CSP
According to the domain name system (DNS), which of the following is a subdomain of the domain example.com? A about.example.com B example.co.uk C example.com.org D example.org
A about.example.com
Researchers have developed a simulation of packets traveling between server computers and client computers in a network. Of the following, which two outcomes are most likely to be results of the simulation? Select two answers. A Better understanding of the effect of temporarily unavailable network connections B Better understanding of the effect of using hexadecimal representations for binary data C Better understanding of the impact of access to public data in identifying solutions to problems D Better understanding of the impact of increased connection speeds for frequently visited servers
A and D
Which of the following best explains what happens when a new device is connected to the Internet? A A device driver is assigned to the device. B An Internet Protocol (IP) address is assigned to the device. C A packet number is assigned to the device. D A Web site is assigned to the device.
An Internet Protocol (IP) address is assigned to the device.
Which of the following best explains how IP addresses are assigned? A As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network. B IP addresses are assigned only to servers that host Web sites; user devices do not require an IP address. C New devices are connected to the Internet without an IP address, but are eventually assigned an IP address once they can be verified by a certificate authority. D New devices are connected to the Internet without an IP address; IP addresses are assigned only for encrypted communications.
As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network.
Internet protocol version 6 (IPv6) has been introduced to replace the previous version (IPv4). Which of the following best describes a benefit of IPv6 over IPv4? A IPv6 addresses are shorter than IPv4 addresses, which allows for faster routing of packets. B IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet. C IPv6 eliminates the use of hierarchy in addressing, making addresses easier to use. D IPv6 allows users to bypass older security protocols so that data can be sent peer-to-peer without the use of routers.
B IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet.
Which of the following statements correctly explain how the Internet is able to facilitate communication at a large scale? A central monitoring computer is used to track and maintain the connections of the Internet. Data is routed between points in multiple ways so that if a connection fails, the data can be rerouted around the inoperative connections. Protocols for packets and routing are used so that computers from different manufacturers can communicate in a standard way. A I and II only B I and III only C II and III only D I, II, and III
C II and III only
Which of the following best explains how data is transmitted on the Internet? A Data is broken into packets, which are all sent to the recipient in a specified order along the same path. B Data is broken into packets, which can be sent along different paths. C All data is transmitted in a single packet through a direct connection between the sender and the recipient. D Multiple data files are bundled together in a packet and transmitted together.
Data is broken into packets, which can be sent along different paths. C
Which of the following best describes the role of the Internet Engineering Task Force (IETF) ? A Developing standards and protocols for Internet communication B Preventing copyrighted materials from being illegally distributed online C Preventing malicious software from being distributed online D Verifying the ownership of encrypted keys used in secured messages
Developing standards and protocols for Internet communication
Which of the following best explains how data is typically assembled in packets for transmission over the Internet? A Each packet contains data to be transmitted, along with metadata containing information used for routing the data. B Each packet contains an encrypted version of the data to be transmitted, along with metadata containing the key needed to decrypt the data. C Each packet contains only the metadata used to establish a direct connection so that the data can be transmitted. D Each packet contains multiple data files bundled together, along with metadata describing how to categorize each data file.
Each packet contains data to be transmitted, along with metadata containing information used for routing the data.
Which of the following is a true statement about Internet communication? A Devices from different manufacturers are required to run the same operating system to communicate over the Internet. B Every device connected to the Internet is assigned a digital certificate by a certificate authority. C Every device connected to the Internet is assigned an Internet protocol (IP) address. D Every device connected to the Internet requires a high-bandwidth connection to enable redundant routing to each device.
Every device connected to the Internet is assigned an Internet protocol (IP) address.
A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth? A The amount of time it takes guest users to send and receive large files is likely to decrease. B The number of packets required for guest users to send and receive data is likely to decrease. C Guest users will be prevented from having fault-tolerant routing on the Internet. D Guest users will be restricted in the maximum amount of data that they can send and receive per second.
Guest users will be restricted in the maximum amount of data that they can send and receive per second.
Which of the following is a primary reason for the use of open protocols on the Internet? A Open protocols allow devices to specify how data packets are to be routed on the Internet in advance. B Open protocols ensure that all data transmission on the Internet is kept secure. C Open protocols ensure that all Internet users are provided connections with equal bandwidth. D Open protocols provide a way to standardize data transmission between different devices.
Open protocols provide a way to standardize data transmission between different devices.
Which of the following explains a benefit of using open standards and protocols for Internet communication? A Open standards and protocols allow different manufacturers and developers to build hardware and software that can communicate with hardware and software on the rest of the network. B Open standards and protocols provide ways for users to eliminate the latency of messages they send on the Internet. C Open standards and protocols allow users to freely share or reuse material found on the Internet for noncommercial purposes. D Open standards and protocols prevent developers from releasing software that contains errors.
Open standards and protocols allow different manufacturers and developers to build hardware and software that can communicate with hardware and software on the rest of the network.
Which of the following best explains the relationship between the Internet and the World Wide Web? A Both the Internet and the World Wide Web refer to the same interconnected network of devices. B The Internet is an interconnected network of data servers, and the World Wide Web is a network of user devices that communicates with the data servers. C The Internet is a local network of interconnected devices, and the World Wide Web is a global network that connects the local networks with each other. D The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.
The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that is accessed via the Internet.
Which of the following statements about the Internet is true? A The Internet is a computer network that uses proprietary communication protocols. B The Internet is designed to scale to support an increasing number of users. C The Internet requires all communications to use encryption protocols. D The Internet uses a centralized system to determine how packets are routed.
The Internet is designed to scale to support an increasing number of users.
Which of the following best describes the relationship between the World Wide Web and the Internet? A The World Wide Web is a protocol that is accessed using a data stream called the Internet. B The World Wide Web is a system of linked pages, programs, and files that is accessed using a data stream called the Internet. C The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet. D The World Wide Web is a Web site that is accessed using a protocol called the Internet.
The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet
Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes the ability of the two computers to communicate with each other across the Internet? A The computers cannot communicate because different manufacturers use different communication protocols. B The computers can communicate, but additional hardware is needed to convert data packets from one computer's protocol to the other computer's protocol. C The computers can communicate directly only if the messages consist of text; other formats cannot be interpreted across computers. D The computers can communicate directly because Internet communication uses standard protocols.
The computers can communicate directly because Internet communication uses standard protocols.
A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent to the user? A The file is broken into packets for transmission. The packets must be reassembled upon receipt. B The file is broken into packets for transmission. The user's browser must request each packet in order until all packets are received. C The server attempts to connect directly to the user's computer. If the connection is successful, the entire file is sent. If the connection is unsuccessful, an error message is sent to the user. D The server repeatedly attempts to connect directly to the user's computer until a connection is made. Once the connection is made, the entire file is sent.
The file is broken into packets for transmission. The packets must be reassembled upon receipt.
Which of the following best explains how messages are typically transmitted over the Internet? A The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient's device. B The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device. C The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient's device. D The message is transmitted as a single file and received in whole by the recipient's device.
The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.
The transmission control protocol (TCP) and Internet protocol (IP) are used in Internet communication. Which of the following best describes the purpose of these protocols? A To ensure that communications between devices on the Internet are above a minimum transmission speed B To ensure that private data is inaccessible to unauthorized devices on the Internet C To establish a common standard for sending messages between devices on the Internet D To validate the ownership of encryption keys used in Internet communication
To establish a common standard for sending messages between devices on the Internet