Unit 2 Comp Sci

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following statements correctly explain how the Internet is able to facilitate communication at a large scale? 1. A central monitoring computer is used to track and maintain the connections of the Internet. 2. Data is routed between points in multiple ways so that if a connection fails, the data can be rerouted around the inoperative connections. 3. Protocols for packets and routing are used so that computers from different manufacturers can communicate in a standard way.

2 and 3

Which of the following statements about security in the network is true? 1. Computers A and D need to communicate with at least two additional computers in the network in order to communicate with each other. 2. Computers B and C can communicate with each other without additional computers being aware of the communication

2 only

What is the minimum number of paths broken to prevent device A from connecting with device E?

3

Internet protocol version 6 (IPv6) has been introduced to replace the previous version (IPv4). Which of the following best describes a benefit of IPv6 over IPv4?

IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet.

Device A is attempting to send data over to device E. Which of the following is true of how the data will travel through the network?

It is possible that the data will travel through any of the devices in the network before arriving at device E.

Which of the following best describes the protocols used on the Internet?

The protocols of the Internet are open and used by all devices connected to the network.

Which of the following is true of how the Internet has responded to the increasing number of devices now using the network?

The protocols of the Internet were designed to scale as new devices are added

Computing Network

a group of interconnected computing devices capable of sending or receiving data.

According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?

about.example.com

fault tolerance

to continue operating without interruption when one or more of its components fail.

In configuration I, what is the minimum number of connections that must be broken or removed before device T can no longer communicate with device U?

2

What is the minimum number of connections that would need to be removed from the network in order for device A to not be able to communicate with device F?

2

What is the minimum number of connections that must be broken or removed in the network before computer E can no longer communicate with computer F?

3

What is the minimum number of connections that must be broken or removed before device B can no longer communicate with device C?

4

Jesse purchases a new smartphone and is immediately able to use it to send a photo over the Internet to a friend who lives in a different country. Which of the following is NOT necessary to make this possible

A single direct connection is established between any two devices connected to the Internet.

14. Which of the following situations is most likely to cause issues arising from the digital divide?

A. A state makes voter registration forms available only by visiting a government website

Which of the following best describes the purpose of an IP address?

A. IP addresses provide a unique number for identifying devices that send and receive information on the Internet

10. Which of the following Internet protocols is MOST important in reassembling packets and requesting missing packets to form complete messages

A. Transmission Control Protocol (TCP)

12. Two devices are connected to the Internet and communicating with one another. A squirrel chews through one of the wires in the network that is currently being used by the devices to communicate. The network immediately begins using a different path through the network and communication continues as normal.This situation best exemplifies which principle?

A. fault-tolerance

15. Which of the following is MOST likely to be an outcome of the digital divide

B. People from some racial or ethnic groups have unequal access to computing technology.

In which of the configurations is it possible to have redundant routing between devices Q and V?

Both configuration I and configuration II

13. An Internet Service Provider (ISP) is a company that builds the routers and wired connections that allow individuals to access the Internet.

C. Redundant networks are more reliable

11. Which of the following Internet protocols is used to request and send pages and files on the World Wide Web?

D. HyperText Transfer Protocol (HTTP)

How is the internet able to facilitate communication at a large scale?

Data is fault-tolerant. Protocols for packets and routing are used so devices from different manufacturers can communicate in a standard way.

Which of the following best describes the role of the Internet Engineering Task Force (IETF) ?

Developing standards and protocols for Internet communication

Which of the following best explains how data is typically assembled in packets for transmission over the Internet?

Each packet contains data to be transmitted, along with metadata containing information used for routing the data.

A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best explains the result of this configuration as compared to a configuration in which the router does not limit the bandwidth?

Guest users will be restricted in the maximum amount of data that they can send and receive per second.

Which of the following statements are true about the ability for devices A and C to communicate? Select two answers.

If devices B and D were to fail, then information sent from device A could not reach device C. If devices D and F were to fail, then information sent from device A could not reach device C.

Which of the following statements is true about the network

If devices B and F fail, then device A will not be able to communicate with device G.

Which of the following is a primary reason for the use of open protocols on the Internet?

Open protocols provide a way to standardize data transmission between different devices.

Which of the following explains a benefit of using open standards and protocols for Internet communication?

Open standards and protocols allow different manufacturers and developers to build hardware and software that can communicate with hardware and software on the rest of the network.

Which of the following is true of how packets are sent through the Internet?

Packet metadata is used to route and reassemble information travelling through the Internet

Explain the relationship between the internet and the World Wide Web

The World Wide Web are files, web pages and media. The Internet is the network we use to access those files.

Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes the ability of the two computers to communicate with each other across the Internet?

The computers can communicate directly because Internet communication uses standard protocols.

A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent to the user?

The file is broken into packets for transmission. The packets must be reassembled upon receipt.

The following figures represent different ways of configuring a network of physically linked computers labeled P, Q, R, and S. A line between two computers indicates that the computers can communicate directly with each other. In which configuration is it NOT possible to have redundant routing between computers P and S?

The one that looks like a backwards N, because only one path can get from p to s

Emilee is watching an online video. The video is being sent to her laptop by a server over the Internet which splits the video into packets and sends them in the order they appear in the video. Which of the following is true about how the packets will arrive at her computer?

The packets may arrive out of order

What would happen to a user if they connect to a router that limits bandwidth

The user will be restricted in the maximum amount of data that they can send and receive per second

The transmission control protocol (TCP) and Internet protocol (IP) are used in Internet communication. Which of the following best describes the purpose of these protocols?

To establish a common standard for sending messages between devices on the Internet

Difference between User Datagram Protocol and Transmission Control Protocol

UDP sends data as fast as possible, not worrying about if the packets sent and in order TCP sends data slower, but makes sure all packets are there and in order

Computing System

a group of computing devices and programs working together for a common purpose

Computing Device

a machine that can run a program, including computers, tablets, servers, routers, and smart sensors

redundancy

having extra or duplicate resources available to support the main system. It is a backup or reserve system that can step in if the primary system fails.

path

the series of connections between computing devices on a network starting with a sender and ending with a receiver.


Set pelajaran terkait

AEMT Medications from Book/Study Paper

View Set

Nutrition, 7.4 Book Notes, Nutrition Connect 7, Chapter 7-Energy Balance and Weight Control, Chapter 7, Chapter 7: Energy balance and weight control, NutriSci 132 Exam II

View Set

Abdominal Sonography Review: Quiz #5: PANCREAS

View Set

Principles of Pharmacology Ch. 30

View Set