BIT 5594 Ch. 3 Study Guide

Ace your homework & exams now with Quizwiz!

________ is used to allow remote login on another computer. a. Telnet b. FTP c. HTTP d. SSL

a. Telnet

The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called: 1. VoIP. 2. IPTP. 3. VTP. 4. IP.

1. VoIP.

Cortana is a type of: 1. intelligent personal assistant. 2. widget. 3. gadget. 4. social network.

1. intelligent personal assistant.

A(n) ________ allows users to easily add and edit content on a web page. 1. wiki 2. podcast 3. blog 4. RSS feed

1. wiki

Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet? 1. HTTP 2. BGP 3. FTP 4. SMTP

2. BGP

The address used by a browser to identify the location of content on the Web is called: 1. a domain name. 2. a uniform resource locator. 3. an IP address. 4. a file path.

2. a uniform resource locator.

Which of the following enables Internet users to communicate with each other, although not in real time? 1. mobile messaging 2. online forum 3. SMS messaging 4. VoIP

2. online forum

Snapchat's Lenses feature is an example of which of the following? 1. virtual reality 2. artificial intelligence 3. augmented reality 4. chatbot

3. augmented reality

Internet traffic is predicted to ________ by 2019. 1. decrease 2. double 3. triple 4. quadruple

3. triple

Which of the following is not a mobile messaging application? 1. Kik 2. WhatsApp 3. Viber 4. Feedly

4. Feedly

T or F: Bluetooth is an advanced form of DSL.

False

T or F: FTP is the protocol that provides the Internet addressing scheme.

False

T or F: IPv6 provides for 32-bit IP addresses.

False

T or F: Packet switching requires a dedicated circuit.

False

T or F: TLS is a protocol used to transfer files to and from a server.

False

T or F: Tier 3 ISPs provide long-haul fiber-optic networks that comprise the Internet's backbone.

False

T or F: WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access.

False

T or F: A private cloud is operated solely for the benefit of a single tenant.

True

T or F: Amazon Web Services is an example of cloud computing.

True

T or F: HTML is used to format the structure and style of a web page.

True

T or F: HTTP/2 is supported by almost all the leading web browsers.

True

T or F: Internet2 provides a nationwide 100 gigabit-per-second network.

True

T or F: T1 and T3 refer to international telephone standards for digital communication.

True

T or F: The Internet of Things (IoT) is based on sensors that collect data and connect to the Internet.

True

T or F: The major hubs in the United States where the Internet backbone intersects with regional and local networks are now commonly referred to as Internet Exchange Points (IXPs).

True

In the address http://www.company.com/clients.html, which of the following is the top-level domain? a. .com b. company.com c. www d. http

a. .com

Which of the following statements about cloud computing is not true? a. A public cloud is typically used by companies with stringent privacy and security requirements. b. Dropbox is an example of a public cloud. c. Hybrid clouds offer both public and private cloud options. d. A private cloud hosted internally or externally.

a. A public cloud is typically used by companies with stringent privacy and security requirements.

The ________ helps define the overall structure of the Internet. a. IAB b. IESG c. W3C d. ITU

a. IAB

Which of the following protocols is used to send mail to a server? a. IMAP b. FTP c. HTTP d. SSL

a. IMAP

Which of the following is not true about the mobile platform? a. Most smartphones use Intel chips. b. The number of cell phones worldwide exceeds the number of PCs. c. Over a third of the world's cell phones are smartphones. d. Smartphones use flash memory chips.

a. Most smartphones use Intel chips.

________ is a utility program that allows you to check the connection between your client and a TCP/IP network. a. Ping b. Telnet c. Tracert d. Finger

a. Ping

The major technologies used with wireless local area networks are: a. Wi-Fi and Bluetooth. b. Wi-Fi and WiMax. c. Bluetooth and 3G. d. WiMax and 3G.

a. Wi-Fi and Bluetooth.

Which of the following is a set of rules for transferring data? a. protocol b. packet c. router d. address

a. protocol

Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations? a. routers b. web servers c. IP servers d. packet servers

a. routers

Which of the following is not a concern about IoT? a. the high cost of sensors b. interoperability c. security d. privacy

a. the high cost of sensors

How long does it take for 300,000 X-rays to be transmitted on a 100-gbps network? a. 10 seconds b. 1 minute c. 10 minutes d. 1 hour

b. 1 minute

Which of the following is not an advantage of client/server computing over centralized mainframe computing? a. It is easy to expand capacity by adding servers and clients. b. Each client added to the network increases the network's overall capacity and transmission speeds. c. Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer. d. There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.

b. Each client added to the network increases the network's overall capacity and transmission speeds.

Which of the following is not one of the basic technological foundations of the Internet? a. client/server computing b. FTP c. TCP/IP d. packet switching

b. FTP

During which phase of the development of the Internet was the Domain Name System (DNS) introduced? a. Commercialization b. Institutional c. Innovation d. Consolidation

b. Institutional

The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication is called the: a. Network Technology Substrate layer. b. Middleware Services layer. c. Transport Services and Representation Standards layer. d. Applications layer.

b. Middleware Services layer.

The first web browser to make it possible to view documents on the Web with colored background, images, and animations was: a. Netscape Navigator. b. Mosaic. c. Mozilla. d. Internet Explorer.

b. Mosaic.

What country intends to be the first to use Project Loon to provide universal Internet access? a. New Zealand b. Sri Lanka c. Ghana d. Australia

b. Sri Lanka

The backbone of the Internet is formed by: a. Internet Exchange Points (IXPs). b. Tier 1 ISPs. c. Network Access Points (NAPs). d. Metropolitan Area Exchanges (MAEs).

b. Tier 1 ISPs.

The Internet Layer of TCP/IP is responsible for which of the following? a. placing packets on and receiving them from the network medium b. addressing, packaging, and routing messages c. providing communication with the application by acknowledging and sequencing the packets to and from the application d. providing a variety of applications with the ability to access the services of the lower layers

b. addressing, packaging, and routing messages

Where does TLS operate within TCP/IP? a. between the Internet Layer and the Transport Layer b. between the Transport Layer and the Application Layer c. between the Network Interface Layer and the Transport Layer d. between the Internet Layer and the Application Layer

b. between the Transport Layer and the Application Layer

What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world? a. Bluetooth b. drones c. WLANs d. DSL

b. drones

All of the following statements about mobile apps are true except: a. the average U.S. consumer now spends more time using mobile apps than watching television. b. iOS apps are cross-platform, open-source applications. c. over 130 billion apps have been downloaded from the Apple App Store. d. almost all the top 100 brands have a presence in at least one of the major app stores.

b. iOS apps are cross-platform, open-source applications.

Which of the following refers to delays in messages caused by the uneven flow of information packets through the network? a. redundancy b. latency c. Net neutrality d. QOS

b. latency

Which of the following are central directories that list all domain names currently in use for specific domains? a. web servers b. root servers c. client servers d. DNS servers

b. root servers

Which of the following was the original purpose of the Internet? a. to provide a network that would allow businesses to connect with consumers b. to link large mainframe computers on different college campuses c. to develop military communications systems that could withstand nuclear war d. to enable government agencies to track civilian communications

b. to link large mainframe computers on different college campuses

During which period of time did the Institutionalization phase of Internet development take place? a. 1950-1960 b. 1961-1974 c. 1975-1995 d. 1995-through the present

c. 1975-1995

Which of the following statements about fiber-optic cable is not true? a. It transmits more data at faster speeds than coaxial or twisted pair cable. b. It is thinner and lighter than coaxial or twisted pair cable. c. As of 2016, a majority of U.S. homes have fiber connections. d. Telecommunications firms have made substantial investments in cross-country fiber optic systems in the last decade.

c. As of 2016, a majority of U.S. homes have fiber connections.

Which of the following is currently the most popular web browser? a. Internet Explorer b. Safari c. Chrome d. firefox

c. Chrome

Which of the following is the core communications protocol for the Internet? a. Telnet b. FTP c. TCP/IP d. TLS

c. TCP/IP

TCP/IP operates in which layer of Internet architecture? a. Network Technology Substrate layer b. Middleware Services layer c. Transport Services and Representation Standards layer d. Applications layer

c. Transport Services and Representation Standards layer

The ________ allows a natural language expression, such as Google.com, to represent a numeric IP address. a. uniform resource locator system b. Internet protocol addressing schema c. domain name system d. assigned numbers and names system

c. domain name system

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called: a. routing. b. the Transmission Control Protocol (TCP). c. packet switching. d. the File Transfer Protocol (FTP).

c. packet switching.

The Transport Layer of TCP/IP is responsible for which of the following? a. placing packets on and receiving them from the network medium b. addressing, packaging, and routing messages c. providing communication with the application by acknowledging and sequencing the packets to and from the application d. providing a variety of applications with the ability to access the services of the lower layers

c. providing communication with the application by acknowledging and sequencing the packets to and from the application

An IPv4 address is expressed as a: a. 32-bit number that appears as a series of four separate numbers separated by semicolons. b. 64-bit number that appears as a series of four separate numbers separated by semicolons. c. 64-bit number that appears as a series of four separate numbers separated by periods. d. 32-bit number that appears as a series of four separate numbers separated by periods.

d. 32-bit number that appears as a series of four separate numbers separated by periods.

Which IEEE 802.11 standard provides for throughput of up to 7 Gbps? a. 802.11a b. 802.11b c. 802.11ac d. 802.11ad

d. 802.11ad

The Web runs in which layer of Internet architecture? a. Network Technology Substrate layer b. Middleware Services layer c. Transport Services and Representation Standards layer d. Applications layer

d. Applications layer

________ is a model of computing in that computer processing, storage, software, and other services are provided as a shared pool of virtualized resources over the Internet. a. Client/server computing b. P2P computing c. Mobile computing d. Cloud computing

d. Cloud computing

Which of the following is not a basic type of cloud computing service? a. IaaS b. PaaS c. SaaS d. FiOS

d. FiOS

The concept behind document formatting has its roots in which of the following? a. XML b. SGML c. HTML d. GML

d. GML

Which of the following organizations involved with Internet governance has the United States recently given up control over? a. ICANN b. IGF c. NTIA d. IANA

d. IANA

Which of the following organizations coordinate the Internet's systems of unique identifiers, such as IP addresses and top-level domain systems? a. IETF b. IAB c. W3C d. ICANN

d. ICANN

The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices. a. Internet Engineering Steering Group (IESG) b. World Wide Web Consortium (W3C) c. Internet Engineering Task Force (IETF) d. Internet Society (ISOC)

d. Internet Society (ISOC)

Which of the following occurred during the Commercialization phase of Internet development? a. The fundamental building blocks of the Internet were realized in actual hardware and software. b. Personal computers were invented. c. The Domain Name System (DNS) was introduced. d. NSF privatized the operation of the Internet's backbone.

d. NSF privatized the operation of the Internet's backbone.

Which of the following is a utility program that allows you to track the path of a message sent from a client computer to a remote computer on the Internet? a. Telnet b. Ping c. IMAP d. Tracert

d. Tracert

All of the following are involved in the effort to create standards for IoT except: a. AllSeen Alliance. b. Industrial Internet Consortium. c. Open Connectivity Foundation. d. W3C.

d. W3C.

You could expect to find the following services in a web server software package except: a. security services. b. FTP. c. search engine. d. an-RSS aggregator.

d. an-RSS aggregator.

Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture? a. fiber optics b. Wi-Fi c. IPv6 d. client/server computing

d. client/server computing

When talking about the physical elements of the Internet, the term redundancy refers to: a. transmitting multiple copies of a single packet to safeguard against data loss. b. the use of tiered high-speed switching computers to connect the backbone to regional and local networks. c. delays in messages caused by the uneven flow of information through the network. d. multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

d. multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

All of the following are characteristics of HTML5 except: a. a video element that replaces plug-ins such as Flash, QuickTime, and RealPlayer. b. use of CSS3. c. ability to access built-in functionality of mobile devices, such as GPS and swiping. d. support for digital rights management.

d. support for digital rights management.

Which of the following is not a limitation of the current Internet? a. the continued reliance on cables and wires for connectivity b. limited bandwidth, which causes congestion and cannot adequately handle video and voice traffic c. architectural restrictions, which stipulate that numerous requests for the same file must each be answered individually, slowing network performance d. the difficulty in expanding capacity by adding servers and clients

d. the difficulty in expanding capacity by adding servers and clients


Related study sets

AP Macro Unit 5 Review- Topic 5.5: Crowding Out

View Set

cellular respriation and fermentation

View Set

A & P II: Chapter 24: Urinary System

View Set

CTE Exam Prep Quiz: IT A+ Practice Quiz 4

View Set