ITQ 14
2) create and formate Web pages
"Html" is used to: 1) load content from a default page 2) create and formate Web pages 3) generate custom content for users 4) exchange mail with other e-mail servers 5) transfer files from flash drives
Network Address Translation (NAT)
A technique known as _____________ uses a gateway that allows multiple devices to share a single IP address. This can be useful in organizations that have a limited number of conventional IP addresses.
Packet, datagram
A unit of data forwarded by a network is called a ____________.
Router
A(n) ____________ is a computing device that connects networks and exchanges data between them.
1) cache
A(n) _____________ is a temporary storage space used to speed computing tasks. 1) cache 2) IP address 3) Protocol 4) domain name service 5) hypertext markup language
1) True
Changing the letter case when typing in host and domain names does not affect the user's ability to reach the destination. 1) True 2) False
2) False
Circuit-switched networks are advantageous because they offer an inexhaustible supply of bandwidth for telecommunications. 1) True 2) False
2) is dedicated for use by the parties for the duration of a connection
Circuit-switched networks provide connection between two parties that: 1) uses a single router for each individual on either end of the connection 2) is dedicated for use by the parties for the duration of a connection 3) repeatedly switches between an open and closed state depending on whether someone is speaking or other noise is being transmitted during a call 4) slices up the conversation into smaller chunks and transmitting them over a shared circuit that mixes content with other callers but routes and reassembles a call to the correct recipient 5) prioritizes voice calls over other connections on IP networks
1) True
Computer programs making decisions without any human intervention conduct most U.S. stock trading 1) True 2) False
1) True
DSL technology is less efficient for service providers in the United States because many of their customers live in less-densely populated suburbs and rural areas. 1) True 2) False
2) False
Dot-com domain name registration is carried out on an auction basis to ensure the highest bidder gains rights to the desired domain name. 1) True 2) False
1) True
IP addresses can oftentimes be used to identify a user's geographical location. 1) True 2) False
2) False
ISPs and IXPs that carry out peering are required by the FCC to charge each other fees based on their traffic contribution. 1) True 2) False
2) False
In the URL, the host name is the name of the network a user tries to connect to. 1) True 2) False
4) packet-switched networks
Internet networks are _____________. 1) bit-switched networks 2) circuit-switched networks 3) data-switched networks 4) packet-switched networks 5) byte-switched networks
3) Cybersquatting
Key Inc., an American guitar maker, recently lost an action to recover the domain name piano-key.com, claiming that the defendant infringed on its registered trademark. What did Key Inc. specifically accuse the defendant of? 1) Sugging 2) Computer trespassing 3) Cybersquatting 4) Domain hoarding 5) Internet stalking
5) it ensures that the load of requests to their sites do not overwhelm a single computer
Popular sites like Google and Yahoo! have several computers assigned to their host names because: 1) they have operations in different countries 2) they are registered under several generic top-level domain names 3) of the different devices used to access these web sites 4) hoarding all information in one server is expensive 5) it ensures that the load of requests to their sites do not overwhelm a single computer
Latency
The phrase ____________ is used by technologists to refer to delay.
Simple Mail Transfer Protocol (SMTP)
The protocol used for exchange of mail between e-mail servers across the world is called ______________.
1) True
A Web address without a file name will load content from a default page. 1) True 2) False
3) protocol
A ___________ enables communication by defining the format of data and rules for exchange. 1) nomenclature 2) regulation 3) protocol 4) dialect 5) convention
1) True
A device gets its IP address from whichever organization is currently connecting it to the Internet. 1) True 2) False
4) Web hosting service
A firm that provides hardware and services to run Web sites of others is known as a(n) _____________. 1) Web site incubator 2) Internet service facilitator 3) Web domain name registrar 4) Web hosting service 5) Internet Web fab
1) True
Many fear that innovation may suffer as a result of the transition of Internet services from flat rate pricing to metered usage. 1) True 2) False
1) True
Many residential providers of cable technology use a system that requires customers to share bandwidth with neighbors. 1) True 2) False
2) False
Most mobile cell phone services are exempted from having to license the wireless spectrum for transmission. 1) True 2) False
3) systems used by many providers require customers to share bandwidth with neighbors
One of the disadvantages of cable technology is that: 1) it is more expensive than other signal-carrying systems 2) while it works well for television signals, it is ineffective for data transmissions required by the Internet 3) systems used by many providers require customers to share bandwidth with neighbors 4) it is incompatible with most modern communication systems 5) the speed of the connection rises in conjunction with the distance between the end customers from the central hub.
5) the invention of graphical Web browsing
One of the factors that accelerated the development of the Internet during the 1990s was: 1) the introduction of the personal computer into households 2) the government's taking over of the Internet's operating structure from private players 3) Intel's invention of low power processors used in portable computers 4) the creation of the Windows and Mac OS operating systems 5) the invention of graphical Web browsing
1) route message packets to the final destination
One of the functions of the IP is to: 1) route message packets to the final destination 2) slice up the message into smaller chunks of data called packets, to be sent over the network 3) check for damaged or corrupt message packets and request for replacements, if needed. 4) label message packets with source and destination addresses 5) rearrange message packets in the same sequence as they were sent
4) a situation when separate ISPs connect their networking equipment together to share traffic
Peering refers to: 1) high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet 2) the broadband service provided via light-transmitting fiber-optic cables 3) the language used to compose Web pages 4) a situation when separate ISPs connect their networking equipment together to share traffic 5) a system that connects end users to the Internet
4) IXPs
Peering usually takes place at neutral sites called ____________. 1) https 2) IPs 3) ISPs 4) IXPs 5) STPs
1) True
Routers don't have perfect, end-to-end information on all points in the Internet. 1) True 2) False
2) False
Routing protocol that is in charge of forwarding packets on the Internet is known as voice over Internet protocol. 1) True 2) False
1) True
Servers or organizations do not need to be housed within a country in order to use a country code as part of their domain name. 1) True 2) False
1) Web browsers and Web servers
The hypertext transfer protocol (http) defines the communication between: 1) Web browsers and Web servers 2) operating systems and Web browsers 3) hardware and operating systems 4) mail servers and hardware 5) hardware and Web browsers
2) False
TCP and IP operate above http and the other application transfer protocols. 1) True 2) False
5) Transmission Control Protocol
The Internet Protocol Suite consists of the Internet Protocol and ____________. 1) File Transfer Protocol 2) Simple Mail Transfer Protocol 3) Session Initiation Protocol 4) Datagram Congestion Control Protocol 5) Transmission Control Protocol
1) True
The Internet has no center and no one owns it. 1) True 2) False
1) True
The TCP works at both ends of Internet communication. 1) True 2) False
1) True
The User Datagram Protocol (UDP) acts as a substitute to TCP when there is a need for speed of communication, but where perfect and complete transmission quality can be sacrificed. 1) True 2) False
4) High Frequency Trading
The acronym HFT refers to: 1) High Finance Telecommunications 2) High Fidelity Transmissions 3) Hedge Fund Transfers 4) High Frequency Trading 5) Hypertext File Transfer
2) uniform resource locator
The address one types into a Web browser is also known as a: 1) universal redirection link 2) uniform resource locator 3) unique resource locator 4) universal redirection locator 5) uniform resource link
5) mapping host and domain names to IP addresses of computers
The domain name service (DNS) is a distributed database that allows users to communicate with other computers by: 1) assigning IP addresses to different domain names 2) mapping host names to domain names 3) creating IP addresses that are unique to servers 4) assigning domain names to different IP addresses 5) mapping host and domain names to IP addresses of computers
4) cache poisoning
The exploit referred to as _______________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request. 1) cybersquatting 2) phishing 3) an online imposture 4) cache poisoning 5) a distributed denial of request
4) the service continues functioning even if one nameserver goes down
The fault-tolerant nature of the DNS ensures that: 1) if users can't reach a host computer, they are redirected back to the previous page 2) mistyped or misspelled Web addresses are automatically corrected 3) if a document or file can't be accessed, it won't result in a 404 error 4) the service continues functioning even if one nameserver goes down 5) mismatched host names and domain names are still assigned with the correct IP address
2) False
The language "http" is used to create and format Web pages. 1) True 2) False
2) False
Wall Street traders often choose a colocation facility with the goal to provide high-latency connectivity to their partners. 1) True 2) False
2) Acquiring a domain name to extort a firm, individual, product, or trademark holder
What is an example of cybersquatting? 1) Overwhelming a firm's Web site by flooding it with seemingly legitimate messages 2) Acquiring a domain name to extort a firm, individual, product, or trademark holder 3) Slowing down packet transfer to an Internet-connected computer 4) Threatening to destroy information stored in a firm's servers 5) Hacking into and defacing an organization's public web presence and refusing to let the site's owner regain control
2) False
When considering overall network speed, a system's speed is determined by its fastest component. 1) True 2) False
2) False
When the Internet really took off, much of the Internet's operating infrastructure transitioned to be supported by government grants rather than private firms. 1) True 2) False
5) Web-based phone calls
Which of the following applications is most likely to use UDP instead of TCP? 1) E-mail 2) Web transmissions 3) File transfer 4) Peer-to-peer-downloads 5) Web-based phone calls
1) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet
Which of the following is true of the term Internet backbone? 1) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet 2) It refers to broadband service provided direct to a home or business using light-transmitting fiber-optic cables. 3) It refers to the collection of standards used to support all Internet services 4) It refers to government-provided open spectrum that enables Internet use for all. 5) It refers to a government-run system supported by telecommunication taxes, which connects end users to the Internet
2) Check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets; put packets in correct order
Which of the following represents the correct sequence of actions taken by the TCP at the destination computer to ensure a perfect copy of the sent message is received? 1) Slice the message into packets; route the packets to the destination; check if packets are damaged; request for new copies of damaged packets 2) Check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets; put packets in correct order 3) Slice the message into packets; check if packets are damaged; put packets in correct order; request for new copies of damaged packets 4) Route the packets to the destination; put packets in correct order; check if packets are damaged; request for new copies of damaged packets 5) Put the packets in correct order; check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets
3) It refers to the language used to create and format Web pages
Which of the following statements holds true for the term "html"? 1) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. 2) It refers to the broadband service provided via light-transmitting fiber-optic cables. 3) It refers to the language used to create and format Web pages. 4) It refers to a situation when separate ISPs link their networks to swap traffic on the Internet 5) It refers to a system that connects end users to the Internet
5) Traceroute
_________ repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination. 1) Firewall 2) Router 3) Pathfinder 4) Mapper 5) Traceroute
ICANN (Internet Corporation for Assigned Names and Numbers)
___________ is the nonprofit organization responsible for managing the Internet's domain and numbering systems.
5) Packet prioritization
____________ involves allowing voice packets to gain delivery importance over packets for applications like e-mail. 1) Voice precedence 2) Data rationing 3) Right-of-way for voice 4) Information queuing 5) Packet prioritization
2) Coaxial cable
____________ is the insulated copper cable commonly used by cable television providers with shielding to reduce electrical interference. 1) Optical fiber cable 2) Coaxial cable 3) Ribbon cable 4) FTTH cable 5) Amdahl cable
Hypertext Markup Language (HTML)
____________ is the language used to compose Web pages.
File Transfer Protocol
______________ refers to the application transfer protocol that is used to copy files from one computer to another.
Load balancing
________________ involves distributing a computing or networking workload across multiple systems in order to avoid congestion and slow performance.