communicate only through the connections shown. In which of the configurations is it possible to have redundant routing between devices Q and V? A Configuration I only B Configuration II only C Both configuration I and configuration II D Neither configuration I nor configuration II
C
The transmission control protocol (TCP) and Internet protocol (IP) are used in Internet communication. Which of the following best describes the purpose of these protocols? A To ensure that communications between devices on the Internet are above a minimum transmission speed B To ensure that private data is inaccessible to unauthorized devices on the Internet C To establish a common standard for sending messages between devices on the Internet D To validate the ownership of encryption keys used in Internet communication
C
Which of the following actions is most likely to be effective in reducing the digital divide at a local level? A Creating an application that offers coupons and discounts for local businesses B Offering a discount to utility customers who pay their bills online instead of by mail C Providing free community access to computers at schools, libraries, and community centers D Requiring applicants for local government jobs to complete an online application
C
Which of the following best describes a direct benefit in using redundant routing on the Internet? A Redundancy enables messages to be transmitted with as few packets as possible. B Redundancy enables network devices to communicate with as few network connections as possible. C Redundancy often allows messages to be sent on the network even if some network devices or connections have failed. D Redundancy prevents network communications from being intercepted by unauthorized individuals.
C
Which of the following best describes the relationship between the World Wide Web and the Internet? A The World Wide Web is a protocol that is accessed using a data stream called the Internet. B The World Wide Web is a system of linked pages, programs, and files that is accessed using a data stream called the Internet. C The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet. D The World Wide Web is a Web site that is accessed using a protocol called the Internet.
C
Which of the following is LEAST likely to be a contributing factor to the digital divide? A Some individuals and groups are economically disadvantaged and cannot afford computing devices or Internet connectivity. B Some individuals and groups do not have the necessary experience or education to use computing devices or the Internet effectively. C Some parents prefer to limit the amount of time their children spend using computing devices or the Internet. D Some residents in remote regions of the world do not have access to the infrastructure necessary to support reliable Internet connectivity.
C
Which of the following is a true statement about Internet communication? A Devices from different manufacturers are required to run the same operating system to communicate over the Internet. B Every device connected to the Internet is assigned a digital certificate by a certificate authority. C Every device connected to the Internet is assigned an Internet protocol (IP) address. D Every device connected to the Internet requires a high-bandwidth connection to enable redundant routing to each device.
C
Which of the following school policies is most likely to have a positive impact on the digital divide? A A school allows students to bring a graphing calculator from home to complete in-class mathematics assignments. B A school allows students to bring a tablet computer to class every day to participate in graded quizzes. C A school provides a laptop or tablet computer to all students enrolled at the school. D A school recommends that all students purchase a computer with as much processing speed as possible so that projects run faster.
C
Which of the following statements about security in the network is true? Computers A and D need to communicate with at least two additional computers in the network in order to communicate with each other. Computers B and C can communicate with each other without additional computers being aware of the communication. A I only B II only C I and II D Neither I nor II
C
Which of the following statements correctly explain how the Internet is able to facilitate communication at a large scale? A central monitoring computer is used to track and maintain the connections of the Internet. Data is routed between points in multiple ways so that if a connection fails, the data can be rerouted around the inoperative connections. Protocols for packets and routing are used so that computers from different manufacturers can communicate in a standard way. A I and II only B I and III only C II and III only D I, II, and III
C
Which of the following statements is true about the network? A Information sent from device A to device D can use at most two unique paths. B Information sent from device A to device I will pass through at most four other devices. C If devices B and F fail, then device A will not be able to communicate with device G. D If devices C and F fail, then device D will not be able to communicate with device H.
C
Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes the ability of the two computers to communicate with each other across the Internet? A The computers cannot communicate because different manufacturers use different communication protocols. B The computers can communicate, but additional hardware is needed to convert data packets from one computer's protocol to the other computer's protocol. C The computers can communicate directly only if the messages consist of text; other formats cannot be interpreted across computers. D The computers can communicate directly because Internet communication uses standard protocols.
D
Which of the following actions could be used to help reduce the digital divide? I. Providing free education and training on how to use computing devicesII. Providing free or low-cost computing devices to low-income individualsIII. Providing networks and infrastructure to people in remote areas A III only B I and II only C II and III only D I, II, and III
D
Which of the following best explains the relationship between the Internet and the World Wide Web? A Both the Internet and the World Wide Web refer to the same interconnected network of devices. B The Internet is an interconnected network of data servers, and the World Wide Web is a network of user devices that communicates with the data servers. C The Internet is a local network of interconnected devices, and the World Wide Web is a global network that connects the local networks with each other. D The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.
D
Which of the following is a primary reason for the use of open protocols on the Internet? A Open protocols allow devices to specify how data packets are to be routed on the Internet in advance. B Open protocols ensure that all data transmission on the Internet is kept secure. C Open protocols ensure that all Internet users are provided connections with equal bandwidth. D Open protocols provide a way to standardize data transmission between different devices.
D