ITQ 14

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

2) create and formate Web pages

"Html" is used to: 1) load content from a default page 2) create and formate Web pages 3) generate custom content for users 4) exchange mail with other e-mail servers 5) transfer files from flash drives

Network Address Translation (NAT)

A technique known as _____________ uses a gateway that allows multiple devices to share a single IP address. This can be useful in organizations that have a limited number of conventional IP addresses.

Packet, datagram

A unit of data forwarded by a network is called a ____________.

Router

A(n) ____________ is a computing device that connects networks and exchanges data between them.

1) cache

A(n) _____________ is a temporary storage space used to speed computing tasks. 1) cache 2) IP address 3) Protocol 4) domain name service 5) hypertext markup language

1) True

Changing the letter case when typing in host and domain names does not affect the user's ability to reach the destination. 1) True 2) False

2) False

Circuit-switched networks are advantageous because they offer an inexhaustible supply of bandwidth for telecommunications. 1) True 2) False

2) is dedicated for use by the parties for the duration of a connection

Circuit-switched networks provide connection between two parties that: 1) uses a single router for each individual on either end of the connection 2) is dedicated for use by the parties for the duration of a connection 3) repeatedly switches between an open and closed state depending on whether someone is speaking or other noise is being transmitted during a call 4) slices up the conversation into smaller chunks and transmitting them over a shared circuit that mixes content with other callers but routes and reassembles a call to the correct recipient 5) prioritizes voice calls over other connections on IP networks

1) True

Computer programs making decisions without any human intervention conduct most U.S. stock trading 1) True 2) False

1) True

DSL technology is less efficient for service providers in the United States because many of their customers live in less-densely populated suburbs and rural areas. 1) True 2) False

2) False

Dot-com domain name registration is carried out on an auction basis to ensure the highest bidder gains rights to the desired domain name. 1) True 2) False

1) True

IP addresses can oftentimes be used to identify a user's geographical location. 1) True 2) False

2) False

ISPs and IXPs that carry out peering are required by the FCC to charge each other fees based on their traffic contribution. 1) True 2) False

2) False

In the URL, the host name is the name of the network a user tries to connect to. 1) True 2) False

4) packet-switched networks

Internet networks are _____________. 1) bit-switched networks 2) circuit-switched networks 3) data-switched networks 4) packet-switched networks 5) byte-switched networks

3) Cybersquatting

Key Inc., an American guitar maker, recently lost an action to recover the domain name piano-key.com, claiming that the defendant infringed on its registered trademark. What did Key Inc. specifically accuse the defendant of? 1) Sugging 2) Computer trespassing 3) Cybersquatting 4) Domain hoarding 5) Internet stalking

5) it ensures that the load of requests to their sites do not overwhelm a single computer

Popular sites like Google and Yahoo! have several computers assigned to their host names because: 1) they have operations in different countries 2) they are registered under several generic top-level domain names 3) of the different devices used to access these web sites 4) hoarding all information in one server is expensive 5) it ensures that the load of requests to their sites do not overwhelm a single computer

Latency

The phrase ____________ is used by technologists to refer to delay.

Simple Mail Transfer Protocol (SMTP)

The protocol used for exchange of mail between e-mail servers across the world is called ______________.

1) True

A Web address without a file name will load content from a default page. 1) True 2) False

3) protocol

A ___________ enables communication by defining the format of data and rules for exchange. 1) nomenclature 2) regulation 3) protocol 4) dialect 5) convention

1) True

A device gets its IP address from whichever organization is currently connecting it to the Internet. 1) True 2) False

4) Web hosting service

A firm that provides hardware and services to run Web sites of others is known as a(n) _____________. 1) Web site incubator 2) Internet service facilitator 3) Web domain name registrar 4) Web hosting service 5) Internet Web fab

1) True

Many fear that innovation may suffer as a result of the transition of Internet services from flat rate pricing to metered usage. 1) True 2) False

1) True

Many residential providers of cable technology use a system that requires customers to share bandwidth with neighbors. 1) True 2) False

2) False

Most mobile cell phone services are exempted from having to license the wireless spectrum for transmission. 1) True 2) False

3) systems used by many providers require customers to share bandwidth with neighbors

One of the disadvantages of cable technology is that: 1) it is more expensive than other signal-carrying systems 2) while it works well for television signals, it is ineffective for data transmissions required by the Internet 3) systems used by many providers require customers to share bandwidth with neighbors 4) it is incompatible with most modern communication systems 5) the speed of the connection rises in conjunction with the distance between the end customers from the central hub.

5) the invention of graphical Web browsing

One of the factors that accelerated the development of the Internet during the 1990s was: 1) the introduction of the personal computer into households 2) the government's taking over of the Internet's operating structure from private players 3) Intel's invention of low power processors used in portable computers 4) the creation of the Windows and Mac OS operating systems 5) the invention of graphical Web browsing

1) route message packets to the final destination

One of the functions of the IP is to: 1) route message packets to the final destination 2) slice up the message into smaller chunks of data called packets, to be sent over the network 3) check for damaged or corrupt message packets and request for replacements, if needed. 4) label message packets with source and destination addresses 5) rearrange message packets in the same sequence as they were sent

4) a situation when separate ISPs connect their networking equipment together to share traffic

Peering refers to: 1) high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet 2) the broadband service provided via light-transmitting fiber-optic cables 3) the language used to compose Web pages 4) a situation when separate ISPs connect their networking equipment together to share traffic 5) a system that connects end users to the Internet

4) IXPs

Peering usually takes place at neutral sites called ____________. 1) https 2) IPs 3) ISPs 4) IXPs 5) STPs

1) True

Routers don't have perfect, end-to-end information on all points in the Internet. 1) True 2) False

2) False

Routing protocol that is in charge of forwarding packets on the Internet is known as voice over Internet protocol. 1) True 2) False

1) True

Servers or organizations do not need to be housed within a country in order to use a country code as part of their domain name. 1) True 2) False

1) Web browsers and Web servers

The hypertext transfer protocol (http) defines the communication between: 1) Web browsers and Web servers 2) operating systems and Web browsers 3) hardware and operating systems 4) mail servers and hardware 5) hardware and Web browsers

2) False

TCP and IP operate above http and the other application transfer protocols. 1) True 2) False

5) Transmission Control Protocol

The Internet Protocol Suite consists of the Internet Protocol and ____________. 1) File Transfer Protocol 2) Simple Mail Transfer Protocol 3) Session Initiation Protocol 4) Datagram Congestion Control Protocol 5) Transmission Control Protocol

1) True

The Internet has no center and no one owns it. 1) True 2) False

1) True

The TCP works at both ends of Internet communication. 1) True 2) False

1) True

The User Datagram Protocol (UDP) acts as a substitute to TCP when there is a need for speed of communication, but where perfect and complete transmission quality can be sacrificed. 1) True 2) False

4) High Frequency Trading

The acronym HFT refers to: 1) High Finance Telecommunications 2) High Fidelity Transmissions 3) Hedge Fund Transfers 4) High Frequency Trading 5) Hypertext File Transfer

2) uniform resource locator

The address one types into a Web browser is also known as a: 1) universal redirection link 2) uniform resource locator 3) unique resource locator 4) universal redirection locator 5) uniform resource link

5) mapping host and domain names to IP addresses of computers

The domain name service (DNS) is a distributed database that allows users to communicate with other computers by: 1) assigning IP addresses to different domain names 2) mapping host names to domain names 3) creating IP addresses that are unique to servers 4) assigning domain names to different IP addresses 5) mapping host and domain names to IP addresses of computers

4) cache poisoning

The exploit referred to as _______________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request. 1) cybersquatting 2) phishing 3) an online imposture 4) cache poisoning 5) a distributed denial of request

4) the service continues functioning even if one nameserver goes down

The fault-tolerant nature of the DNS ensures that: 1) if users can't reach a host computer, they are redirected back to the previous page 2) mistyped or misspelled Web addresses are automatically corrected 3) if a document or file can't be accessed, it won't result in a 404 error 4) the service continues functioning even if one nameserver goes down 5) mismatched host names and domain names are still assigned with the correct IP address

2) False

The language "http" is used to create and format Web pages. 1) True 2) False

2) False

Wall Street traders often choose a colocation facility with the goal to provide high-latency connectivity to their partners. 1) True 2) False

2) Acquiring a domain name to extort a firm, individual, product, or trademark holder

What is an example of cybersquatting? 1) Overwhelming a firm's Web site by flooding it with seemingly legitimate messages 2) Acquiring a domain name to extort a firm, individual, product, or trademark holder 3) Slowing down packet transfer to an Internet-connected computer 4) Threatening to destroy information stored in a firm's servers 5) Hacking into and defacing an organization's public web presence and refusing to let the site's owner regain control

2) False

When considering overall network speed, a system's speed is determined by its fastest component. 1) True 2) False

2) False

When the Internet really took off, much of the Internet's operating infrastructure transitioned to be supported by government grants rather than private firms. 1) True 2) False

5) Web-based phone calls

Which of the following applications is most likely to use UDP instead of TCP? 1) E-mail 2) Web transmissions 3) File transfer 4) Peer-to-peer-downloads 5) Web-based phone calls

1) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet

Which of the following is true of the term Internet backbone? 1) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet 2) It refers to broadband service provided direct to a home or business using light-transmitting fiber-optic cables. 3) It refers to the collection of standards used to support all Internet services 4) It refers to government-provided open spectrum that enables Internet use for all. 5) It refers to a government-run system supported by telecommunication taxes, which connects end users to the Internet

2) Check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets; put packets in correct order

Which of the following represents the correct sequence of actions taken by the TCP at the destination computer to ensure a perfect copy of the sent message is received? 1) Slice the message into packets; route the packets to the destination; check if packets are damaged; request for new copies of damaged packets 2) Check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets; put packets in correct order 3) Slice the message into packets; check if packets are damaged; put packets in correct order; request for new copies of damaged packets 4) Route the packets to the destination; put packets in correct order; check if packets are damaged; request for new copies of damaged packets 5) Put the packets in correct order; check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets

3) It refers to the language used to create and format Web pages

Which of the following statements holds true for the term "html"? 1) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. 2) It refers to the broadband service provided via light-transmitting fiber-optic cables. 3) It refers to the language used to create and format Web pages. 4) It refers to a situation when separate ISPs link their networks to swap traffic on the Internet 5) It refers to a system that connects end users to the Internet

5) Traceroute

_________ repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination. 1) Firewall 2) Router 3) Pathfinder 4) Mapper 5) Traceroute

ICANN (Internet Corporation for Assigned Names and Numbers)

___________ is the nonprofit organization responsible for managing the Internet's domain and numbering systems.

5) Packet prioritization

____________ involves allowing voice packets to gain delivery importance over packets for applications like e-mail. 1) Voice precedence 2) Data rationing 3) Right-of-way for voice 4) Information queuing 5) Packet prioritization

2) Coaxial cable

____________ is the insulated copper cable commonly used by cable television providers with shielding to reduce electrical interference. 1) Optical fiber cable 2) Coaxial cable 3) Ribbon cable 4) FTTH cable 5) Amdahl cable

Hypertext Markup Language (HTML)

____________ is the language used to compose Web pages.

File Transfer Protocol

______________ refers to the application transfer protocol that is used to copy files from one computer to another.

Load balancing

________________ involves distributing a computing or networking workload across multiple systems in order to avoid congestion and slow performance.


संबंधित स्टडी सेट्स

Exponential and Logarithmic Functions

View Set

How To Make it in the New Music Business

View Set

PMP Rita Exam Prep Questions - Chapter 4 Integration Mgmt

View Set

A2 Unit 1 (PE 1) Social English phrases

View Set

Chapter 20 APUSH Notes 1861-1865

View Set