APCSP 6
Packet switching is the method by which information is transmitted through routers on the internet. Data is split into packets which may be sent by multiple different routes to the destinations. The diagram below represents a series of routers through which packets can be sent.
A to B to F to G to H
Which of the following best describes how a web browser and a web server interact with each other?
A web browser is a client application that is run on a user's computer that requests information from the web server that hosts all the files you are requesting.
The Internet has brought forth widespread access to information all around the world. Which of the following has been made easier because of this access?
All of these
Which of the following must be assigned to every device which is connected to the Internet?
An IP address
Andre and Gaby are sending each other messages via the internet and use Andre's public key to encrypt each message. No other encryption is used. What is the most likely scenario?
Andre will be the only person who has access to the message and can read it.
Which of the following terms describes a computer or a software application that requests services from a server on the Internet?
Client
Which of the following is NOT a benefit of cloud computing?
Cloud data cannot be subpoenaed by law enforcement.
Which of the following statements about security in the network is not true?
Computers A and F cannot communicate without computer B being aware.
When a message is sent across the internet using the TCP/IP protocol it is sent using network packets. Which of the following does each network packet contain? Select two answers.
Control information for routing the data A small portion of the message
Which of the following is the most important security factor to consider when using e-commerce services?
Does the website provide secure transactions?
Which of the following is statements about distributed computing is false?
Each computer in a distributed computing system has an unlimited, complete view of the system in order to perform the necessary tasks.
A major connection in a network is damaged so that information can no longer be sent through the connection. If full communication on the network was able to continue, which of the following characteristics would the network be said to have?
Fault-tolerant (or redundant) routing
The IETF (Internet Engineering Task Force) is responsible for developing and overseeing internet standards. Which of the following is not a common protocol maintained by the IETF?
GPS
A pair of young entrepreneurs has decided to use an online crowdfunding website to launch a campaign designed to raise funds for a programmable kitchen appliance that they envision designing, selling and building a business around. Which of the following technological advances has NOT contributed toward making this new form of fundraising possible?
GPS (Global Positioning System)
GPS has fostered many benefits in our society, but has also added some risks. Which of the following are potential risks associated with GPS? Select two answers.
GPS navigation systems are not always up-to-date, and therefore give outdated route information which can result in users becoming lost. GPS navigation systems can distract drivers and sometimes cause accidents on the road.
What is the primary application protocol used by the World Wide Web for delivering web content?
HTTP
Which of the following is a reason for systems to adopt a new internet protocol standard (IPv6) instead of the original standard (IPv4)?
IPv6 allows a much larger range of addresses than IPv4.
Which of the following is NOT a use of application programming interfaces (APIs)?
Justifying a program's correctness.
Which of the following activities would NOT be considered a significant cybersecurity risk?
Logging into a secure online banking system from your home computer and transferring money to pay a bill.
What will be the effect of adding a new connection between A and F on the minimum number of computers which information sent from D to E must pass through?
NO change
What type of communication takes place between two individuals or parties and involves the use of encryption so that only the desired individuals have access to what is being said or heard?
Private
Which of the following standards specifies how header information should be placed at the beginning of an email in order that the receiver(s) of the email can view the headers of the full message to see the origin of the message, as well as servers it originated from or passed through.
SMTP (Simple Mail Transfer Protocol)
Which of the following examples of internet usage does not fit the traditional server-client model?
Sharing files using a peer-to-peer network.
An arts organization wishes to distribute an advertisement for an event happening the next day to as many interested local residents as possible. One potential way of distributing this information is by posting on social media. Which of the following are true statements regarding the disadvantages of using a social-media post for the purpose described? Select two answers.
Social media may not reach a large segment of the desired audience. Social media posts may take some time to be seen by people who do not browse regularly.
Online search engines like Google, Bing, and DuckDuckGo help to make information readily available to us when we need it. However, what do Wikis do that these search engines do not that also makes them useful in their own sense?
They help consolidate and organize information into a nice online reference.
What must devices that communicate with one another on the internet have in common?
Use the same internet protocols.
Which of the following best describes the client-server model of online computing systems?
Using a client application, like a web browser, a user transmits requests over the internet to a remote server that responds with the requested web page or other digital resource, which is transmitted back to the original user.
Students recently created a Gaming Club at their school. On Friday every week, students bring in their gaming consoles (Xbox, Playstation, etc) and they play their favorite games with other users online. However most of the students report that there is a lot more lag (delay in the actions of the controller and in game actions) when playing at school than when playing at home. Which of the following is most likely to be the issue students are having in their Gaming Club?
At the gaming club, many more people are using the same internet connection than in a typical home, meaning the bandwidth available to each user is less.
When Tim Berners-Lee developed the first specifications, protocols, and tools for the World Wide Web in 1993, his employers at CERN chose to make the underlying code publicly available on a royalty-free basis so that anyone who ever wanted to use it or build upon it could do so without having to pay any licensing fees to CERN or ask for CERN's permission.
By making this technology open rather than proprietary (i.e., closed and privately licensed), CERN aimed to increase its adoption and use by many individuals, institutions and companies across the globe.
Website IP addresses such as 74.125.65.91 and 72.21.211.176 are difficult to remember. When browsing the internet therefore users usually enter URLs such as http://www.youtube.com and http://www.amazon.com instead. The use of which internet protocol allows internet users to type URLs instead of IP addresses when navigating to a website?
DNS
Which of the following best describes the function of the Domain Name System (DNS)?
DNS provides a directory service that associates a domain name with the IP addresses of the server hosting the domain.
Which of the following is NOT a true statement about devices and the Internet?
Devices are limited to communicating over the Internet with only other devices within the same local area.
What does it mean for the routing of the Internet to be fault tolerant and redundant?
If one path for data transmission is blocked or corrupted, data can follow another path.
Which of the following best defines confidentiality in context with information and data?
The ability to limit access to information to a certain set of users
Which of the following problems could cloud computing help solve? Select two answers.
A group of students are trying to complete their collaborative English project, but two of their group members cannot meet over the weekend to finish it in person. Part of the requirements for the project is that all parts must be done together as a group. A photographer has all of their photos stored on several different external hard drives, but is having an issue trying to store them in their small one bedroom apartment.
One of the biggest limitations to advancing digital communication and resources has been storage and transfer of information via cloud computing. Which of the following are reasons why cloud computing has gained users and popularity over the past 10 years? Select two choices.
Cloud storage has become more affordable Cloud storage offers greater security of information than it used to offer
Which of the following would be the best way for researchers to collect data which could help them understand how temporarily unavailable network connections can affect connection speeds?
Developing a simulation of packets of data travelling between computers on a network.
Which of the following is an advantage of using standard protocols for internet communication?
Devices of different types by different manufacturers can communicate directly over the internet.
Which of the following are characteristics of a Distributed denial of service (DDoS) attack? In a DDoS attack incoming traffic from many different sources floods the target (usually a web server). A DDoS attack cannot be stopped by blocking just a single IP address. In a DDoS attack, an attacker poses as a company or government official in order to obtain sensitive information from their victim.
I and II only
Which of the following statements correctly describe elements of the process which occurs when a user browses the web using a browser? The browser sends requests for files to a web server. The files requested are broken into packets which are sent from the web server. The packets are reassembled into files upon receipt. The browser returns complete files to the web server for viewing.
I and II only
The architecture of the internet follows the end-to-end principle. This means that the verification and interpretation of data happens only at the endpoints: nodes passing on data packets do not know what they contain or if the data being sent is all received. Which of the following protocols can be used by the endpoints of a network following this principle to ensure the completeness of the transmission of data?
TCP
There are various commonly used protocols for internet data transmission. Which of the following terms is used for the set of protocols which form the internet protocol suite, which organizes the link, transport, internet and application layers of communication over the internet.
TCP/IP
Which of the following are features of the HTTPS protocol?
The HTTPS protocol ensures that documents are transmitted securely using a standard encryption layer, such as SSL or TLS. The HTTPS protocol defines standards for transmitting hypertext documents, such as those that have been formatted according to the HTML standard.
A manufacturer of sports equipment wishes to direct its marketing by finding out the locations and times at which different sports are popular. A researcher for the manufacturer attempts to gather data on this by using a trend-tracking feature which provides information on how popular search terms are. Which of the following features would be LEAST likely to be useful to the researcher to find this information?
The ability to view searches for terms in real-time
Which of the following is a true statement about cloud computing?
There are additional security risks associated with using cloud computing over local data storage.
Which of the following statements describe positive impacts that the Internet and World Wide Web have made on global society? Online educational opportunities have increased substantially year after year, which is giving more people the chance to pursue higher education. The ability of private persons to sell items online has created a new form of commerce that has never been seen before. Peer-to-peer networks have ensured that creators are paid fairly for digital content they have created and released on the internet. Video streaming sites have allowed both commercial and independent movie producers to get their films seen by more viewers at lower distribution costs.
I, II, IV