Compsci Unit 2

Ace your homework & exams now with Quizwiz!

Given the following code, what is printed to the console? print "3" + "4"

34

router

A type of computer that forwards data across a network

How are protocols like HTTP, TCP, and IP created?

A worldwide group of volunteers draft revise, and publish protocols

How are protocols like HTTP, SMTP, and IP created?

A worldwide group of volunteers draft, revise, and publish protocols.

Which of the following statements is true regarding the networks that make up the Internet? Select TWO answers.

-All devices that are connected on a network use the same protocol -Different types of networks can be connected in order to transfer data and communicate

Convert the following number to a decimal value: AA (hex)

170

packet metadata

Data added to packets to help route them through the network and reassemble the original message

Which of the following refers to chunks of data and their metadata, used to route and reassemble information on the Internet ?

Packets

Which of the following statements is an accurate interpretation of bandwidth speed?

The number of files that can be downloaded in a set amount of time

Which of the following can be represented by a single binary digit? Select two answers.

The value of a Boolean variable The remainder when dividing a whole number by 2

Which of the following is true about data compression?

There are tradeoffs involved in choosing a compression technique for storing and transmitting data

Domain Name System (DNS)

the system responsible for translating domain names like example.com into IP addresses

IP address

unique number assigned to each device on the internet

Which of the following domain names are part of the same top tier? Select TWO ANSWERS

www.collegeB.edu www.collegeA.edu

Which of the following statements are true about routers and routing on the Internet? Choose two answers.

-A packet traveling between two computers on the Internet may be rerouted several times along the way or even dropped -Routers act independently and route packets as they see fit

4 bit number for 13

1101

fault tolerant

Can continue to function even in the event of an individual component failures, important because elements of complex systems like a computer network fail at unexpected times, often in groups

How does the hierarchical architecture of the DNS help the system scale?

Domain names have set structure, making them easy to organize and manage

The Internet, A Mobile Hotspot, School Computer Lab are examples of what?

IP

The Internet Engineering Task Force makes decisions by rough consensus, not by the majority of votes. What does this ensure about the Internet?

It is incredibly difficult to charge the common protocols and standards of the internet once they have been created.

Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?

Items placed in a Web store's shopping cart for future purchase during the anonymous browser will not be saved on the user's computer

Which of the following BEST describes how protocols on the Internet (e.g. IP, TCP, HTTP) make use of abstraction to accomplish their respective purposes?

Low level protocols can provide functionality to high level protocols without revealing the details of how this is accomplished

The _____________ takes inventory of all packets in the datastream to ensure they are successfully sent and received.

TCP

Which of the following best describes the ability of the two computers to communicate with each other across the Internet?

The computers can communicate directly because Internet communication uses standard protocols.

Which of the following terms can be described as sending all packets without checking whether they were received or ordered properly?

UDP

protocol

an agreed upon set of rules that specify the behavior of some system

TCP/IP does all of the below EXCEPT:

choose the path needed (which routers) to move a message from point A to point B

Which of the following is an example of a subdomain of college.org to the domain name system (DNS)?

contact.college.org

World Wide Web

information system where documents and other web resources are identified by Uniform Resource Locators (URLs, such as https://example.com/), which may be interlinked by hypertext, and are accessible over the Internet

The colors of pixels in a digital image are often represented by red, green, and blue values between 0 and 255 (an RGB triplet). A photographer is manipulating a digital image to lighten it because of the RGB values in the image are less than 100, making it very dark. He does this by adding 20 to the R, G, and B values of each pixel, then overwriting the original image. What type of transformation is the photographer using on the digital image? A. Lossless transformation B. Lossy transformation C. Multiband transformation D. Chrome Sampling transformation

lossless transformation

MP3 software works to cut down audio files using what form of compression?

lossy compression

Which of the following statements about packets is TRUE?

none

metadata

shows the app interface and the bits used behind the scenes

Transmission Control Protocol (TCP)

takes inventory of all packets in the data stream to ensure they are successfully sent and received

computer system

the combination of hardware, software, user and data

internet censorship

the control or suppression of what can be viewed, accessed, or published on the internet. It may be carried out by the government or by private organizations

Which of the following statements are true of the standards of the internet? Select TWO answers.

-Internet standards are specific procedures and rules that are created in order to benefit the Internet Community -Internet standards ensure that hardware and software created by different companies will be able to communicate with each other online.

Many networks are set up using a hierarchical architecture to create a "backbone" network. In this system, several connected routers act as the backbone, and many smaller LANs are connected to the backbone. This is much different than having a system where every router is connected to every other router. What are the benefits of the hierarchical approach to setting up a network? Select TWO answers

-It makes the process of transferring data much more efficient -It decreases congestion in the network

Which of the following statements are TRUE of the Internet? Select TWO ANSWERS.

-Most data can follow more than one path to the destination device -Most network routing on the Internet is hierarchical

Which of the following IS true about TCP/IP packets?

-Packets are numbered so if they arrive out of order they can be reassembled -Packets can be routed on different paths from sender to receiver. -Messages are broken into packets to improve the reliability of the Internet

Which of the following statements about redundancy on the Internet are TRUE? Select TWO answers

-Redundancy has good qualities; many devices can be added to the network without affecting traffic -Redundancy has good qualities; if several routers fail, data can still be transferred

Which of the following do HTTPS and SSL procedures ensure? Select TWO ANSWERS.

-That messages being sent are encrypted and thus secure -That the identity of the server involved in an interaction can be trusted

An author is considering publishing an e-book using a Creative Commons license. In which of the following situations would it be better for the author to use a Creative Commons license instead of a traditional copyright?

-The author wants to make the e-book available as a free download -The author wants to allow people permission to use and modify the e-book

If the post office delivered mail exactly like the routers deliver messages on the Internet, which of the following statements would be true? SELECT 2 ANSWERS

-The mailman would sometimes take a different path to deliver each letter to your home -Letters would be written on the outside of the envelope for all to read instead of letters put inside envelopes

A digital certificate is an attachment to an electronic message used for security purposes. The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be. Select TWO answers.

-The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be. and to provide the receiver with the means to encode a reply -Is an attachment to an electronic message used for security purposes

Which of the following statements are true of the Internet Engineering Task Force (IETF)? Select TWO ANSWERS.

-The most important work of the IETF is to create and maintain protocols like HTTP and TCP -The IETF is completely made up of volunteers from all over the world who do not need to attend meetings in person to participate

Which of the following are benefits of using well-named variables in computer programs?

-The program will be easier for people to read -The program will be easier to modify in the future

Each packet being routed around the internet contains header information about the packet itself, and it also contains part of the file being transferred. Imagine you are sending an image of a basketball player from computer A to computer B across the Internet. Of the following, which information would be contained in each packet's header? Select TWO.

-The sequence number of the packet in relation to all other packets of the image -The IP address of the destination computer

Which of the following are ways that the Internet has changed the way people collaborate? Select TWO answers.

-Video Conferencing software enables people to talk to co-worker's and friends -Cloud Computing allows people to work on the same document from different areas of the World

What 3 bits of data gives us green?

111

You have a coordinate grid that is 96 x 96. Assuming that you encode the x and y coordinate as separate numbers, what is the minimum number of bits that you will need to encode a coordinate in that space?

14: 7 bits to get 96 and 7+7=14

The new version of the Internet Protocol, IPv6, allows for IP addresses that are 128 bits long, How many possible IP addresses are available with IPv6?

2^128

Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?

2^32

A video streaming Web site uses 32-bit integers but has recently upgraded to 64 bit integers. Why?

2^32 more bits can be represented

The world is currently in a transition to using IPv6, a newer version of the IP protocol that uses 128-bit addresses instead of 32-bit addresses used by IPv4. What is the main problem that IPv6 was created to solve?

32-bit addresses could not ensure that every internet-connected device can receive a unique IP address

Two students are sending messages to one another using a 5-bit protocol. They decide to modify their protocol to 7-bit messages. How many move values can be represented in a 7-bit message than a 5-bit message?

4 times as many

What is the minimum number of bits you would need to encode the 26 letters of the alphabet plus a space and the digits 0- 9 for a total of 37 characters?

6 bits 000000

How many bits are necessary to convert 128 from decimal (base ten) to binary (base two)?

8

Digital certificates are issued by ...?

A certified instructor by Certification Authorities (CA). Like a central trusted body is used to issue driving licenses or passports, a CA fulfill the role of the Trusted Third Party by accepting Certificate applications from entities, authenticating applications, issuing Certificates and maintaining status information about the Certificates issued

Which of the following has the greatest potential for compromising a user's personal privacy?

A group of cookies stored by the user's Web browser

Which of the following statements is TRUE regarding Internet protocols?

All of the above are false.

Which of the following best explains what happens when a new device is connected to the Internet?

An Internet Protocol (IP) address is assigned to the device

What is a Distributed Denial of Service (DDoS) attack?

An attempt to compromise a single target by flooding it with requests from multiple systems

packet

Chunks of data and its metadata used to route and reassemble information, sent over a network

Why is the Domain Name System useful?

Domain names are easier for humans to remember than the IP addresses of frequently visited websites

New websites are being created every day, yet internet users are still able to navigate the web and access information at the same speed. Which of the following most makes this possible:

Hierarchical DNS

Which of the following identifies a device using the internet?

IP address

Which of the following best describes the basic idea of fault tolerance?

If part of the system fails, the operation continues without interruption

IPv6

Internet Protocol version 6 that was added so to make room for more IP addresses as the Internet grows

What are two standards of the Internet?

Internet standards ensure that hardware and software created by different companies will be able to communicate with each other online, Internet standards are specific procedures and rules that are created in order to benefit the Internet Community

How does a computer resolve a domain name into an IP address?

It asks a DNS server for the corresponding IP address

Which of the following is the best description of the term Internet censorship ?

It is the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative. Individuals and organizations may engage in self-censorship for moral, religious, or business reasons, to conform to societal norms, due to intimidation, or out of fear of legal or other consequences

Which of the following is the best description of the term Digital Divide?

It is the growing gap between the underprivileged members of society, especially the poor, rural, elderly, and handicapped portion of the population who do not have access to computers or the internet; and the wealthy, middle-class, and young Americans living in urban and suburban areas who have access

Which of the following is the best description of the term Net Neutrality?

It is the principle that Internet service providers (ISPs) must treat all Internet communications equally, and not discriminate or charge differently based on user, content, website, platform, application, type of equipment, source address, destination address, or method of communication.

Which of the following is an example of how the digital divide can affect data collection and analysis?

Members of an online social network are asked to watch a streaming video about a current event, and answer a survey. People on low-bandwidth networks that cannot handle streaming video would be unlikely to respond.

What is the primary reason that routing on the internet is redundant?

Networks are still available in case of a path rоuter failure

open use protocols

Open protocols provide a way to standardize data transmission between different devices

Which of the following is a primary reason for the use of open protocols on the Internet?

Open protocols provide a way to standardize data transmission between different devices.

Desktop computers, laptops, tablets, smartphones, and other devices are made by different companies, yet they are all able to access the Internet. This has led to the widespread use of the Internet from many different kinds of devices. Which of the following makes this possible?

Open standards and protocols

Which of the following statements about packets is TRUE?

Packets must be sent in order so they can be reassembled at end host.

A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following activities is LEAST likely to be effective in this purpose?

Putting all government forms on the city Website

A new device is given as IP address and added to a network so that it can access the Internet. Large amounts of files are uploaded and downloaded on this new device, but other users who were already online do not experience any difference in performance. Which of the following enables this phenomenon?

Redundant routers

Which of the following statements about TCP/IP is FALSE?

TCP/IP are the only protocols necessary to send and receive information over the Internet

IPv6

The Internet Protocol version 6 provides a large number of new addresses to route Internet traffic, using "from" and "to" addresses written as colon-hexadecimal notation, such as "fe80::42:acff:feaa:1bf0".

Which of the following best describes the relationship between the World Wide Web and the Internet?

The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.

Which of the following best explains how messages are typically transmitted over the Internet?

The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.

Which of the following statements about packets is FALSE?

The packet does not contain information about the sender's IP address

Tom sends Troy an email, Which of the following statements about the way the email sent is NOT true?

The packets arrive at Troy's computer in the correct order so that they can be reassembled correctly.

Why was IPv6 introduced as the new version of the Internet Protocol?

With only 32 bit IP addresses, the older version could not support the large number of devices connecting to the internet.

Which of the following scenarios is most characteristic of a phishing attack?

You get an email from the IT support desk that asks you to send a reply email with your username and password to verify your account.

Hypertext Transfer Protocol (HTTP)

a protocol for computers to request and share the pages that make up the world wide web on the Internet

internet protocol

a protocol for sending data across the Internet that assigns unique numbers(IP addresses) to each connected device

computer network

computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes

net neutrality

concept that all data on the internet should be treated equally by corporations, such as internet service providers, and governments, regardless of content, user, platform, application or device

Which term refers to the way in which information travels on the Internet, not as a single piece but in chunks?

datastreams

digital divide

differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics

computer device

electronic devices which take inputs, process the inputs and then calculate results from the inputs

redundancy

inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network

bandwidth speed

the maximum amount of data that can be sent in a set amount of time

Internet

the publicly available worldwide system of interconnected computer networks (Links to an external site.) that transmit data by packet switching (Links to an external site.) over the Internet Protocol (Links to an external site.)


Related study sets

Producer Licensing, and Other Regulations

View Set

Biology 101 - Midterm (Units 1-4)

View Set

Chapter 7: The News and Social Media POLS 1336 UH

View Set

Exam 3 Sole Ch. 14-16 IGGY Ch. 32, 44-45, 68

View Set

Public Speaking: Ch. 5 - Adapting to your Audience and Situation

View Set

Congress (Chapter 6) Multiple Choice

View Set