Finals Study Guide_Unit 2

Ace your homework & exams now with Quizwiz!

Which of the following is a characteristic of the fault-tolerant nature of routing on the Internet? Responses A The ability to use a hierarchical naming system to avoid naming conflicts B The ability to provide data transmission even when some connections have failed C The ability to resolve errors in domain name system (DNS) lookups D The ability to use multiple protocols such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (SMTP) to transfer data

The ability to provide data transmission even when some connections have failed

The figure below represents a network of physically linked computers labeled A through G. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. For example, information can be sent directly between computers A and B, but information sent between computers A and C must go through other computers. Which of the following statements about security in the network is true? Computers A and D need to communicate with at least two additional computers in the network in order to communicate with each other. Computers B and C can communicate with each other without additional computers being aware of the communication. Responses A. I only B. II only C. I and II D. Neither I nor II

|| only

The figure below represents a network of physically linked devices, labeled A through H. A line between two devices indicates a connection. Devices can communicate only through the connections shown. What is the minimum number of connections that would need to be removed from the network in order for device A to not be able to communicate with device F? Responses A. 2 B. 3 C. 4 D. 5

2

The figure below represents a network of physically linked computers labeled A through G. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. For example, information can be sent directly between computers A and B, but information sent between computers A and C must go through other computers. What is the minimum number of connections that must be broken or removed in the network before computer E can no longer communicate with computer F? Responses A. 1 B. 2 C. 3 D. 4

3

Which of the following school policies is most likely to have a positive impact on the digital divide? Responses A A school allows students to bring a graphing calculator from home to complete in-class mathematics assignments. B A school allows students to bring a tablet computer to class every day to participate in graded quizzes. C A school provides a laptop or tablet computer to all students enrolled at the school. D A school recommends that all students purchase a computer with as much processing speed as possible so that projects run faster.

A school provides a laptop or tablet computer to all students enrolled at the school.

Which of the following best explains what happens when a new device is connected to the Internet? Responses A A device driver is assigned to the device. B An Internet Protocol (IP) address is assigned to the device. C A packet number is assigned to the device. D A Web site is assigned to the device.

An Internet Protocol (IP) address is assigned to the device.

Researchers have developed a simulation of packets traveling between server computers and client computers in a network. Of the following, which two outcomes are most likely to be results of the simulation? Select two answers. response - correct Responses A Better understanding of the effect of temporarily unavailable network connections B Better understanding of the effect of using hexadecimal representations for binary data C Better understanding of the impact of access to public data in identifying solutions to problems D Better understanding of the impact of increased connection speeds for frequently visited servers

Better understanding of the effect of temporarily unavailable network connections Better understanding of the impact of increased connection speeds for frequently visited servers

Which of the following best explains how fault tolerance in a network is achieved? Responses A By providing high-bandwidth connections between devices, enabling data packets to be transmitted as quickly as possible B By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component C By providing open network protocols, ensuring that all devices on the network are interacting in a standard way D By providing software to monitor all network traffic, ensuring that data packets are sent and received in the proper order

By providing multiple paths between devices, enabling routing to occur even in the presence of a failed component

Which of the following actions is most likely to help reduce the digital divide? Responses A Adding a requirement that all users of a popular social media site link their accounts with a phone number. B Deploying satellites and other infrastructure to provide inexpensive Internet access to remote areas of Earth C Digitizing millions of books from university libraries, making their full text available online D Offering improved Internet connections to Internet users who are willing to pay a premium fee for more bandwidth

Deploying satellites and other infrastructure to provide inexpensive Internet access to remote areas of Earth

Which of the following best explains how data is typically assembled in packets for transmission over the Internet? Responses A Each packet contains data to be transmitted, along with metadata containing information used for routing the data. B Each packet contains an encrypted version of the data to be transmitted, along with metadata containing the key needed to decrypt the data. C Each packet contains only the metadata used to establish a direct connection so that the data can be transmitted. D Each packet contains multiple data files bundled together, along with metadata describing how to categorize each data file.

Each packet contains data to be transmitted, along with metadata containing information used for routing the data.

The figure below represents a network of physically linked devices, labeled A through F. A line between two devices indicates a connection. Devices can communicate only through the connections shown. Which of the following statements are true about the ability for devices A and C to communicate? Select two answers. response - correct Responses A If devices B and D were to fail, then information sent from device A could not reach device C. B If devices B and F were to fail, then information sent from device A could not reach device C. C If devices D and F were to fail, then information sent from device A could not reach device C. D If devices E and F were to fail, then information sent from device A could not reach device C.

If devices B and D were to fail, then information sent from device A could not reach device C. If devices D and F were to fail, then information sent from device A could not reach device C.

Which of the following is a primary benefit of making a computing system fault-tolerant? Responses A If one component of the system fails, users of the system can often still access it. B If one component of the system is hacked, no information will be stolen. C If the system becomes too expensive, making it fault-tolerant will save money. D If the system cannot operate efficiently, making it fault-tolerant will speed up its operation.

If one component of the system fails, users of the system can often still access it.

Which of the following is a primary reason for the use of open protocols on the Internet? Responses A Open protocols allow devices to specify how data packets are to be routed on the Internet in advance. B Open protocols ensure that all data transmission on the Internet is kept secure. C Open protocols ensure that all Internet users are provided connections with equal bandwidth. D Open protocols provide a way to standardize data transmission between different devices.

Open protocols provide a way to standardize data transmission between different devices.

Which of the following actions is most likely to be effective in reducing the digital divide at a local level? Responses A Creating an application that offers coupons and discounts for local businesses B Offering a discount to utility customers who pay their bills online instead of by mail C Providing free community access to computers at schools, libraries, and community centers D Requiring applicants for local government jobs to complete an online application

Providing free community access to computers at schools, libraries, and community centers

A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following activities is LEAST likely to be effective in this purpose? Responses A Holding basic computer classes at community centers B Providing free wireless Internet connections at locations in low-income neighborhoods C Putting all government forms on the city Web site D Requiring that every city school has computers that meet a minimum hardware and software standard

Putting all government forms on the city Web site

Which of the following is LEAST likely to be a contributing factor to the digital divide? Responses A Some individuals and groups are economically disadvantaged and cannot afford computing devices or Internet connectivity. B Some individuals and groups do not have the necessary experience or education to use computing devices or the Internet effectively. C Some parents prefer to limit the amount of time their children spend using computing devices or the Internet. D Some residents in remote regions of the world do not have access to the infrastructure necessary to support reliable Internet connectivity.

Some parents prefer to limit the amount of time their children spend using computing devices or the Internet.

Which of the following best explains how the Internet is a fault-tolerant system? Responses A The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace. B The Internet is fault-tolerant because there are usually multiple paths between devices, allowing messages to sometimes be sent even when parts of the network fail. C The Internet is fault-tolerant because users can transmit messages using a variety of different protocols, allowing them to use devices from any manufacturer. D The Internet is fault-tolerant because users usually understand and accept the fact that servers sometimes fail, allowing network engineers to repair faulty devices as quickly as possible.

The Internet is fault-tolerant because there are usually multiple paths between devices, allowing messages to sometimes be sent even when parts of the network fail.

Which of the following best describes the relationship between the World Wide Web and the Internet? Responses A The World Wide Web is a protocol that is accessed using a data stream called the Internet. B The World Wide Web is a system of linked pages, programs, and files that is accessed using a data stream called the Internet. C The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet. D The World Wide Web is a Web site that is accessed using a protocol called the Internet.

The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.

Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes the ability of the two computers to communicate with each other across the Internet? Responses A The computers cannot communicate because different manufacturers use different communication protocols. B The computers can communicate, but additional hardware is needed to convert data packets from one computer's protocol to the other computer's protocol. C The computers can communicate directly only if the messages consist of text; other formats cannot be interpreted across computers. D The computers can communicate directly because Internet communication uses standard protocols.

The computers can communicate directly because Internet communication uses standard protocols.

A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent to the user? Responses A The file is broken into packets for transmission. The packets must be reassembled upon receipt. B The file is broken into packets for transmission. The user's browser must request each packet in order until all packets are received. C The server attempts to connect directly to the user's computer. If the connection is successful, the entire file is sent. If the connection is unsuccessful, an error message is sent to the user. D The server repeatedly attempts to connect directly to the user's computer until a connection is made. Once the connection is made, the entire file is sent.

The file is broken into packets for transmission. The packets must be reassembled upon receipt.

Which of the following best explains how messages are typically transmitted over the Internet? Responses A The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient's device. B The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device. C The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient's device. D The message is transmitted as a single file and received in whole by the recipient's device.

The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.

The following figure represents a network of physically linked devices labeled P through S. A line between two devices indicates a connection. Devices can communicate only through the connections shown. Which of the following statements best explains the ability of the network to provide fault tolerance? Responses A The network is considered fault-tolerant because there are redundant paths between each pair of devices. B The network is considered fault-tolerant because it guarantees that no individual component will fail. C The network is not considered fault-tolerant because it relies on physical connections. D The network is not considered fault-tolerant because it provides more paths than are needed.

The network is considered fault-tolerant because there are redundant paths between each pair of devices.

According to the domain name system (DNS), which of the following is a subdomain of the domain example.com? Responses A about.example.com B example.co.uk C example.com.org D example.org

about.example.com


Related study sets

med/surg chap 46 Myasthenia Gravis & Guillain Barre

View Set

Anatomy and Positioning of the Bony Thorax, Sternum and Ribs

View Set

Info 360 Chapter 10, Management Info CH. 9, MIS9, Management Info CH. 9

View Set