Unit 11 quiz for AP COMP SCI
Which of the following are true statements about digital certificates in Web browsers? I. Digital certificates are used to verify the ownership of encrypted keys used in secure communication. II. Digital certificates are used to verify that the connection to a Web site is fault tolerant.
1 only
Suppose we used an Internet Addressing protocol that used 4 bits to encode a single address. How many devices would be supported on the Internet? How many unique addresses would there be?
16
An IPv4 address has 32 bits, so there are 232 (over 4 billion) possible IPv4 addresses. Since the Internet is gaining devices quickly, we will soon surpass 232 unique devices on the Internet. In anticipation of all the new Internet devices, we are in the process of switching to IPv6, which uses 128 bits for a single address. That's 96 extra bits to represent one address! Which of the following statements correctly describes how many more addresses will be possible to represent by switching from IPv4 to IPv6?
2^96 times as many addresses can be represented with IPv6
What is a DNS spoofing attack?
A hacker overwrites the data for a given domain name in a DNS server, causing the IP for that domain to point to the hacker's website rather than the intended website.
What information is contained in a packet?
A small part of a digital message, and metadata about the message, including where it came from and where it is going
Which of the following lists the types of copyright license from most restrictive to least restrictive?
All Rights Reserved, Some Rights Reserved, Public Domain
Which of the following actions will help you avoid violation of copyright laws?
Always cite sources Check the copyright to make sure it can be used by others without permission Use public domain media All of these answers
Which of the following best explains what happens when a new device is connected to the Internet?
An Internet Protocol (IP) address is assigned to the device.
What is a Distributed Denial of Service (DDoS) attack?
An attempt to deny access to a website by flooding the website's servers with millions of requests from different computers
Which of the following is LEAST likely to indicate a phishing attack?
An email from your bank asks you to call the number on your card to verify a transaction.
How is the bandwidth of a network measured?
Bitrate. Higher bitrate means higher bandwidth.
Everyone in the world has internet access.
False
(image question) Each box represents a device connected to the network, each line represents a direct connection between two devices. Which of the following statements are true about this network: I - The network is fault tolerant. If one connection fails, any two devices can still communicate.II - Computers C and E need to first communicate with at least one other device in order to communicate with each other.
I only
Which of the following statements are true about the Internet? I - The Internet connects devices and networks all over the world II - The Internet helps people collaborate to solve problems III - The Internet helps people communicate IV - There are no negative consequences of the Internet, it is purely positive
I, II, and III
Which of the following are true about Internet routing? I - For any two points on the Internet, there exists only one path between the two pointsII - Routing on the Internet is fault tolerant and redundant
II only
Which is true of sequential computing?
It can be easier to locate errors in programs using this processing method.
Which of the following activities poses the greatest personal cybersecurity risk?
Purchasing a couch by emailing a credit card number to the couch owner
A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following actions is LEAST likely to be effective in this purpose?
Putting helpful tips for operating computers on the city government website
What is the fourth step of viewing a web page as described in the video?
Rendering the Page: Your browser takes the resource and renders it in the browser window
Which of the following is considered an unethical use of computer resources?
Searching online for the answers to CodeHS exercises and quizzes
What is the second step of viewing a web page as described in the video?
The Request: The browser sends a message to a server requesting a resource
What is the third step of viewing a web page as described in the video?
The Response: The server sends a response to the browser with the resource attached
What is the first step of viewing a web page as described in the video?
The URL: You type the URL for the web page into your browser
Which of the following is a benefit of the fault-tolerant nature of Internet routing?
The ability to provide data transmission even when some connections between routers have failed
What is the bitrate of a system?
The amount of data (in bits) that can be sent in a fixed amount of time
Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes whether these two computers can communicate with each other across the Internet?
The computers can communicate directly because Internet communication uses standard protocols that are used by all computers on the Internet.
A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent back to the user?
The file is broken into packets and sent over a network. The packets must be reassembled by the user's computer when they are received. If any packets are missing, the browser re-requests the missing packets.
What is the latency of a system?
The time it takes for a bit to travel from sender to receiver
Which of the following would pose the greatest threat to a user's personal privacy if it were to be leaked to the public?
The user's browser cookies
Which is true of parallel computing?
There are multiple processors running at the same time
What is the purpose of the Digital Millennium Copyright Act?
To criminalize the act of circumventing, or getting around, access controls that block access to copyrighted works.
What is the function of the Domain Name System (DNS)?
To translate domain names into IP addresses
What does URL stand for?
Uniform Resource Locator
Which of the following is a benefit that online shopping websites provide over brick and mortar stores?
Users can easily see product reviews and determine if an item has been satisfactory for a large number of people
According to the Domain Name System (DNS), which of the following is a subdomain of the domain example.com?
about.example.com
According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?
about.example.com