Compsci Unit 2
Given the following code, what is printed to the console? print "3" + "4"
34
router
A type of computer that forwards data across a network
How are protocols like HTTP, TCP, and IP created?
A worldwide group of volunteers draft revise, and publish protocols
How are protocols like HTTP, SMTP, and IP created?
A worldwide group of volunteers draft, revise, and publish protocols.
Which of the following statements is true regarding the networks that make up the Internet? Select TWO answers.
-All devices that are connected on a network use the same protocol -Different types of networks can be connected in order to transfer data and communicate
Convert the following number to a decimal value: AA (hex)
170
packet metadata
Data added to packets to help route them through the network and reassemble the original message
Which of the following refers to chunks of data and their metadata, used to route and reassemble information on the Internet ?
Packets
Which of the following statements is an accurate interpretation of bandwidth speed?
The number of files that can be downloaded in a set amount of time
Which of the following can be represented by a single binary digit? Select two answers.
The value of a Boolean variable The remainder when dividing a whole number by 2
Which of the following is true about data compression?
There are tradeoffs involved in choosing a compression technique for storing and transmitting data
Domain Name System (DNS)
the system responsible for translating domain names like example.com into IP addresses
IP address
unique number assigned to each device on the internet
Which of the following domain names are part of the same top tier? Select TWO ANSWERS
www.collegeB.edu www.collegeA.edu
Which of the following statements are true about routers and routing on the Internet? Choose two answers.
-A packet traveling between two computers on the Internet may be rerouted several times along the way or even dropped -Routers act independently and route packets as they see fit
4 bit number for 13
1101
fault tolerant
Can continue to function even in the event of an individual component failures, important because elements of complex systems like a computer network fail at unexpected times, often in groups
How does the hierarchical architecture of the DNS help the system scale?
Domain names have set structure, making them easy to organize and manage
The Internet, A Mobile Hotspot, School Computer Lab are examples of what?
IP
The Internet Engineering Task Force makes decisions by rough consensus, not by the majority of votes. What does this ensure about the Internet?
It is incredibly difficult to charge the common protocols and standards of the internet once they have been created.
Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?
Items placed in a Web store's shopping cart for future purchase during the anonymous browser will not be saved on the user's computer
Which of the following BEST describes how protocols on the Internet (e.g. IP, TCP, HTTP) make use of abstraction to accomplish their respective purposes?
Low level protocols can provide functionality to high level protocols without revealing the details of how this is accomplished
The _____________ takes inventory of all packets in the datastream to ensure they are successfully sent and received.
TCP
Which of the following best describes the ability of the two computers to communicate with each other across the Internet?
The computers can communicate directly because Internet communication uses standard protocols.
Which of the following terms can be described as sending all packets without checking whether they were received or ordered properly?
UDP
protocol
an agreed upon set of rules that specify the behavior of some system
TCP/IP does all of the below EXCEPT:
choose the path needed (which routers) to move a message from point A to point B
Which of the following is an example of a subdomain of college.org to the domain name system (DNS)?
contact.college.org
World Wide Web
information system where documents and other web resources are identified by Uniform Resource Locators (URLs, such as https://example.com/), which may be interlinked by hypertext, and are accessible over the Internet
The colors of pixels in a digital image are often represented by red, green, and blue values between 0 and 255 (an RGB triplet). A photographer is manipulating a digital image to lighten it because of the RGB values in the image are less than 100, making it very dark. He does this by adding 20 to the R, G, and B values of each pixel, then overwriting the original image. What type of transformation is the photographer using on the digital image? A. Lossless transformation B. Lossy transformation C. Multiband transformation D. Chrome Sampling transformation
lossless transformation
MP3 software works to cut down audio files using what form of compression?
lossy compression
Which of the following statements about packets is TRUE?
none
metadata
shows the app interface and the bits used behind the scenes
Transmission Control Protocol (TCP)
takes inventory of all packets in the data stream to ensure they are successfully sent and received
computer system
the combination of hardware, software, user and data
internet censorship
the control or suppression of what can be viewed, accessed, or published on the internet. It may be carried out by the government or by private organizations
Which of the following statements are true of the standards of the internet? Select TWO answers.
-Internet standards are specific procedures and rules that are created in order to benefit the Internet Community -Internet standards ensure that hardware and software created by different companies will be able to communicate with each other online.
Many networks are set up using a hierarchical architecture to create a "backbone" network. In this system, several connected routers act as the backbone, and many smaller LANs are connected to the backbone. This is much different than having a system where every router is connected to every other router. What are the benefits of the hierarchical approach to setting up a network? Select TWO answers
-It makes the process of transferring data much more efficient -It decreases congestion in the network
Which of the following statements are TRUE of the Internet? Select TWO ANSWERS.
-Most data can follow more than one path to the destination device -Most network routing on the Internet is hierarchical
Which of the following IS true about TCP/IP packets?
-Packets are numbered so if they arrive out of order they can be reassembled -Packets can be routed on different paths from sender to receiver. -Messages are broken into packets to improve the reliability of the Internet
Which of the following statements about redundancy on the Internet are TRUE? Select TWO answers
-Redundancy has good qualities; many devices can be added to the network without affecting traffic -Redundancy has good qualities; if several routers fail, data can still be transferred
Which of the following do HTTPS and SSL procedures ensure? Select TWO ANSWERS.
-That messages being sent are encrypted and thus secure -That the identity of the server involved in an interaction can be trusted
An author is considering publishing an e-book using a Creative Commons license. In which of the following situations would it be better for the author to use a Creative Commons license instead of a traditional copyright?
-The author wants to make the e-book available as a free download -The author wants to allow people permission to use and modify the e-book
If the post office delivered mail exactly like the routers deliver messages on the Internet, which of the following statements would be true? SELECT 2 ANSWERS
-The mailman would sometimes take a different path to deliver each letter to your home -Letters would be written on the outside of the envelope for all to read instead of letters put inside envelopes
A digital certificate is an attachment to an electronic message used for security purposes. The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be. Select TWO answers.
-The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be. and to provide the receiver with the means to encode a reply -Is an attachment to an electronic message used for security purposes
Which of the following statements are true of the Internet Engineering Task Force (IETF)? Select TWO ANSWERS.
-The most important work of the IETF is to create and maintain protocols like HTTP and TCP -The IETF is completely made up of volunteers from all over the world who do not need to attend meetings in person to participate
Which of the following are benefits of using well-named variables in computer programs?
-The program will be easier for people to read -The program will be easier to modify in the future
Each packet being routed around the internet contains header information about the packet itself, and it also contains part of the file being transferred. Imagine you are sending an image of a basketball player from computer A to computer B across the Internet. Of the following, which information would be contained in each packet's header? Select TWO.
-The sequence number of the packet in relation to all other packets of the image -The IP address of the destination computer
Which of the following are ways that the Internet has changed the way people collaborate? Select TWO answers.
-Video Conferencing software enables people to talk to co-worker's and friends -Cloud Computing allows people to work on the same document from different areas of the World
What 3 bits of data gives us green?
111
You have a coordinate grid that is 96 x 96. Assuming that you encode the x and y coordinate as separate numbers, what is the minimum number of bits that you will need to encode a coordinate in that space?
14: 7 bits to get 96 and 7+7=14
The new version of the Internet Protocol, IPv6, allows for IP addresses that are 128 bits long, How many possible IP addresses are available with IPv6?
2^128
Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?
2^32
A video streaming Web site uses 32-bit integers but has recently upgraded to 64 bit integers. Why?
2^32 more bits can be represented
The world is currently in a transition to using IPv6, a newer version of the IP protocol that uses 128-bit addresses instead of 32-bit addresses used by IPv4. What is the main problem that IPv6 was created to solve?
32-bit addresses could not ensure that every internet-connected device can receive a unique IP address
Two students are sending messages to one another using a 5-bit protocol. They decide to modify their protocol to 7-bit messages. How many move values can be represented in a 7-bit message than a 5-bit message?
4 times as many
What is the minimum number of bits you would need to encode the 26 letters of the alphabet plus a space and the digits 0- 9 for a total of 37 characters?
6 bits 000000
How many bits are necessary to convert 128 from decimal (base ten) to binary (base two)?
8
Digital certificates are issued by ...?
A certified instructor by Certification Authorities (CA). Like a central trusted body is used to issue driving licenses or passports, a CA fulfill the role of the Trusted Third Party by accepting Certificate applications from entities, authenticating applications, issuing Certificates and maintaining status information about the Certificates issued
Which of the following has the greatest potential for compromising a user's personal privacy?
A group of cookies stored by the user's Web browser
Which of the following statements is TRUE regarding Internet protocols?
All of the above are false.
Which of the following best explains what happens when a new device is connected to the Internet?
An Internet Protocol (IP) address is assigned to the device
What is a Distributed Denial of Service (DDoS) attack?
An attempt to compromise a single target by flooding it with requests from multiple systems
packet
Chunks of data and its metadata used to route and reassemble information, sent over a network
Why is the Domain Name System useful?
Domain names are easier for humans to remember than the IP addresses of frequently visited websites
New websites are being created every day, yet internet users are still able to navigate the web and access information at the same speed. Which of the following most makes this possible:
Hierarchical DNS
Which of the following identifies a device using the internet?
IP address
Which of the following best describes the basic idea of fault tolerance?
If part of the system fails, the operation continues without interruption
IPv6
Internet Protocol version 6 that was added so to make room for more IP addresses as the Internet grows
What are two standards of the Internet?
Internet standards ensure that hardware and software created by different companies will be able to communicate with each other online, Internet standards are specific procedures and rules that are created in order to benefit the Internet Community
How does a computer resolve a domain name into an IP address?
It asks a DNS server for the corresponding IP address
Which of the following is the best description of the term Internet censorship ?
It is the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative. Individuals and organizations may engage in self-censorship for moral, religious, or business reasons, to conform to societal norms, due to intimidation, or out of fear of legal or other consequences
Which of the following is the best description of the term Digital Divide?
It is the growing gap between the underprivileged members of society, especially the poor, rural, elderly, and handicapped portion of the population who do not have access to computers or the internet; and the wealthy, middle-class, and young Americans living in urban and suburban areas who have access
Which of the following is the best description of the term Net Neutrality?
It is the principle that Internet service providers (ISPs) must treat all Internet communications equally, and not discriminate or charge differently based on user, content, website, platform, application, type of equipment, source address, destination address, or method of communication.
Which of the following is an example of how the digital divide can affect data collection and analysis?
Members of an online social network are asked to watch a streaming video about a current event, and answer a survey. People on low-bandwidth networks that cannot handle streaming video would be unlikely to respond.
What is the primary reason that routing on the internet is redundant?
Networks are still available in case of a path rоuter failure
open use protocols
Open protocols provide a way to standardize data transmission between different devices
Which of the following is a primary reason for the use of open protocols on the Internet?
Open protocols provide a way to standardize data transmission between different devices.
Desktop computers, laptops, tablets, smartphones, and other devices are made by different companies, yet they are all able to access the Internet. This has led to the widespread use of the Internet from many different kinds of devices. Which of the following makes this possible?
Open standards and protocols
Which of the following statements about packets is TRUE?
Packets must be sent in order so they can be reassembled at end host.
A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following activities is LEAST likely to be effective in this purpose?
Putting all government forms on the city Website
A new device is given as IP address and added to a network so that it can access the Internet. Large amounts of files are uploaded and downloaded on this new device, but other users who were already online do not experience any difference in performance. Which of the following enables this phenomenon?
Redundant routers
Which of the following statements about TCP/IP is FALSE?
TCP/IP are the only protocols necessary to send and receive information over the Internet
IPv6
The Internet Protocol version 6 provides a large number of new addresses to route Internet traffic, using "from" and "to" addresses written as colon-hexadecimal notation, such as "fe80::42:acff:feaa:1bf0".
Which of the following best describes the relationship between the World Wide Web and the Internet?
The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.
Which of the following best explains how messages are typically transmitted over the Internet?
The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.
Which of the following statements about packets is FALSE?
The packet does not contain information about the sender's IP address
Tom sends Troy an email, Which of the following statements about the way the email sent is NOT true?
The packets arrive at Troy's computer in the correct order so that they can be reassembled correctly.
Why was IPv6 introduced as the new version of the Internet Protocol?
With only 32 bit IP addresses, the older version could not support the large number of devices connecting to the internet.
Which of the following scenarios is most characteristic of a phishing attack?
You get an email from the IT support desk that asks you to send a reply email with your username and password to verify your account.
Hypertext Transfer Protocol (HTTP)
a protocol for computers to request and share the pages that make up the world wide web on the Internet
internet protocol
a protocol for sending data across the Internet that assigns unique numbers(IP addresses) to each connected device
computer network
computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes
net neutrality
concept that all data on the internet should be treated equally by corporations, such as internet service providers, and governments, regardless of content, user, platform, application or device
Which term refers to the way in which information travels on the Internet, not as a single piece but in chunks?
datastreams
digital divide
differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
computer device
electronic devices which take inputs, process the inputs and then calculate results from the inputs
redundancy
inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network
bandwidth speed
the maximum amount of data that can be sent in a set amount of time
Internet
the publicly available worldwide system of interconnected computer networks (Links to an external site.) that transmit data by packet switching (Links to an external site.) over the Internet Protocol (Links to an external site.)