Quiz 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

During which phase of the development of the Internet was ARPANET invented? a. Innovation phase b. Consolidation phase c. Institutional phase d. Commercialization phase

C

What protocol is used to send mail to a server?

Internet Message Access Protocol

________ refers to delays in messages caused by the uneven flow of information packets through the network. a) cross-platform b) intranet c) Latency d) tracert

Latency

The Internet Layer of TCP/IP is responsible for what?

Providing communication with the application by acknowledging and sequencing application

T/F FTP is a protocol used to transfer files to and from a server. A) True B) False

a

T/F The major hubs in the United States where the Internet backbone intersects with regional and local networks are now commonly referred to as Internet Exchange Points (IXPs). A) True B) False

a

The United States federal government has historically not been in favor of the development and export of strong encryption systems (T/F) A) True B) False

a

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software (T/F) A) True B) False

a

The major technologies used with wireless local area networks are: A) Wi-Fi and Bluetooth. B) Wi-Fi and WiMax. C) Bluetooth and 3G. D) WiMax and 3G

a

The use of a digital signature helps to ensure integrity, authenticity, and nonrepudiation (T/F) A) True B) False

a

Typically, the more security measures added to a Web site, the slower and more difficult it becomes to use (T/F) A) True B) False

a

Which of the following is a Web 2.0 service or application? A) wikis B) e-mail C) IM D) online forums

a

Which of the following is currently the most popular Web browser? A) Internet Explorer B) Netscape C) Chrome D) Firefox

a

Which of the following is not true about the mobile platform? A) Most smartphones use Microsoft's operating system, Windows Mobile. B) The number of cell phones worldwide exceeds the number of PCs. C) About a third of the world's cell phones are smartphones. D) Unlike PCs, smartphones do not need fans. labore

a

Which of the following statements about fiber-optic cable is not true? A) It consists of twelve or sixteen strands of glass. B) It is thinner and lighter than coaxial or twisted pair cable. C) It enables better data security than coaxial cable. D) Telecommunications firms have made substantial investments in cross-country fiber optic systems in the last decade.

a

________ is a utility program that allows you to check the connection between your client and a TCP/IP network. A) Ping B) Telnet C) Tracert D) Finger

a

________ is a utility program that allows you to check the connection between your client and a TCP/IP network. A) Ping B) Telnet C) Tracert D) Finger

a

A small application that you embed in a Web page in order to include content and functionality from a different Web site is called a(n) ________. a) gadget b) widget c) wiki d) html

b

All of the following are factors in contributing to the increase in cybercrime except : A) the ability to remotely access the Internet. B) the Internet's similarity to telephone networks. C) the ability to anonymously access the Internet. D) the Internet is an open, vulnerable design

b

All of the following are factors in contributing to the increase in cybercrime except: A) the ability to remotely access the Internet. B) the Internet's similarity to telephone networks. C) the ability to anonymously access the Internet. D) the Internet is an open, vulnerable design

b

Commoditylike products are the very best of all to use when dealing with the B2C e-commerce segment (T/F) A) True B) False

b

Credit cards are the dominant form of online payment throughout the world (T/F) A) True B) False

b

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties (T/F) A) True B) False

b

Outside of e-mail, using a(n) ________ is the most common online daily activity. a) social media b) search engine c) work d) research

b

TLS does not guarantee server-side authentication (T/F) A) True B) False

b

The B2C segment is where the dollar volume of e-commerce has always been widely expected to be concentrated (T/F) A) True B) False

b

The addresses used by browsers to identify the location of content on the Web are called: A) domain names. B) uniform resource locators. C) IP addresses. D) file paths

b

The first Web browser to make it possible to view documents on the Web with colored background, images, and animations was: A) Netscape Navigator. B) Mosaic. C) Mozilla. D) Internet Explorer

b

The model of computing in which firms and individuals obtain computing power and software over the Internet is called ________ computing. A) fiber optics b) client/server networking c) Wi-Fi d) IPv6

b

Which of the following is a Web application that enables Internet users to communicate with each other, although not in real time? A) online chat B) online forum C) IM D) VoIP

b

Which of the following is a high-speed, medium-range, broadband wireless metropolitan area network? A) Wi-Fi B) WiMAX C) Bluetooth D) ZigBee

b

Which of the following is not one of the basic technological foundations of the Internet? A) client/server computing B) Tracert C) TCP/IP communications protocol D) packet-switching hardware

b

________ is one of the original Internet services and is used to transfer files from a server computer to a client computer and vice versa. A) SMTP B) FTP C) HTTP D) SS

b

Phishing attacks rely on browser parasites (T/F) A) True B) False

b

A(n) ________ is an audio presentation stored as an audio file and posted to the Web for users to download A) podcast B) RSS subscription C) weblog D) widget

A

The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication is called the: a) Middleware b) Network technology substrate c) Transport services and representation standards layer d) Applications layer

A

All of the following are true about iPhone apps except: A) They are distributed through Apple's App Store. B) They are cross-platform, open-source applications. C) They were estimated to generate over $1 billion in 2013. D) Apple's goal of offering apps is to increase retail sales of iPhones, iPads, and iPods.

B

The backbone of the Internet is formed by: a)the Network Access Points (NAPs) b) the Network Service Providers (NSPs) c) the Internet Service Providers (ISPs) d) the Metropolitan Area Exchanges (MAEs)

B

Where does TSL operate within TCP/IP? A) between the Internet Layer and the Transport Layer B) between the Transport Layer and the Application Layer C) between the Network Interface Layer and the Transport Layer D) between the Internet Layer and the Application Layer

B

Local area networks that operate within a single organization that leases access to the Web directly from regional and national carriers are called: a) Internet Service Providers (ISPs) b) extranets c) campus networks d) Metropolitan Area Exchanges (MAEs

C

The natural language convention used to represent IP addresses is called the: A) uniform resource locator system. B) Internet protocol addressing schema. C) domain name system. D) assigned numbers and names (ANN) system

C

Which of the following occurred during the Commercialization phase of Internet development? A) The fundamental building blocks of the Internet were realized in actual hardware and software. B) Large mainframes on different college campuses were linked. C) The Domain Name System was introduced. D) NSF privatized the operation of the Internet's backbone

D

T/F One of the advantages of client/server computer over centralized mainframe computing is that each client added to the network increases the network's overall capacity and transmission speeds

F

T/F HTML is the Internet protocol used to transfer Web pages.

False

T/F IPv6 provides for 64-bit IP addresses.

False

T/F Packet switching requires a dedicated circuit.

False

T/F Transmission Control Protocol is the protocol that provides the Internet addressing scheme.

False

T/F WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access.

False

T/F Google Apps is an example of cloud computing.

True

T/F Internet access providers typically provide faster download speeds than upload speeds to consumers.

True

T/F One of Internet2's projects is a nationwide 100 gigabit-per-second network.

True

T/F One of the advantages of client/server computer over centralized mainframe computing is that there is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down

True

T/F RSS is an XML format that allows users to have digital content automatically sent to their computers over the Internet

True

T/F T1 and T3 refer to international telephone standards for digital communication. aliquyam

True

T/F Tablet computers rely on the Internet cloud for processing and storage.

True

A Trojan horse appears to be benign, but then does something other than expected (T/F) A) True B) False

a

A worm does not need to be activated by a user in order for it to replicate itself (T/F) A) True B) False

a

A(n) ________ is a Web application that allows users to easily add and edit content on a Web page. A) wiki B) podcast C) blog D) RSS feed

a

Akamai offers all of the following services except: A) instant messaging. B) targeted advertising. C) security services. D) global traffic management

a

Also known as the Industrial Internet, the ________ describes the use of Internet technologies and networking to enable the multitudes of nontraditional devices that are equipped with data-generating sensors to connect to the Internet. a) internet of things b) layers c) extranet d) intranet

a

An iPad is an example of a(n) ________ computer. a) tablet b) laptop c) server d) hand-held

a

Drive-by downloads are now the most common method of infecting computers (T/F) A) True B) False

a

In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution (T/F) A) True B) False

a

In the address http://www.company.com/clients.html, which of the following is the top-level domain? a) .com b) http:// c) www. d) .html

a

Insiders present a greater security threat to e-commerce sites than outsiders (T/F) A) True B) False

a

Siri is a type of: A) intelligent personal assistant. B) widget. C) gadget. D) social network

a

Smishing attacks exploit SMS messages (T/F) A) True B) False

a

A(n) ________ is a personal Web page of chronological entries created by an individual or corporation to communicate with readers. a) news feed b) podcast c) blog d) wiki

blog

A set of rules for transferring data is called a(n) ________. a) VoIP b) IM c) protocol d) latency

c

An IPv4 address is expressed as a: a) letter b) whole number c) decimal d) fraction

c

Computing devices attached to the Internet that are capable of making HTTP requests and displaying HTML pages are referred to as ________. a) internet server b) ad server c) Web Client d) Web Server

c

During which period of time did the Institutionalization phase of Internet development take place? A) 1950-1960 B) 1961-1974 C) 1975-1995 D) 1995-through the present

c

TCP/IP is divided into four separate ________, each handling a different aspect of the communication problem a) campus network b) intranet c) layers d) extranet

c

TCP/IP operates in which layer of Internet architecture? A) Network Technology Substrate layer B) Middleware Services layer C) Transport Services and Representation Standards layer D) Applications layer

c

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called: A) routing. B) the Transmission Control Protocol. C) packet switching. D) the File Transfer Protocol.

c

What allows users to communicate visually and aurally in real-time, and uses high-resolution monitors to simulate the presence of participants? a) cloud computing b) W3C c) telepresence d) internet

c

Which of the following is the core communications protocol for the Internet? A) Telnet B) FTP C) TCP/IP D) SSL

c

Which of the following organizations coordinates the Internet's systems of unique identifiers, such as IP addresses and top-level domain systems? A) IETF B) IAB C) W3C D) ICANN

c

A TCP/IP network located within a single organization for the purposes of communication and information processing is called a(n) a) an extranet b) a campus network c) a middleware service d) an intranet

d

All of the following are characteristics of HTML5 except: A) a video element that replaces plug-ins such as Flash, QuickTime, and RealPlayer. B) use of CSS3. C) ability to access built-in functionality of mobile devices, such as GPS and swiping. D) support for digital rights management.

d

An Internet-enabled media player would run in which layer of Internet architecture? A) Network Technology Substrate layer B) Middleware Services layer C) Transport Services and Representation Standards layer D) Applications layer

d

During which phase of the development of the Internet was ARPANET invented? a) consolidation phase b) invention phase c) reinvention phase d) institutional phase

d

Specialized computers that interconnect the thousands of computers that make up the Internet in order to transmit message parcels along available communication paths and on to their destinations are called ________. a) intranets b) web servers c) root servers d) routers

d

The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices A) Internet Engineering Steering Group (IESG) B) World Wide Web Consortium (W3C) C) Internet Engineering Task Force (IETF) D) Internet Society (ISOC)

d

The concept behind document formatting had its roots in which of the following? A) XML B) SGML C) HTML D) GML

d

The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called: A) online chat B) online forum C) IM D) VoIP

d

What technology has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture? A) fiber optics B) Wi-Fi C) IPv6 D) client/server networking

d

When talking about the physical elements of the Internet, the term redundancy refers to: a) the amount of data that can be transferred over a communication medium b) the use of high-speed switching computers to connect the backbone to regional and local networks c) delays in messages caused by the uneven flow of information through the network d) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs

d

Which is not a limitation of the current Internet? A) the continued reliance on cables/wires for connectivity B) limited bandwidth, causing congestion and cannot adequately handle video and voice traffic C) architectural restrictions, stipulating that numerous requests for the same file must each be answered individually; slows network performance D) the difficulty in expanding capacity by adding servers and clients

d

You could expect to find all of the following services in a Web server software package except: A) security services. B) FTP. C) data capture. D) an RSS aggregator.

d

________ are central directories that list all domain names currently in use for specific domains a) tracert b) Latency c) routers d) root servers

d

________ is a model of computing in which firms and individuals obtain computing power and software applications over the Internet, rather than purchasing and installing it on their own computers. A) Client/server computing B) P2P computing C) Mobile computing D) Cloud computing

d

________ is a unique virtual laboratory for exploring future internets at scale, to promote innovations in network science and technologies. A) Internet of Things B) Internet2 C) ARPANET D) GENI

d

________ is a way of formatting pages with embedded links that connect documents to one another and that also link pages to other objects. a) html b) xml c) Hyperlink d) Hypertext

d

T/F XML is used to format the structure and style of a Web page

false

Which source of e-commerce revenues has grown from nearly zero prior to 2007 to over $38 billion in 2013? a) mobile retail purchases b) online purchases c) in-store purchases d) impulse buy

mobile retail purchases

T/F Every device connecting to the Internet must have a unique address.

true

T/F One of the advantages of client/server computer over centralized mainframe computing is that client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer

true

T/F One of the advantages of client/server computer over centralized mainframe computing is that it is easy to expand capacity by adding servers and clients

true

________ software refers to the software that enables a computer to deliver Web pages written in HTML to client computers on a network that request this service by sending an HTTP request. a) client/server computing b) database server c) ad server d) web server

web server


Ensembles d'études connexes

Comp 1010 Programming 1: C variables, data types

View Set

Physical Design (Low-Fi Prototypes)

View Set

PPR Competencies: Domain I (001)

View Set

ch24: International and Space Law

View Set