AP Computer Science Ch. 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following statements is true regarding the networks that make up the Internet?

-All devices that are connected to a network use the same protocols. -Different types of networks can be connected in order to transfer data and communicate.

What is a digital certificate?

-Is an attachment to an electronic message used for security purposes. -Used to verify that a user sending a message is who he or she claims to be. and to provide the receiver with the means to encode a reply.

Which of the following statements are TRUE of the Internet? Select TWO ANSWERS.

-Most network routing on the Internet is hierarchical. -Most data can follow more than one path to the destination device.

Which of the following statements about redundancy on the Internet are TRUE? Select TWO answers.

-Redundancy has good qualities; many devices can be added to the network without affecting traffic. -Redundancy has good qualities; if several routers fail, data can still be transferred.

Which of the following do HTTPS and SSL procedures ensure? Select TWO ANSWERS.

-That the identity of the server involved in an interaction can be trusted. -That messages being sent are encrypted and thus secure.

Choose the two statements that best describe the relationship between HTTP and the World Wide Web.

-The World Wide Web is a collection of pages and files that is shared between computers using HTTP. -HTTP and the World Wide Web both rely on other layers of protocols for sending information on the Internet

Each packet being routed around the internet contains header information about the packet itself, and it also contains part of the file being transferred. Imagine you are sending an image of a basketball player from computer A to computer B across the Internet. Of the following, which information would be contained in each packet's header? Select TWO.

-The sequence number of the packet in relation to all other packets of the image. -The IP address of the destination computer.

How are protocols like HTTP, TCP, and IP created?

A worldwide group of volunteers draft revise, and publish protocols.

Which of the following best explains what happens when a new device is connected to the Internet?

An Internet Protocol (IP) address is assigned to the device.

Which entity issues digital certificates ?

Certification Authorities (CA) that fulfill the role of a Trusted Third Party (TPP) to do the following: accept certificate applications, authenticate applications, issue certificates and maintain the status about certificates already issued.

TCP/IP does all of the below EXCEPT:

Choose the path needed (which routers) to move a message from point A to point B.

Which of the following best describes the relationship between the World Wide Web and the Internet?

Domain names have set structure, making them easy to organize and manage.

Which of the following best describes the basic idea of fault tolerance?

If part of the system fails, the operation continues without interruption.

Which of the following statements about packets is FALSE?

It does not contain information about the sender's IP address.

Which of the following is the best description of the term Internet censorship ?

It is the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative. Individuals and organizations may engage in self-censorship for moral, religious, or business reasons, to conform to societal norms, due to intimidation, or out of fear of legal or other consequences

Which of the following is the best description of the term Digital Divide?

It is the growing gap between the underprivileged members of society, especially the poor, rural, elderly, and handicapped portion of the population who do not have access to computers or the internet; and the wealthy, middle-class, and young Americans living in urban and suburban areas who have access.

Which of the following is the best description of the term Net Neutrality?

It is the principle that Internet service providers (ISPs) must treat all Internet communications equally, and not discriminate or charge differently based on user, content, website, platform, application, type of equipment, source address, destination address, or method of communication.

Why is the Domain Name System useful?

It names are easier for people to remember than the IP addresses of frequently visited websites.

What is the primary reason that routing on the internet is redundant?

Networks are still available in case of a path rоuter failure.

Which of the following statements about packets is TRUE?

None of these Statements are true.

Which of the following is a primary reason for the use of open protocols on the Internet?

Open protocols provide a way to standardize data transmission between different devices.

Desktop computers, laptops, tablets, smartphones, and other devices are made by different companies, yet they are all able to access the Internet. This has led to the widespread use of the Internet from many different kinds of devices. Which of the following makes this possible?

Open standards and protocols

Which of the following refers to chunks of data and their metadata, used to route and reassemble information on the Internet ?

Packets

A new device is given as IP address and added to a network so that it can access the Internet. Large amounts of files are uploaded and downloaded on this new device, but other users who were already online do not experience any difference in performance. Which of the following enables this phenomenon?

Redundant routers

The _____________ takes inventory of all packets in the datastream to ensure they are successfully sent and received.

TCP

Which of the following best explains how messages are typically transmitted over the Internet?

The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.

Which of the following statements is an accurate interpretation of bandwidth speed?

The rate at which data is downloaded in a set amount of time.

Which of the following statements about TCP/IP is FALSE?

They are the only protocols necessary to send and receive information over the Internet.

Which of the following terms can be described as sending all packets without checking whether they were received or ordered properly?

UDP

Which of the following is an example of a subdomain of college.org to the domain name system (DNS)?

contact.college.org

Which of the following statements about security in the network is true? I. Computers A and D need to communicate with at least two additional computers in the network in order to communicate with each other. II. Computers B and C can communicate with each other without additional computers being aware of the communication.

|| Only


संबंधित स्टडी सेट्स

LIFESPAN FINAL study guide part 3 (chap 5-6)

View Set

Level 2 Unit 1 (Weeks 3&4) - ¿Qué hacer en la ciudad? / Los lugares

View Set

A&P Chapter 12: Lymphatic System

View Set

SFHN questions course point review questions

View Set