APCSP 6 T

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following best describes the function of the Domain Name System (DNS)?

DNS provides a directory service that associates a domain name with the IP addresses of the server hosting the domain.

Which of the following is an advantage of using standard protocols for internet communication?

Devices of different types by different manufacturers can communicate directly over the internet.

Which of the following is the most important security factor to consider when using e-commerce services?

Does the website provide secure transactions?

Which of the following is statements about distributed computing is false?

Each computer in a distributed computing system has an unlimited, complete view of the system in order to perform the necessary tasks.

Which of the following standards specifies how header information should be placed at the beginning of an email in order that the receiver(s) of the email can view the headers of the full message to see the origin of the message, as well as servers it originated from or passed through.

SMTP (Simple Mail Transfer Protocol)

An arts organization wishes to distribute an advertisement for an event happening the next day to as many interested local residents as possible. One potential way of distributing this information is by posting on social media.Which of the following are true statements regarding the disadvantages of using a social-media post for the purpose described?Select two answers.

Social media may not reach a large segment of the desired audience. Social media posts may take some time to be seen by people who do not browse regularly.

Online search engines like Google, Bing, and DuckDuckGo help to make information readily available to us when we need it. However, what do Wikis do that these search engines do not that also makes them useful in their own sense?

They help consolidate and organize information into a nice online reference.

Which of the following best describes the client-server model of online computing systems?

Using a client application, like a web browser, a user transmits requests over the internet to a remote server that responds with the requested web page or other digital resource, which is transmitted back to the original user.

The DNS system is designed to be very scalable and allows for top level domains to be broken down into subdomains and those subsequently broken down into further subdomains. You have taken ownership of the widets.org domain and you wish to create additional subdomains within widgets.org. Which of the following are valid subdomains within widgets.org?

uppereast.widgets.org newyork.widgets.org

Which of the following must be assigned to every device which is connected to the Internet?

An IP address

Andre and Gaby are sending each other messages via the internet and use Andre's public key to encrypt each message. No other encryption is used. What is the most likely scenario?

Andre will be the only person who has access to the message and can read it.

Consider the following URL: https://www.widgets.com/themes/hearts/list.htmlWhich part of the URL is the top level domain?

.com

When Tim Berners-Lee developed the first specifications, protocols, and tools for the World Wide Web in 1993, his employers at CERN chose to make the underlying code publicly available on a royalty-free basis so that anyone who ever wanted to use it or build upon it could do so without having to pay any licensing fees to CERN or ask for CERN's permission.

By making this technology open rather than proprietary (i.e., closed and privately licensed), CERN aimed to increase its adoption and use by many individuals, institutions and companies across the globe.

Which of the following is NOT a benefit of cloud computing?

Cloud data cannot be subpoenaed by law enforcement.

Which of the following statements about security in the network is not true?

Computers A and F cannot communicate without computer B being aware.

Which of the following are characteristics of a Distributed denial of service (DDoS) attack?In a DDoS attack incoming traffic from many different sources floods the target (usually a web server).A DDoS attack cannot be stopped by blocking just a single IP address.In a DDoS attack, an attacker poses as a company or government official in order to obtain sensitive information from their victim.

I and II only

Which of the following statements correctly describe elements of the process which occurs when a user browses the web using a browser?The browser sends requests for files to a web server.The files requested are broken into packets which are sent from the web server. The packets are reassembled into files upon receipt.The browser returns complete files to the web server for viewing.

I and II only

Which of the following statements describe positive impacts that the Internet and World Wide Web have made on global society?Online educational opportunities have increased substantially year after year, which is giving more people the chance to pursue higher education.The ability of private persons to sell items online has created a new form of commerce that has never been seen before.Peer-to-peer networks have ensured that creators are paid fairly for digital content they have created and released on the internet.Video streaming sites have allowed both commercial and independent movie producers to get their films seen by more viewers at lower distribution costs.

I, II, IV

Which of the following is a reason for systems to adopt a new internet protocol standard (IPv6) instead of the original standard (IPv4)?

IPv6 allows a much larger range of addresses than IPv4.

What will be the effect of adding a new connection between A and F on the minimum number of computers which information sent from D to E must pass through?

NO change


Set pelajaran terkait

BUS-L201 Chapter 51 Employment Law

View Set

Chapter 1 med-surg NCLEX review questions

View Set

Anatomy and Physiology II Ch. 22 Digestive

View Set

Judicial Educator Module 8: Alcohol 101: Choosing a Direction

View Set

GBU 6552 Final (Chapters 31,33,34,36,39)

View Set

chapter 8 - communicating in intimate relationships

View Set