Chapter 3 E-Commerce
Which of the following is the core communications protocol for the Internet? Select one: a. TCP/IP b. TLS c. FTP d. Telnet
a. TCP/IP
________ is used to allow remote login on another computer. Select one: a. Telnet b. HTTP c. FTP d. SSL
a. Telnet
Which of the following is not one of the basic technological foundations of the Internet? Select one: a. FTP b. client/server computing c. packet switching d. TCP/IP
a. FTP
Which of the following is not a basic type of cloud computing service? Select one: a. FiOS b. SaaS c. IaaS d. PaaS
a. FiOS
The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication is called the: Select one: a. Middleware Services layer. b. Transport Services and Representation Standards layer. c. Network Technology Substrate layer. d. Applications layer.
a. Middleware Services layer.
Which of the following is a utility program that allows you to track the path of a message you send from your client to a remote computer on the Internet? Select one: a. Tracert b. Telnet c. Ping d. IMAP
a. Tracert
The address used by a browser to identify the location of content on the Web is called: Select one: a. a uniform resource locator. b. a file path. c. a domain name. d. an IP address.
a. a uniform resource locator.
Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture? Select one: a. client/server computing b. IPv6 c. fiber optics d. Wi-Fi
a. client/server computing
Which of the following is a set of rules for transferring data? Select one: a. protocol b. router c. IP address d. packet
a. protocol
Which of the following are central directories that list all domain names currently in use for specific domains? Select one: a. root servers b. Web servers c. DNS servers d. client servers
a. root servers
Which of the following was the original purpose of the Internet? Select one: a. to link large mainframe computers on different college campuses b. to provide a network that would allow businesses to connect with consumers c. to develop a military communications systems that could withstand nuclear war d. to enable government agencies to track civilian communications
a. to link large mainframe computers on different college campuses
An IPv4 address is expressed as a: Select one: a. 64-bit number that appears as a series of four separate numbers separated by semicolons. b. 32-bit number that appears as a series of four separate numbers separated by periods. c. 32-bit number that appears as a series of four separate numbers separated by semicolons. d. 64-bit number that appears as a series of four separate numbers separated by periods.
b. 32-bit number that appears as a series of four separate numbers separated by periods.
The Web runs in which layer of Internet architecture? Select one: a. Transport Services and Representation Standards layer b. Applications layer c. Network Technology Substrate layer d. Middleware Services layer
b. Applications layer
Which of the following is not an advantage of client/server computing over centralized mainframe computing? Select one: a. Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer. b. Each client added to the network increases the network's overall capacity and transmission speeds. c. There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down. d. It is easy to expand capacity by adding servers and clients.
b. Each client added to the network increases the network's overall capacity and transmission speeds.
Which of the following protocols is used to send mail to a server? Select one: a. SSL b. IMAP c. FTP d. HTTP
b. IMAP
Who wrote the first paper on packet switching networks? Select one: a. Ray Tomlinson b. Leonard Kleinrock c. J.C.R. Licklider d. Vint Cert
b. Leonard Kleinrock
________ is a utility program that allows you to check the connection between your client and a TCP/IP network. Select one: a. Tracert b. Ping c. Telnet d. Finger
b. Ping
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called: Select one: a. routing b. packet switching. c. the File Transfer Protocol. d. the Transmission Control Protocol.
b. packet switching.
Which of the following are specialized computers that interconnect the thousands of computers that make up the Internet in order to transmit message parcels along available communication paths and on to their destinations? Select one: a. IP servers b. routers c. Web servers d. packet servers
b. routers
During which period of time did the Institutionalization phase of Internet development take place? Select one: a. 1961-1974 b. 1950-1960 c. 1975-1995 d. 1995-through the present
c. 1975-1995
Which of the following statements about cloud computing is not true? Select one: a. Hybrid clouds offer both public and private cloud options. b. Dropbox is an example of a public cloud. c. A public cloud is typically used by companies with stringent privacy and security requirements. d. A private cloud hosted internally or externally.
c. A public cloud is typically used by companies with stringent privacy and security requirements.
The ________ helps define the overall structure of the Internet. Select one: a. IESG b. ITU c. IAB d. W3C
c. IAB
When talking about the physical elements of the Internet, the term redundancy refers to: Select one: a. transmitting multiple copies of a single packet to safeguard against data loss. b. delays in messages caused by the uneven flow of information through the network. c. multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs. d. the use of tiered high-speed switching computers to connect the backbone to regional and local networks.
c. multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.
The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices Select one: a. World Wide Web Consortium (W3C) b. Internet Engineering Steering Group (IESG) c. Internet Engineering Task Force (IETF) d. Internet Society (ISOC)
d. Internet Society (ISOC)
The backbone of the Internet is formed by: Select one: a. Network Access Points (NAPs). b. Internet Exchange Points (IXPs). c. Metropolitan Area Exchanges (MAEs). d. Tier 1 ISPs.
d. Tier 1 ISPs.