AP COMP SCI P - Unit 2 Assessment

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following situations is most likely to cause issues arising from the digital divide? A. A state makes voter registration forms available only by visiting a government website B. Two internet-connected devices located in different countries and thousands of miles apart attempt to communicate with one another C. Packets sent from one router to another begin arriving in a different order than they were sent D. A smartphone attempts to communicate over the Internet with another type of device, like a tablet or laptop

A. A state makes voter registration forms available only by visiting a government website

Jesse purchases a new smartphone and is immediately able to use it to send a photo over the Internet to a friend who lives in a different country. Which of the following is NOT necessary to make this possible? A. Both devices are using the same shared and open protocols B. A single direct connection is established between any two devices connected to the Internet C. The data of the image is routed through a sequence of directly connected devices before arriving at its destination. D. Both devices are directly connected to at least one part of the Internet

B. A single direct connection is established between any two devices connected to the Internet

Computing network

a group of connected computers that can send or receive data

Internet Protocol (IP)

rules for addressing and sending data across the internet by assigning unique numbers to each connected device

User Datagram Protocol (UDP)

sends all packets w/out checking whether they were received or ordered properly

Transmission Control Protocol (TCP)

takes inventory of all packets in the data stream to ensure they are successfully sent and received

Which of the following is a primary benefit of making a computing system fault-tolerant? A If one component of the system fails, users of the system can often still access it. B If one component of the system is hacked, no information will be stolen. C If the system becomes too expensive, making it fault-tolerant will save money. D If the system cannot operate efficiently, making it fault-tolerant will speed up its operation.

A. If one component of the system fails, users of the system can often still access it.

Which of the following best describes the purpose of an IP address? A. IP addresses provide a unique number for identifying devices that send and receive information on the Internet B. IP addresses assist in the reconstruction of a message that has been divided into many packets C. IP addresses indicate the location where an internet-connected computing device was manufactured D. IP addresses indicate how many times an individual packet has been requested by a router

A. IP addresses provide a unique number for identifying devices that send and receive information on the Internet

Which of the following Internet protocols is MOST important in reassembling packets and requesting missing packets to form complete messages? A. Transmission Control Protocol (TCP) B. Internet Protocol (IP) C. User Datagram Protocol (UDP) D. HyperText Transfer Protocol (HTTP)

A. Transmission Control Protocol (TCP)

Two devices are connected to the Internet and communicating with one another. A squirrel chews through one of the wires in the network that is currently being used by the devices to communicate. The network immediately begins using a different path through the network and communication continues as normal. This situation best exemplifies which principle? A. fault-tolerance B. scalability C. protocol D. pathing

A. fault-tolerance

Which of the following best explains how fault tolerance in a network is achieved? A By providing high-bandwidth connections between devices, enabling data packets to be transmitted as quickly as possible B By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component C By providing open network protocols, ensuring that all devices on the network are interacting in a standard way D By providing software to monitor all network traffic, ensuring that data packets are sent and received in the proper order

B. By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component

Which of the following actions is most likely to help reduce the digital divide? A Adding a requirement that all users of a popular social media site link their accounts with a phone number. B Deploying satellites and other infrastructure to provide inexpensive Internet access to remote areas of Earth C Digitizing millions of books from university libraries, making their full text available online D Offering improved Internet connections to Internet users who are willing to pay a premium fee for more bandwidth

B. Deploying satellites and other infrastructure to provide inexpensive Internet access to remote areas of Earth

Which of the following is true of how packets are sent through the Internet? A. Packet metadata is only included on important packets to indicate they should get access to faster paths through the network B. Packet metadata is used to route and reassemble information traveling through the Internet C. Information sent through the internet is only encapsulated in packets if the message is too large to be sent as a datastream D. Information sent through the internet is split into two packets, one which contains the message and another which contains the metadata

B. Packet metadata is used to route and reassemble information traveling through the Internet

Which of the following is MOST likely to be an outcome of the digital divide? A. Certain companies will be unable to certify their technology as digitally secure. B. People from some racial or ethnic groups have unequal access to computing technology. C. People will have equal access and influence both globally and locally. D. Political groups in some countries are unable to agree on regulations of digital technology.

B. People from some racial or ethnic groups have unequal access to computing technology.

Which of the following best explains how the Internet is a fault-tolerant system? A The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace. B The Internet is fault-tolerant because there are usually multiple paths between devices, allowing messages to sometimes be sent even when parts of the network fail. C The Internet is fault-tolerant because users can transmit messages using a variety of different protocols, allowing them to use devices from any manufacturer. D The Internet is fault-tolerant because users usually understand and accept the fact that servers sometimes fail, allowing network engineers to repair faulty devices as quickly as possible.

B. The Internet is fault-tolerant because there are usually multiple paths between devices, allowing messages to sometimes be sent even when parts of the network fail

Which of the following best explains how messages are typically transmitted over the Internet? A The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient's device. B The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device. C The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient's device. D The message is transmitted as a single file and received as a whole by the recipient's device.

B. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.

Which of the following actions is most likely to be effective in reducing the digital divide at a local level? A Creating an application that offers coupons and discounts for local businesses B Offering a discount to utility customers who pay their bills online instead of by mail C Providing free community access to computers at schools, libraries, and community centers D Requiring applicants for local government jobs to complete an online application

C. Providing free community access to computers at schools, libraries, and community centers

An Internet Service Provider (ISP) is a company that builds routers and wired connections that allow individuals to access the Internet. An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the company would choose to do so? A. It costs less to design a network that is redundant B. The protocols of the Internet only work on networks that are redundant C. Redundant networks are more reliable D. Adding additional connections reduces the fault-tolerance of the network

C. Redundant networks are more reliable

Which of the following is LEAST likely to be a contributing factor to the digital divide? A Some individuals and groups are economically disadvantaged and cannot afford computing devices or Internet connectivity. B Some individuals and groups do not have the necessary experience or education to use computing devices or the Internet effectively. C Some parents prefer to limit the amount of time their children spend using computing devices or the Internet. D Some residents in remote regions of the world do not have access to the infrastructure necessary to support reliable Internet connectivity.

C. Some parents prefer to limit the amount of time their children spend using computing devices or the Internet.

Which of the following best describes the relationship between the World Wide Web and the Internet? A The World Wide Web is a protocol that is accessed using a data stream called the Internet. B The World Wide Web is a system of linked pages, programs, and files that is accessed using a data stream called the Internet. C The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet. D The World Wide Web is a Web site that is accessed using a protocol called the Internet.

C. The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.

Which of the following is true of how the Internet has responded to the increasing number of devices now using the network? A. The Internet protocols are changed every year to adapt to the new devices that have been connected to the network B. While the number of devices connected to the Internet has grown, the network itself has not grown C. The protocols of the Internet were designed to scale as new devices are added D. The protocols of the Internet are no longer necessary thanks to the large number of devices now connected to the network

C. The protocols of the Internet were designed to scale as new devices are added

Which of the following Internet protocols is used to request and send pages and files on the World Wide Web? A. Transmission Control Protocol (TCP) B. Internet Protocol (IP) C. User Datagram Protocol (UDP) D. HyperText Transfer Protocol (HTTP)

D. HyperText Transfer Protocol (HTTP)

Which of the following is a primary reason for the use of open protocols on the Internet? A Open protocols allow devices to specify how data packets are to be routed on the Internet in advance. B Open protocols ensure that all data transmission on the Internet is kept secure. C Open protocols ensure that all Internet users are provided connections with equal bandwidth. D Open protocols provide a way to standardize data transmission between different devices.

D. Open protocols provide a way to standardize data transmission between different devices.

Emilee is watching an online video. The video is being sent to her laptop by a server over the Internet which splits the video into packets and sends them in the order they appear in the video. Which of the following is true about how the packets will arrive at her computer? A. The packets will always be received in the order that they were sent B. Either every packet will reach her computer or none of them will. C. Packets that arrive out of order will be sent back to the server. D. The packets may arrive out of order

D. The packets may arrive out of order

Which of the following best describes the protocols used on the Internet? A. The protocols of the Internet are designed by government agencies to ensure they remain free to use B. The protocols of the Internet are secret to maintain the privacy and security of ppl using them C. Each device connected to the Internet will use a protocol designed by the company that manufactured it D. The protocols of the Internet are open and used by all devices connected to the network

D. The protocols of the Internet are open and used by all devices connected to the network

Computing device

a machine that can run a program

Path

a sequence of direct connections

Datastream

the way in which information travels on the internet, not as a single piece but in chunks

Packet

chunk of data and its metadata, used to route and reassemble information on the internet

Computing system

a group of computers working together for a common purpose


संबंधित स्टडी सेट्स

Chapter 14, 15, 16 MacroEconomics

View Set

Software Methodologies Chapter 4

View Set

Psych 101 (Intro to Psych) Ch. 3 Developing through the Life Span

View Set

Chapter 3: Customer Expectations of Service

View Set

Macro Econ 117 - Exam 1 (Chpt 3 4 5)

View Set

EXAM QUESTION how to answer exam questions YED how to calculate PES

View Set

B 1.3 Cost Measurement Methods and Techniques

View Set

pediatric success chapter 7 hematological 2nd edition

View Set