ap csp unit 2

Ace your homework & exams now with Quizwiz!

Which of the following can be represented by a single binary digit? Select two answers.

-The remainder when dividing a whole number by 2 -The value of a Boolean variable

Which of the following best explains what happens when a new device is connected to the Internet?

An Internet Protocol (IP) address is assigned to the device.

If the post office delivered mail exactly like the routers deliver messages on the Internet, which of the following statements would be true? SELECT 2 ANSWERS

-Letters would be written on the outside of the envelope for all to read instead of letters put inside envelopes -The mailman would sometimes take a different path to deliver each letter to your home

Two students are sending messages to one another using a 5-bit protocol. They decide to modify their protocol to 7-bit messages. How many move values can be represented in a 7-bit message than a 5-bit message?

4 times as many

Which of the following statements about redundancy on the Internet are TRUE? Select TWO answers.

-Redundancy has good qualities; if several routers fail, data can still be transferred. -Redundancy has good qualities; many devices can be added to the network without affecting traffic.

Choose the correct answer.

II only

A new device is given as IP address and added to a network so that it can access the Internet. Large amounts of files are uploaded and downloaded on this new device, but other users who were already online do not experience any difference in performance. Which of the following enables this phenomenon?

Redundant routers

Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes the ability of the two computers to communicate with each other across the Internet?

The computers can communicate directly because Internet communication uses standard protocols.

Which of the following statements is true regarding the networks that make up the Internet? Select TWO answers.

-Different types of networks can be connected in order to transfer data and communicate. -All devices that are connected on a network use the same protocol.

Desktop computers, laptops, tablets, smartphones, and other devices are made by different companies, yet they are all able to access the Internet. This has led to the widespread use of the Internet from many different kinds of devices. Which of the following makes this possible?

Open standards and protocols

The _____________ takes inventory of all packets in the datastream to ensure they are successfully sent and received.

TCP

Which of the following best describes the relationship between the World Wide Web and the Internet?

The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.

Which of the following terms can be described as sending all packets without checking whether they were received or ordered properly?

UDP

Which of the following statements are true of the standards of the internet? Select TWO answers.

-Internet standards ensure that hardware and software created by different companies will be able to communicate with each other online. -Internet standards are specific procedures and rules that are created in order to benefit the Internet Community.

The new version of the Internet Protocol, IPv6, allows for IP addresses that are 128 bits long, How many possible IP addresses are available with IPv6?

2^128

A video-streaming Web site uses 32-bit integers to count the number of times each video has been played. In anticipation of some videos being played more times than can be represented with 32 bits, the Web site is planning to change to 64-bit integers for the counter. Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?

2^32 times as many values can be represented.

How many bits are necessary to convert 128 from decimal (base ten) to binary (base two)?

8

How are protocols like HTTP, TCP, and IP created?

A worldwide group of volunteers draft revise, and publish protocols.

Why is the Domain Name System useful?

Domain names are easier for people to remember than the IP addresses of frequently visited websites.

Which of the following is the best description of the term Digital Divide?

It is the growing gap between the underprivileged members of society, especially the poor, rural, elderly, and handicapped portion of the population who do not have access to computers or the internet; and the wealthy, middle-class, and young Americans living in urban and suburban areas who have access.

Which of the following is the best description of the term Net Neutrality?

It is the principle that Internet service providers (ISPs) must treat all Internet communications equally, and not discriminate or charge differently based on user, content, website, platform, application, type of equipment, source address, destination address, or method of communication.

ASCII is a character-encoding scheme that uses 7 bits to represent each character. The decimal (base 10) values 65 through 90 represent the capital letters. A through Z, as shown in the table below. What ASCII character is represented by the binary (base 2) number 1001010 ?

J

Which of the following statements about packets is TRUE?

None of these Statements are true.

Which of the following is a primary reason for the use of open protocols on the Internet?

Open protocols provide a way to standardize data transmission between different devices.

Why was IPv6 introduced as the new version of the Internet Protocol?

With only 32 bit IP addresses, the older version could not support the large number of devices connecting to the internet.

TCP/IP does all of the below EXCEPT:

choose the path needed (which routers) to move a message from point A to point B

Which of the following is the best description of the term Internet censorship ?

It is the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative. Individuals and organizations may engage in self-censorship for moral, religious, or business reasons, to conform to societal norms, due to intimidation, or out of fear of legal or other consequences

How does the hierarchical architecture of the DNS help the system scale?

Domain names have set structure, making them easy to organize and manage.

Which of the following statements about security in the network is true? I. Computers A and D need to communicate with at least two additional computers in the network in order to communicate with each other. II. Computers B and C can communicate with each other without additional computers being aware of the communication.

II only

The Internet, A Mobile Hotspot, School Computer Lab are examples of what?

IP

Which of the following best describes the basic idea of fault tolerance?

If part of the system fails, the operation continues without interruption.

What is the primary reason that routing on the internet is redundant?

Networks are still available in case of a path rоuter failure.

Which of the following statements about TCP/IP is FALSE?

TCP/IP are the only protocols necessary to send and receive information over the Internet.

Digital certificates are issued by ...?

A certified instructor by Certification Authorities (CA). Like a central trusted body is used to issue driving licenses or passports, a CA fulfill the role of the Trusted Third Party by accepting Certificate applications from entities, authenticating applications, issuing Certificates and maintaining status information about the Certificates issued.

A digital certificate is an attachment to an electronic message used for security purposes. The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be. and to provide the receiver with the means to encode a reply. provides the receiver with the means to encode a reply. Is a protocol seldom used by internet users because it requires too many layers. Is given upon completion of a digital training class. Select TWO answers.

-Is an attachment to an electronic message used for security purposes. -The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be. and to provide the receiver with the means to encode a reply.

Many networks are set up using a hierarchical architecture to create a "backbone" network. In this system, several connected routers act as the backbone, and many smaller LANs are connected to the backbone. This is much different than having a system where every router is connected to every other router. What are the benefits of the hierarchical approach to setting up a network? Select TWO answers.

-It makes the process of transferring data much more efficient. -It decreases congestion in the network.

Which of the following statements are TRUE of the Internet? Select TWO ANSWERS.

-Most network routing on the Internet is hierarchical. -Most data can follow more than one path to the destination device.

Which of the following do HTTPS and SSL procedures ensure? Select TWO ANSWERS.

-That messages being sent are encrypted and thus secure. -That the identity of the server involved in an interaction can be trusted.

Each packet being routed around the internet contains header information about the packet itself, and it also contains part of the file being transferred. Imagine you are sending an image of a basketball player from computer A to computer B across the Internet. Of the following, which information would be contained in each packet's header? Select TWO.

-The IP address of the destination computer. -The sequence number of the packet in relation to all other packets of the image.

Choose the two statements that best describe the relationship between HTTP and the World Wide Web.

-The World Wide Web is a collection of pages and files that is shared between computers using HTTP. -HTTP and the World Wide Web both rely on other layers of protocols for sending information on the Internet

Which of the following statements are true of the Internet Engineering Task Force (IETF)? Select TWO ANSWERS.

-The most important work of the IETF is to create and maintain protocols like HTTP and TCP. -The IETF is completely made up of volunteers from all over the world who do not need to attend meetings in person to participate.

Which of the following are ways that the Internet has changed the way people collaborate? Select TWO answers.

-Video Conferencing software enables people to talk to co-worker's and friends. -Cloud Computing allows people to work on the same document from different areas of the World.

Which of the following domain names are part of the same top tier? Select TWO ANSWERS

-www.collegeA.edu -www.collegeB.edu

You have a coordinate grid that is 96 x 96. Assuming that you encode the x and y coordinate as separate numbers, what is the minimum number of bits that you will need to encode a coordinate in that space?

14

What is the largest binary number you can write given you have four bits? Convert this to decimal (base ten).

15

The figure below represents a network of physically linked computers labeled A though F. Computers with a line between them can communicate directly to each other and if two computers do not have a line connecting them, they must go through at least one other computer to communicate with each other. For example, information can be sent directly between B and E, but the information sent between computers B and C must fo through other computers. What is the minimum number of connections that must be broken or removed in the network before computer E and B can no longer communicate?

2

The figure below represents a network of physically linked computers labeled A through G. A line between two computers indicates that the computers can communicate directly with each other, Any information sent between two computers that are not directly connected must go through at least one other computer. For example, information can be sent directly between computers A and B, but information sent between computers A and C must go through other computers.

3

Which of the following statements is TRUE regarding Internet protocols?

All of the above are false.

The Internet Engineering Task Force makes decisions by rough consensus, not by the majority of votes. What does this ensure about the Internet?

Although the standards that govern the Internet (like HTTP and DNS) might change, they will not be affected by a small group or party.

Which of the following identifies a device using the internet?

An IP address

New websites are being created every day, yet internet users are still able to navigate the web and access information at the same speed. Which of the following most makes this possible:

Hierarchical DNS

Which of the following refers to chunks of data and their metadata, used to route and reassemble information on the Internet ?

Packets

Which of the following statements is an accurate interpretation of bandwidth speed?

The rate at which data is downloaded in a set amount of time.

Which of the following best explains how messages are typically transmitted over the Internet?

The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.

Which of the following statements about packets is FALSE?

The packet does not contain information about the sender's IP address.

Tom sends Troy an email, Which of the following statements about the way the email sent is NOT true?

The packets arrive at Troy's computer in the correct order so that they can be reassembled correctly.

Which of the following is an example of a subdomain of college.org to the domain name system (DNS)?

contact.college.org

Which term refers to the way in which information travels on the Internet, not as a single piece but in chunks?

datastreams


Related study sets

Chapter 57: Eye and Ear Problems (Adult)

View Set

Quiz 9/3: Social Security Benefits and Taxation

View Set

Criminal Justice Studies Midterm Exam 2023

View Set

CFA Level 1 - Section 2: Quantitative Methods - Reading 10 and 11: Probability and Sampling

View Set