Adaptive Learning Assignment - Computer Networks and the Internet

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

There are a variety of Cloud service providers that are used by organizations to execute a number of different tasks. Match the Cloud services offered to the correct Cloud service provider. 1. Offers a broad set of global Cloud-based products including compute, storage, databases, analytics, networking, mobile, developer tools, management tools, IoT, security, and enterprise solutions. 2. Offers a suite of modular Cloud computing services including data storage, data analytics, computing, and machine learning. Google also offers serverless computing, IaaS, and PaaS. 3. Offers a range of flexible Cloud infrastructure services including Cloud servers, cloud block storage, private cloud network, cloud firewall, and fully managed Cloud. 4. Offers cloud solutions for Customer Relationship Management (CRM) and Enterprise Resource Planning (ERP).

1. AWS 2. Google Cloud 3. Kamatera Performance Cloud 4. Salesforce

Match each key term that is commonly used in the discussion about cellular communication to the correct definition. 1. Transmits cell phone signals to the cellular system's mobile switching station. 2. Controls all the transmissions between cellular phone towers and their base transceiver stations. 3. Allow smartphones to receive an analog sound wave, such as a person's voice, and convert it to a digital signal that can be processed and stored by a computer. 4. A small computer within your smartphone that analyzes the sounds entering your phone through the analog/digital converter.

1. Base Transceiver Station (BTS) 2. Mobile Switching Station 3. Analog-Digital Converter (ADC) 4. Digital Signal Processor (DSP)

Collaboration software is increasingly used in a variety of business settings. There are a number of advantages that using collaboration software offers teams and organizations. Match the term to the most appropriate benefit of collaboration software. 1. People from across the organization, regardless of their physical location, can share content in real-time including documents, spreadsheets, videos, and messages. 2. Collaboration software allows project leads the ability to create the plan and schedule and share this with all members of the team. 3. Engaging remote employees can be a challenge. Collaboration software helps to create engagement by allowing remote and organization-based employees the ability to exchange and interact. 4. Scheduling activities can easily be added and updated in the software. Remote team members are actively engaged in workflow, duties, and processes due to the real-time nature of the software.

1. Better Communication 2. Project Management Capabilities 3. Improved Engagement 4. Streamlined Workflow

Match the term associated with the use of blockchain in today's business environment to the correct explanation of that term. 1. Blockchain makes changing any information in a contract almost impossible. This proves to be advantageous for businesses that are dealing with multiple contracts. 2. The encryption used in Blockchain makes it ideal for monetary transactions. Also, blockchain eliminates the need for banks to handle monetary transactions. 3. Blockchain allows shippers and customers to verify with almost absolute certainty where items and goods are along the supply chain thus removing guesswork and inefficiencies. 4. Blockchain can be used to trace mistakes and errors in manufacturing back to the point of origin.

1. Business Contracts 2. Monetary Transactions 3. Supply Chain Management 4. Quality Assurance

Match the narrative to the appropriate cryptocurrency. 1. Bitcoin (BTC) 2. Ethereum (ETH) 3. Bitcoin Cash (BCH)

1. Created in 2008, it remains the most widely traded and respected cryptocurrency. No one truly knows who created Bitcoin, but the creator of the cryptocurrency goes by the pseudonym Satoshi Nakamoto. 2. Created in 2015, it is the second most valuable cryptocurrency. 3. A forked cryptocurrency from Bitcoin. A fork is when a cryptocurrency is split into two different cryptocurrencies.

Match the TCP/IP layers to their correct definition. Instructions 1. Handles the physical parts of sending and receiving data. Data can be sent via wireless networks, Ethernet cable, network interface cards (NIC), etc. 2. Controls the movement of packets throughout the network 3. Divides data into packets and acknowledges the packets have been received 4. The group of applications that require network communication and are used by people to facilitate communication. These include email and messaging applications

1. Datalink 2. Internet 3. Transport 4. Application

Match the explanation of the disadvantages of Cloud computing to the correct disadvantage of Cloud computing-related term. 1. Cloud services are subject to planned and unplanned downtime. Downtime can occur because of maintenance, system/mechanical failure, natural disasters, and outside intrusions/attacks. 2. Cloud service providers do their best to implement the best security measures they can. These security measures often align with security and governmental standards. 3. Cloud infrastructure is owned, managed, controlled, and monitored by the Cloud service provider. This means the customer often has little control over cloud service processes and procedures. 4. Also known as vendor lock-in, vendor agreements make switching between cloud services somewhat difficult. A vendor agreement is a signed contract with the Cloud service provider for their services.

1. Downtime 2. security 3. limited control 4. vendor agreements

Match these 5G concepts with their descriptions. 1. Networks will support 500 mbps to 10 Gbps of download speed. Speeds vary by location and carrier. At the top end, that's over 100 times the speed of 4G. 2. Allows for more high-demand devices to connect over single network. This means more people can transmit data at the same time. 3. On 4G networks, the time that passes when a device is asked to perform a task to when it is completed is between 40-50 milliseconds. It is estimated 5G can reduce this by 75%.

1. Faster Connection/Data Transfer Speeds 2. Greater Capacity 3. Lower Latency

Match the explanation of the benefits of Cloud computing to the correct benefit of Cloud computing-related term. 1. Allows for the access of data, files, and programs when you are off-site or at home via web-enabled devices. 2. Reduces expenditures on IT infrastructure and hard disk space. 3. Enables organizations to communicate and share data/information more efficiently. Collaboration is facilitated because multiple users can share and work on files at the same time. 4. Makes data backup and recovery easier because critical data are stored offsite and in multiple locations.

1. Flexibility 2. Cost Savings 3. Collaboration 4. Disaster Recovery

Match the type of network to the correct definition. Instructions 1. Connect devices around an individual. PANs typically involve laptops, tablets, and smartphones. 2. Connect a variety of devices at a single site such as an office or retail store. 3. Connect a variety of devices between two or more geographic locations. 4. Connect LANs, WANs, and other internets together.

1. PAN 2. LAN 3. MAN 4. Internets

According to the National Institute of Standards and Technology (NIST) there are four Cloud computing deployment models. Match the Cloud computing deployment model description to the correct Cloud deployment model term. 1. Cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers, e.g., business units). 2. The Cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. 3. The Cloud infrastructure is a composition of two or more distinct Cloud infrastructures that remain unique entities but are bound together by standardized or proprietary technology. 4. Cloud infrastructure for exclusive use by a specific community of consumers from organizations that have shared concerns (mission, security requirements, policy and compliance).

1. Private Cloud 2. Public cloud 3. Hybrid Cloud 4. Community Cloud

There are an increasing number of collaboration software programs that are used in business. Three popular collaboration software programs are Smartsheet, Slack, and Trello. Match the collaboration software program to the correct definition. 1. An online project management software solution. This software focuses on the collaborative aspects of project management. You can create web forms and sheets (similar to a spreadsheet). 2. A collaboration hub that aims to replace email and make communication seamless. This software is composed of channels where teams and members of the organization can communicate. 3. A collaboration tool that organizes projects into boards. This creates a visual representation of what's being worked on, who's doing the work, and where something is in a process.

1. Smartsheet 2. Slack 3. Trello

Match the the following terms associated with Internet Protocol (IP) addresses to the correct definition 1. IP address that are permanently assigned. 2. Four-decimal notation such as 182.124.7.9. This allows for approximately 4 billion IPv4 addresses. 3. Uses a format such as 2001:0db8:85a3:0000:0000:8a2e:0370:7334 and can accommodate at least 340 undecillion addresses. 4. Allows IP addresses to be translated in to recognizable words which are much easier to remember than a set of numbers.

1. Static IP address 2. IPv4 3. IPv6 4. Domain Name Systems (DNS)

Put In order to a new block to be added to the blockchain, four criteria must be met. Put the steps of adding a new block to the blockchain in the correct order. 1. Transaction verification 2. Transaction storage 3. A transaction must take place 4. Adding a hash

3. 1. 2. 4.

Put the steps of cellular communication (placing a call on a cellular network) in the correct order, starting with placing a call. Instructions 1. Once the call is received by the nearest tower it is relayed to a system/network of cell towers where it is then converted and received by the phone you were calling. 2. When the person on the other phone accepts the call and begins to speak, the person's voice is converted to an electrical signal that is sent back through the network. 3. Place the call. 4. Your phone converts your voice into an electrical signal that is transmitted via radio waves to the nearest cell tower.

3. 4. 1. 2.

Put these steps in the proper order to explain communication over the interenet. 1. IP (Internet Protocol) Address is added to the packet. 2. Look up IP address. Domain name system (DNS) are used to simplify the process. 3. Transmission Control Protocol (TCP). TCP is an Internet protocol that ensures delivery of packets. 4. Assemble the data packet. 5. Correct domain name is identified (e.g., www.amazon.com [http://www.amazon.com] ). A domain name is a unique name affiliated with an IP address. 6. Message is sent/shipped using a variety of different carriers (ISPs). Often messages "hop" or move from one network to another.

4. 5. 2. 1. 3. 6.

The next generation of mobile connectivity that will provide faster data transfer speeds and enhanced connection reliability. Is called _____ G. It is the fifth-generation wireless technology for digital cellular networks that began wide deployment in 2019.

5

Select the potential applications/benefits of 5G networks. More than one answer may be selected.

5G connectivity has the potential to create truly connected cities. 5G connectivity will greatly improve what businesses and individuals can do with connected devices. 5G networks may eventually allow for autonomous vehicles to safely interact with each other and their environment.

Select what's true about how 5G connectivity will support IoT. More than one answer may be selected.

5G connectivity will allow for lower latency. 5G connectivity will allow for greater data capacity. 5G connectivity will allow for faster connection speeds, greater data capacity, and lower latency.

Select all of the correct statements about Transmission Control Protocol/Internet Protocol.

A suite of communication protocols (standards/rules/guidelines) used to connect devices to the Internet Covers how software applications communicate across networks and how data packets are assembled and reassembled once they reach their destination Used as a private network communications protocol for private networks including intranets and extranets

Collaboration software is designed to enhance the productivity of teams, groups, and organizations. Select the correct statements about collaboration software.

Allows for the creation of a dedicated workspace where users can add data and workflows. Dedicated workspaces are viewable and editable (based on assigned privileges) by users regardless of their physical location Many of today's collaboration software programs are cloud-based, removing the need to users to have specific software download on a device.

Created in 2008, _____ remains the most widely traded and respected cryptocurrency. No one truly knows who created Bitcoin, but the creator of the cryptocurrency goes by the pseudonym Satoshi Nakamoto.

Bitcoin

Allowing people to share a digital ledger across a network of computers, ___ uses computer code to create concatenated (linked together) blocks of transactions.

Blockchain

Select the true statements about Content Delivery Networks (CDN).

CDNs provide more efficient delivery of Internet and Web content because the closer the CDN server is to the user geographically, the faster the content will be delivered. CDNs are geographically distributed network server groups that work together to deliver web pages and other web content to users. PoPs include various caching servers that assist in delivering content to website visitors within its operational proximity.

Also referred to as Cloud security, _____ services security includes policies, procedures, controls, and hardware that work together to ensure cloud-based systems are secure. Measures put into place to ensure the Cloud service is secure include data protection, regulatory compliance, customer privacy protection, and authentication rules for users and devices.

Cloud

Select what is true about computer networks. More than one answer may be selected.

Computer networks support many different software applications Networks range in size from small home networks to the Internet, which is the world's largest network A network is a group of two or more devices/computers connected together

Select all of the characteristics of that explain how the Internet works.

Data on the Internet is usually stored on specialized computers called servers. The connections points in the Internet are called nodes. Data is transferred from one network to another network through hardware called routers.

Cloud services security policies vary by Cloud provider, so it's important to research policies before signing a service level agreement (SLA). Some important questions to ask a vendor about Cloud services security include which of the following? More than one answer may be selected.

Does the vendor go through regular security audits? What type of disaster plans are in place?* Does the vendor have any specific security certifications?

Select the true statements about sending information on the Internet.

Each device connecting to the Internet or a network must have a network interface card (NIC) installed. Devices connect to the Internet or a network using network cables or wireless technologies. Modems and routers are connected to the Internet via an Internet Service Provider (ISP).

Common methods to connect a LAN to the Internet include which of the following?

Fiber optic cables Coaxial cables Ethernet cables

There are many benefits of Cloud computing. One benefit of cloud computing is _____ that allows for the access of data, files, and programs when you are off-site or at home via web-enabled devices.

Flexibility

Which of the following are examples of Software as a Service (Saas)? More than one answer may be selected.

Google apps Microsoft Office 365 Smartsheet

The name "Blockchain" refers to how data are stored using this technology. Blockchain stores transaction data in blocks. Each block in the blockchain contains a _____ that is a digital fingerprint or unique identifier that helps to create secure transactions.

Hash

Examples of Internet of Things (IoT) devices include which of the following? More than one answer may be selected.

Home Security Cameras Smart TVs Smart Speakers

Which of the following services are often provided by Platform as a Service (PaaS) vendors. More than one answer may be selected.

Hosting of hardware and software Provide mobile software development kits (SDKs) that assist in app development. Multi-language program development

Select the correct statements about Infrastructure as a Service (IaaS).

IaaS helps organizations avoid the cost of acquiring and managing their own physical servers and datacenter architecture. IaaS is an instant computing infrastructure composed of processing, data storage, and a variety of other computing resources provided by a cloud vendor.

Select what's true about Cloud computing in today's business environment. More than one answer may be selected.

In the United States, 96% of all organizations use the Cloud in one form or another. 93% of small businesses backup some portion of their data using a Cloud provider. 70% of global businesses backup some portion of their data using a Cloud service provider.

An instant computing infrastructure composed of processing, data storage, and a variety of other computing resources provided by a Cloud vendor to assist in running an organization's information systems is referred to as _____ as a Service.

Infrastructure

In the broadest sense, the _____ of Things refers to everything connected to the Internet. It allows billions of devices to be connected to the Internet and is increasingly being used to define objects connected to the Internet that talk to each other including sensors, wearable technology, and smartphones.

Internet or Internets

What are two characteristics of cryptocurrency?

It has a fluctuating price. It is not portable.

What are the characteristics of cryptocurrency?

Its value depends largely on the supply and demand for it. It is not issued by a central bank. It is not backed by any assets.

According to the National Institute of Standards and Technology (NIST) which of the following are characteristics of Cloud computing? More than one answer may be selected.

On-demand self-service Broad network access Resource pooling

According to the National Institute of Standards and Technology (NIST) there are four Cloud computing deployment models. _____ Cloud is a Cloud deployment model where Cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers, e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and may exist on or off premises.

Private

The number that is assigned to all information technology devices (routers, modems, etc.) which identifies the device and allows the device the ability to communicate with each other on a computer network, including the Internet is called an Internet _____ address

Protocol, protocol, or IP

A Cloud-based service offered by vendors and hosted on a vendor's cloud that allows users to access a software application using a web browser and Internet connection is referred to as Software as a _____.

Service

A collaboration hub that aims to replace email and make communication seamless, _____ is composed of channels where teams and members of the organization can communicate.

Slack

There are a number of Cloud service vendors that provide a variety of Cloud services. Generally, Cloud computing services are classified in three ways: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and _____ as a Service (SaaS).

Software

Virtual Private Networks (VPNs) are commonly used by organizations to securely send communications. Select the correct statements about VPNs.

Used by organizations whose employees need access to a company network remotely. A VPN creates a secure connection between two computers. VPN software authenticates the users and establishes a secure connection.

A type of network that creates a secure connection between two computers is a _____ private network that allows for encrypted communications using the Internet for data transmission and communication.

Virtual

Which of the following are correct statements about web services? More than one answer may be selected.

Web services are a set of software technologies that are able to exchange information with each other using standardized web communication protocols and languages. Web services allow for the exchange of information between two systems and are not tied to any one operating system or programming language. Web services can be used to create apps that link different systems of different organizations and to build open-standard based web applications.

Which of the following are considered a basic type of computer network? You may select more than one.

Wide area network (WAN) Local area network (LAN) Personal area network (PAN)

Which of the following functions are provided by an Internet Service Provider (ISP)? More than one answer may be selected.

Your ISP pays for access to the Internet Provide access or a gateway to the resources on the Internet Provide an Internet Protocol (IP) address

Serving as the technology behind cryptocurrencies such as Bitcoin, _____ provides a level playing field for all users.

blockchain

Software and technologies that uses computer code that creates concatenated (linked together) blocks of transactions _____ allows people to share a digital ledger across a network of computers. There is no need for a central source of control because no single entity has the ability to tamper with the records.

blockchain

A computing model where processing, storage, software, applications, and a variety of services are provided over a network, mainly access via the Internet is called _____ computing.

cloud

Designed to enhance the productivity of teams, groups, and organizations. _____ software allows for the creation of a dedicated workspace where users can add data and workflows.

collaboration

Using collaboration software people from across the organization, regardless of their physical location, people can share content in real-time including documents, spreadsheets, videos, and messages. This leads to better _____, which is one of the benefits of using collaboration software.

collaboration

Large and small businesses find they can _____ their reliance on internal IT infrastructure and reduce cost by utilizing Cloud-based technologies.

decrease, reduce, lessen, or lower

While there are many benefits of Cloud computing, there are also some disadvantages. One of the disadvantages is _____ . This can occur because of maintenance, system/mechanical failure, natural disasters, and outside intrusions/attacks.

downtime

In order to connect to the Internet and other computers on a network, each device must have a network _____ card (NIC) installed.

interface

Web services are a set of software technologies that are able to exchange information with each other using standardized web communication protocols and languages. One of the technologies on which web services are based is XML. XML stands for Extensible _____ Language.

markup or markups

A group of two or more devices/computers connected together to allow for the exchange of information and for the sharing of resources is call a _____.

network

A Cloud-based computing model where Cloud service providers offer hardware and software tools need for application/software development via the Internet is called _____ as a Service. These vendors host the hardware and software needed for development on their own infrastructure that removes the need for developers to install this on their own devices.

platform


Kaugnay na mga set ng pag-aaral

Social Studies, Chapter 8(Creating the Constitution), 9(The Constitution: A More Perfect Union, 10(The Bill of Rights)

View Set

Alternators and generator General text book

View Set

Chapter 1: The Rule of Law - Law in a Changing Communication Environment

View Set