CSP Internet Review 2 TPT
The "speedup" of a parallel system is measured by taking the sequential execution time of a process and dividing it by the parallel execution time of a process. You are given the following three processes: What is the speedup of all three process in a parallel system? (A) 115/60 (B) 115/20 (C) 60/20 (D) 55/115
(A) 115/60
How does a computer turn a domain name into an IP address? (A) It asks a DNS server for the corresponding IP address (B) It scans addresses until it finds the one it's looking for (C) It uses a Border Gateway Protocol to get the address from a nearby computer. (D) It creates an IP address for the domain, and shares it with the closest DNS.
(A) It asks a DNS server for the corresponding IP address
Data traveling the internet is broken down into packets. What is the protocol that determines how the data is broken down into packets from transmission? (A) TCP (B) IP (C) DNS (D) HTML
(A) TCP
When does sequential computing work better than parallel computing? (A) When a task needs to be completed before another task can begin (B) When you can do 2 or more tasks at the same time (C) When you have run out of space on your CPU (D) When you are doing the same task over and over again, sequential computing would be faster than parallel computing.
(A) When a task needs to be completed before another task can begin
What is the purpose of switching from IPv4 to IPv6? (A) IPv6 allows for a safer connection to the Internet, since you can use HTTPS with the address. (B) IPv6 allows for more IP addresses than IPv4. (C) IPv4 is too slow to accommodate modern computers. (D) It is easier to get a fake IPv4 address than it is to get a fake IPv6 address, so they are switching over for security purposes.
(B) IPv6 allows for more IP addresses than IPv4.
What does it mean when we say the Internet is redundant? (A) Parts of it are unnecessary. (B) If a path is down, packets can be routed a different way. (C) It has a delay between the request and the response to the request. (D) If there is an error, a backup system is brought online to be used.
(B) If a path is down, packets can be routed a different way.
Which of the following best describes the basic idea of fault tolerance? (A) A system that never fails. (B) If part of the system fails, the operation continues without interruption. (C) A program that does not allow inputs out of a range given by the programmer. (D) A program that does not allow loss of precision.
(B) If part of the system fails, the operation continues without interruption.
How does the end-to-end architecture of the Internet work? (A) It's designed like a circle; so ironically, there are no "ends". (B) Packets are created at the sender's end and reassembled at the receiver's end. (C) It uses HTML to share documents among users when requested through their web browsers. (D) It creates redundancy, so when part of the Internet is down, information can keep flowing.
(B) Packets are created at the sender's end and reassembled at the receiver's end.
How do the World Wide Web and the Internet work together? (A) They perform the same functionality. (B) The Web using HTTP to share data and information using the Internet. (C) The Internet uses the Web to connect devices to share data. (D) The Internet has the "deep" net and "dark" net but the Web does not.
(B) The Web using HTTP to share data and information using the Internet.
There are four processes a computer must execute (and the time it will take the computer) below: E and G are put in a parallel system together and F and H are put in a parallel system together. Which of the following is a true statement? (A) The parallel system of E and G will finish first. (B) The parallel system of F and H will finish first. (C) Both parallel systems will finish at the same time. (D) There is not enough information to answer the question.
(B) The parallel system of F and H will finish first.
Let's assume that your Internet Service Provider (ISP) promotes that their bandwidth is 2 MB per second. The latency of a packet traveling from your favorite website's server to your computer is 1 millisecond (ms). Which of the following scenarios would most likely have the GREATEST potential for increasing the speed of information flow from your favorite website's server to your computer? (A) Your ISP changes its bandwidth to 2.5 MB per second, and latency from your favorite website's server to your computer is changed to 1.5 ms. (B) Your ISP changes its bandwidth to 2.5 MB per second, and latency from your favorite website's server to your computer is changed to 0.75 ms. (C) Your ISP changes its bandwidth to 1.5 MB per second, and latency from your favorite website's server to your computer is changed to 1.5 ms . (D) Your ISP changes its bandwidth to 1.5 MB per second, and latency from your favorite website's server to your computer is changed to 0.75 ms.
(B) Your ISP changes its bandwidth to 2.5 MB per second, and latency from your favorite website's server to your computer is changed to 0.75 ms.
The figure below represents a network of physically linked computers labeled A through F. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. For example, information can be sent directly between computers B and D, but information sent between B and E must go through other computers. What is the minimum number of connections that must be broken or removed in the network before computer A can no longer communicate with computer F? (A) 1 (B) 2 (C) 3 (D) 4
(C) 3
Which of the following statements are true about routers and routing on the Internet? Choose two answers. (A) Protocols ensure that a single path between two computers is established before sending packets over it. (B) Routers are hierarchical and the "root" router is responsible for communicating to sub-routers the best paths for them to route internet traffic. (C) A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or "dropped". (D) Routers act independently and route packets as they see fit.
(C) A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or "dropped". (D) Routers act independently and route packets as they see fit.
How do Internet packets travel to their destination? (A) Along the same path and always in the same order. (B) Along the same path and potentially out of order. (C) Along a variety of different paths and potentially out of order. (D) Along a variety of different paths and always in the same order.
(C) Along a variety of different paths and potentially out of order.
) How do TCP and IP interact? (A) IP forwards the data to the DNS server to identify which TCP to use. (B) TCP hands off control to HTTP, which passes it to IP. (C) TCP creates packets from the data to be sent and transfers control to IP for routing. (D) IP uses the SSL in conjunction with TCP to securely send data.
(C) TCP creates packets from the data to be sent and transfers control to IP for routing.