APCSP 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Consider the following URL: https://www.widgets.com/themes/hearts/list.html Which part of the URL is the top level domain?

.com

Which of the following is NOT a true statement about devices and the Internet?

Devices are limited to communicating over the Internet with only other devices within the same local area.

Which of the following is an advantage of using standard protocols for internet communication?

Devices of different types by different manufacturers can communicate directly over the internet.

Which of the following is the most important security factor to consider when using e-commerce services?

Does the website provide secure transactions?

Which of the following is statements about distributed computing is false?

Each computer in a distributed computing system has an unlimited, complete view of the system in order to perform the necessary tasks.

What is the primary application protocol used by the World Wide Web for delivering web content?

HTTP

Which of the following activities would NOT be considered a significant cybersecurity risk?

Logging into a secure online banking system from your home computer and transferring money to pay a bill.

Which of the following is a direct consequence of the "digital divide"?

Members of poorer or more remote communities are excluded from the benefits of essential online services and resources.

Which of the following must be assigned to every device which is connected to the Internet?

An IP address

Andre and Gaby are sending each other messages via the internet and use Andre's public key to encrypt each message. No other encryption is used. What is the most likely scenario?

Andre will be the only person who has access to the message and can read it.

IP addresses express a node's relative location in a network and are normally represented by a 32-bit number. The numbers are presented in a set of 4 values from 0 - 255 to make them more readable (i.e. Google is represented by 74.125.224.72). Currently, most of the world is using IPv4 addresses as the standard, but in some areas addressing is now being done according to IPv6 standards. How many bits are used for these new IP addresses?

128

Which of the following problems could cloud computing help solve? Select two answers.

A group of students are trying to complete their collaborative English project, but two of their group members cannot meet over the weekend to finish it in person. Part of the requirements for the project is that all parts must be done together as a group. A photographer has all of their photos stored on several different external hard drives, but is having an issue trying to store them in their small one bedroom apartment.

Which of the following best describes the concept of distributed computing?

A network of autonomous computers that communicate with each other in order to achieve a goal

When Tim Berners-Lee developed the first specifications, protocols, and tools for the World Wide Web in 1993, his employers at CERN chose to make the underlying code publicly available on a royalty-free basis so that anyone who ever wanted to use it or build upon it could do so without having to pay any licensing fees to CERN or ask for CERN's permission.

By making this technology open rather than proprietary (i.e., closed and privately licensed), CERN aimed to increase its adoption and use by many individuals, institutions and companies across the globe.

Which of the following is an example of a sensor network and its application? Select two answers.

Cameras with heat detection software are placed into the woods in order to monitor the risk of a forest fire. Firemen and forest rangers can then alert the public as needed based on the information sent to them on their smartphones. Doctors implant automatic insulin pumps into patients with diabetes. These insulin pumps perform measurements on the blood and body in order to determine the correct dosage. Daily reports are sent to doctors and nurses emails to help monitor and calibrate the pump as needed.

Which of the following is NOT a benefit of cloud computing?

Cloud data cannot be subpoenaed by law enforcement.

Which of the following statements about security in the network is not true?

Computers A and F cannot communicate without computer B being aware.

When a message is sent across the internet using the TCP/IP protocol it is sent using network packets. Which of the following does each network packet contain? Select two answers.

Control information for routing the data A small portion of the message

Which of the following best describes the need for using cryptography in data communications?

Cryptography ensures data is decipherable by the recipient, but not by a third party without the correct key.

Which of the following best describes the function of the Domain Name System (DNS)?

DNS provides a directory service that associates a domain name with the IP addresses of the server hosting the domain.

Which of the following would be the best way for researchers to collect data which could help them understand how temporarily unavailable network connections can affect connection speeds?

Developing a simulation of packets of data travelling between computers on a network.

Which of the following are characteristics of a Distributed denial of service (DDoS) attack? In a DDoS attack incoming traffic from many different sources floods the target (usually a web server). A DDoS attack cannot be stopped by blocking just a single IP address. In a DDoS attack, an attacker poses as a company or government official in order to obtain sensitive information from their victim.

I and II only

Which of the following statements correctly describe elements of the process which occurs when a user browses the web using a browser? The browser sends requests for files to a web server. The files requested are broken into packets which are sent from the web server. The packets are reassembled into files upon receipt. The browser returns complete files to the web server for viewing.

I and II only

Which of the following statements describe positive impacts that the Internet and World Wide Web have made on global society? Online educational opportunities have increased substantially year after year, which is giving more people the chance to pursue higher education. The ability of private persons to sell items online has created a new form of commerce that has never been seen before. Peer-to-peer networks have ensured that creators are paid fairly for digital content they have created and released on the internet. Video streaming sites have allowed both commercial and independent movie producers to get their films seen by more viewers at lower distribution costs.

I, II, IV

Which of the following statements describe relevant controversies surrounding the ethics of pre-programmed decision-making with regard to self-driving cars and other autonomous technologies? I. Autonomous technology reduces the chance of human error. II. Autonomous technology allows for programmed responses to certain situations, not all of which are beneficial for the user or owner. III. It is unclear who is at fault for failures by autonomous technological machines (e.g., programmers, owners).

II and III

Due to the rapidly growing number of devices connecting to the Internet, which protocol was developed on the late 1990s to ensure that unique IP addresses could be assigned to devices for years to come?

IPv6

Which of the following is a reason for systems to adopt a new internet protocol standard (IPv6) instead of the original standard (IPv4)?

IPv6 allows a much larger range of addresses than IPv4.

What will be the effect of adding a new connection between A and F on the minimum number of computers which information sent from D to E must pass through?

NO change

Which of the following are examples of cybersecurity threats that are designed to attack users or computer networks?

Phishing Distributed denial of service (DDoS) attacks

Which of the following standards specifies how header information should be placed at the beginning of an email in order that the receiver(s) of the email can view the headers of the full message to see the origin of the message, as well as servers it originated from or passed through.

SMTP (Simple Mail Transfer Protocol)

An arts organization wishes to distribute an advertisement for an event happening the next day to as many interested local residents as possible. One potential way of distributing this information is by posting on social media. Which of the following are true statements regarding the disadvantages of using a social-media post for the purpose described? Select two answers.

Social media may not reach a large segment of the desired audience. Social media posts may take some time to be seen by people who do not browse regularly.

Which of the following best describes malware?

Software that is intended to damage or disable computers and computer systems.

Some countries lack physical resources, like computers or network connections, making it difficult to keep up with the technology of the world. These same countries or locations lack the digital skills and comfort with technology needed in order to be successful in this connected world. The situation described above is commonly referred to as what?

The digital divide

Online search engines like Google, Bing, and DuckDuckGo help to make information readily available to us when we need it. However, what do Wikis do that these search engines do not that also makes them useful in their own sense?

They help consolidate and organize information into a nice online reference.

An archaeologist is studying Native Americans ruins in the American Southwest. He has recently found a previously unknown settlement and wishes to share the find with his research partner who is off-site. Which of the following would be the best method of both documenting his discovery and allowing his research partner to participate and view the settlement in real time?

Use a real-time conferencing application on a tablet to allow his research partner to "see" the site and the artifacts along with him. Record the conversation for later review and joint note-taking.

Which of the following best describes the client-server model of online computing systems?

Using a client application, like a web browser, a user transmits requests over the internet to a remote server that responds with the requested web page or other digital resource, which is transmitted back to the original user.

Which of the following ways of sharing your social security number with a friend poses the least risk of your information being stolen by someone else? Select two answers:

Writing your social security number on a piece of paper and then shredding it once the other person has received it. Typing your social security number into a form on a website that uses SSL, which can then be accessed by your friend.

Which of the following would be a legal use of digital media?

You download a song from iTunes and sync it to the cloud so that it is accessible on all of your devices.

Using a Caesar Cipher with an offset of 13, decode the following ciphertext back to plaintext: znyjner

malware

The DNS system is designed to be very scalable and allows for top level domains to be broken down into subdomains and those subsequently broken down into further subdomains. You have taken ownership of the widets.org domain and you wish to create additional subdomains within widgets.org. Which of the following are valid subdomains within widgets.org?

uppereast.widgets.org newyork.widgets.org


Set pelajaran terkait

CFA 15: Demand & Supply Analysis: The Firm

View Set

Exam IV Chapter 41 Children with CV Disorders

View Set

Communications: Chapter 1 - Key Concepts

View Set

Marketing Channels: Delivering Customer Value

View Set

Cram 21: Total War on the Homefront

View Set