Deck 13: A Managers Guide to the Internet and Telecommunications

ملء الشاشة (f)
exit full mode
سؤال
Servers or organizations do not need to be housed within a country in order to use a country code as part of their domain name.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
When the Internet really took off, much of the Internet's operating infrastructure was transitioned to be supported by government grants rather than private firms.
سؤال
The address one types into a Web browser is also known as a:

A) universal redirection link.
B) uniform resource locator.
C) unique resource locator.
D) universal redirection locator.
E) uniform resource link.
سؤال
Changing the letter case in host and domain names does not affect the user's ability to reach the destination.
سؤال
Which of the following statements holds true for the term "html"?

A) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
B) It refers to the broadband service provided via light-transmitting fiber-optic cables.
C) It refers to the language used to compose Web pages.
D) It refers to a situation when separate ISPs link their networks to swap traffic on the Internet.
E) It refers to a system that connects end users to the Internet.
سؤال
Popular sites like Google and Yahoo! have several computers assigned to their host names because:

A) they have operations in different countries.
B) they are registered under several generic top-level domain names.
C) of the disparity in the number of users accessing their sites in different parts of the world.
D) hoarding all information in one server increases the risk of damage in case of natural disasters.
E) it ensures that the load of requests to their sites do not overwhelm a single computer.
سؤال
The Internet has no center and no one owns it.
سؤال
The http protocol is designed to be independent from the:

A) Web site's host name and domain name.
B) computer's Web browser and Web server.
C) Internet service provider and Web browser.
D) computer's hardware and operating system.
E) Web browser's domain name and mail server.
سؤال
IP addresses can be used to identify a user's physical location.
سؤال
One of the factors that accelerated the development of the Internet during the 1990s was:

A) the introduction of the personal computer into households.
B) the government's taking over of the Internet's operating structure from private players.
C) Intel's invention of low power processors used in portable computers.
D) the creation of the Windows and Mac OS operating systems.
E) the invention of graphical Web browsing.
سؤال
A Web address without a file name will load content from a default page.
سؤال
A device gets its IP address from whichever organization is currently connecting it to the Internet.
سؤال
Domain name registration is carried out on an auction basis to ensure the highest bidder gains rights to the desired domain name.
سؤال
A _____ enables communication by defining the format of data and rules for exchange.

A) nomenclature
B) regulation
C) protocol
D) dialect
E) convention
سؤال
In the URL, the host name is the name of the network a user tries to connect to.
سؤال
A firm that provides hardware and services to run Web sites of others is known as a(n) _____.

A) Web site incubator
B) Internet service provider
C) Web domain name registrar
D) Web hosting service
E) Internet Web host
سؤال
The language "http" is used to create and format Web pages.
سؤال
The hypertext transfer protocol (http) defines the communication between:

A) Web browsers and Web servers.
B) operating systems and Web browsers.
C) hardware and operating systems.
D) mail servers and hardware.
E) hardware and Web browsers.
سؤال
One of the functions of domain name registrars is to:

A) set standards for administering domain names.
B) run a user's Web site on their Internet-connected servers for a fee.
C) assign domain names and corresponding IP addresses.
D) regulate the registration of IP addresses and host names.
E) resolve disputes between parties contesting for the same ISP.
سؤال
What protocol do most Web developers use to upload the Web pages, graphics, and other files for their Web sites?

A) HTTP
B) SMTP
C) FTP
D) SNMP
E) TCP
سؤال
The TCP works at both ends of Internet communication.
سؤال
Routers don't have perfect, end-to-end information on all points in the Internet.
سؤال
_____ is the language used to compose Web pages.
سؤال
The domain name service (DNS) is a distributed database that allows users to communicate with other computers by:

A) assigning IP addresses to different domain names.
B) mapping host names to domain names.
C) creating IP addresses that are unique to servers.
D) assigning domain names to different IP addresses.
E) mapping host and domain names to IP addresses of computers.
سؤال
_____ involves distributing a computing or networking workload across multiple systems in order to avoid congestion and slow performance.
سؤال
Key Inc., an American guitar maker, recently lost an action to recover the domain name piano-key.com, claiming that the defendant infringed on its registered trademark. What did Key Inc. specifically accuse the defendant of?

A) Sugging
B) Computer trespassing
C) Cybersquatting
D) Domain hoarding
E) Internet stalking
سؤال
"Html" is used to:

A) load content from default page.
B) create and format Web pages.
C) generate custom content for users.
D) exchange mail with other e-mail servers.
E) transfer files from flash drives.
سؤال
Routing protocol that is in charge of forwarding packets on the Internet is known as voice over Internet protocol.
سؤال
An exploit in which a hole in DNS software allows hackers to redirect users to sites they did not request is known as:

A) cybersquatting.
B) phishing.
C) an online imposture.
D) cache poisoning.
E) a distributed denial of request.
سؤال
The fault-tolerant nature of the DNS ensures that:

A) if users can't reach a host computer, they are redirected back to the previous page.
B) mistyped or misspelled Web addresses are automatically corrected.
C) if a document or file can't be accessed, it won't result in a 404 error.
D) the service continues functioning even if one nameserver goes down.
E) mismatched host names and domain names are still assigned with the correct IP address.
سؤال
_____ refers to the application transfer protocol that is used to copy files from one computer to another.
سؤال
The cache speeds up computing tasks by:

A) storing the domain names' users type in the Web browser.
B) placing bookmarks for favored Web pages.
C) storing IP addresses of hosts visited by users.
D) fetching Web addresses from the DNS.
E) loading content from default pages.
سؤال
Briefly describe how the DNS helps users communicate with each other.
سؤال
The protocol used for exchange of mail between e-mail servers across the world is called _____.
سؤال
A(n) _____ is a temporary storage space used to speed computing tasks.

A) cache
B) IP address
C) Protocol
D) domain name service
E) hypertext markup language
سؤال
Identify the various parts in the following Web address and briefly describe each of them:
سؤال
_____ is the nonprofit organization responsible for managing the Internet's domain and numbering systems.
سؤال
TCP and IP operate above http and the other application transfer protocols.
سؤال
Network Address Translation (NAT) technique involves:

A) mapping devices on private networks to single Internet-connected devices acting on their behalf.
B) reassigning domain names and host names to different IP addresses.
C) translating IP addresses from the presently used IPv4 scheme to the advanced IPv6 scheme.
D) integrating domain names and host names to represent the same IP address.
E) forming a hybrid of IPv4 and IPv6 schemes that temporarily enable communication between two computers on these different schemes.
سؤال
What is cybersquatting?

A) Overwhelming a firm's Web site by flooding it with seemingly legitimate messages
B) Acquiring a domain name that refers to a firm, individual, product, or trademark with the goal of exploiting it for financial gain
C) Causing an Internet-connected computer to malfunction
D) Threatening to destroy information stored in a firm's servers
E) Using the Internet to stalk or harass an individual or an organization
سؤال
The User Datagram Protocol (UDP) acts as a substitute to TCP when there is a need for speed of communication and quality can be sacrificed.
سؤال
Compare circuit- and packet-switched networks.
سؤال
_____ act as storage places where a firm's servers get super-fast connections as close to the action as possible.

A) Colocation facilities
B) Incubation facilities
C) Internet exchange points
D) Dispatch facilities
E) Preening facilities
سؤال
Describe the process involving the transmission of a Web page from a Web server to a user's computer.
سؤال
____ repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination.

A) Firewall
B) Router
C) Pathfinder
D) Mapper
E) Traceroute
سؤال
ISPs and IXPs that carry out peering generate revenue by charging each other fees based on their traffic contribution.
سؤال
Which of the following applications is most likely to use UDP instead of TCP?

A) E-mail
B) Web transmissions
C) File transfer
D) Peer-to-peer downloads
E) Web-based phone calls
سؤال
When considering overall network speed, a system's speed is determined by its fastest component.
سؤال
Internet networks are _____.

A) bit-switched networks
B) circuit-switched networks
C) data-switched networks
D) packet-switched networks
E) byte-switched networks
سؤال
Peering refers to:

A) high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
B) the broadband service provided via light-transmitting fiber-optic cables.
C) the language used to compose Web pages.
D) a situation when separate ISPs connect their networking equipment together to share traffic.
E) a system that connects end users to the Internet.
سؤال
A unit of data forwarded by a network is called _____.
سؤال
One of the functions of the IP is to:

A) route message packets to the final destination.
B) slice up the message into smaller chunks of data called packets, to be sent over the network.
C) check for damaged or corrupt message packets and request for replacements, if needed.
D) label message packets with source and destination addresses.
E) rearrange message packets in the same sequence as they were sent.
سؤال
Peering usually takes place at neutral sites called _____.

A) https
B) IPs
C) ISPs
D) IXPs
E) STPs
سؤال
The Internet Protocol Suite consists of the Internet Protocol and _____.

A) File Transfer Protocol
B) Simple Mail Transfer Protocol
C) Session Initiation Protocol
D) Datagram Congestion Control Protocol
E) Transmission Control Protocol
سؤال
_____ involves allowing voice packets to gain delivery importance over packets for applications like e-mail.

A) Voice precedence
B) Data rationing
C) Right-of-way for voice
D) Information queuing
E) Packet prioritization
سؤال
Which of the following represents the correct sequence of actions taken by the TCP at the destination computer to ensure a perfect copy of the sent message is received?

A) Slice the message into packets; route the packets to the destination; check if packets are damaged; request for new copies of damaged packets
B) Check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets; put packets in correct order
C) Slice the message into packets; check if packets are damaged; put packets in correct order; request for new copies of damaged packets
D) Route the packets to the destination; put packets in correct order; check if packets are damaged; request for new copies of damaged packets
E) Put the packets in correct order; check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets
سؤال
A(n) _____ is a computing device that connects networks and exchanges data between them.
سؤال
Circuit-switched networks are more efficient than packet-switched networks because of the nature of the dedicated connection they provide.
سؤال
Circuit-switched networks provide connection between two parties by:

A) assigning entire circuit capacity to the call on a first-come first-serve basis.
B) dedicating a part of the circuit capacity to the call.
C) repeatedly switching between an open and closed state depending on the duration of the call.
D) slicing up the conversation into smaller chunks and transmitting them over the circuit.
E) prioritizing voice calls over other connections.
سؤال
Most mobile cell phone services are exempted from having to license the wireless spectrum for transmission.
سؤال
The range of frequencies used for communication is known as _____.

A) communication orbit
B) mobile service array
C) wireless spectrum
D) communication backbone
E) communication bandwidth
سؤال
The ____ wireless technology is limited by its inability to support voice and data communication at the same time.

A) GSM
B) GPRS
C) 3G
D) 4G
E) CDMA
سؤال
4G technologies fall into two standards camps, namely _____ and _____.

A) Wi-fi; GPRS
B) LTE; WiMax
C) CDMA; GSM
D) WEP; WAP
E) PDC; TDMA
سؤال
Which of the following statements is true about Google's efforts aimed at bringing high-speed fiber to several U.S. communities, including Kansas City, Kansas, and Kansas City, Missouri?

A) It is aimed at becoming a nationwide ISP itself.
B) It will be "closed," preventing other service providers from using Google's infrastructure to resell services to consumers.
C) It is an effort to investigate ways to build and operate exclusive networks.
D) It is an effort to bring speeds of 5 Gbps to customers.
E) Google deems its effort an experiment.
سؤال
One of the disadvantages of cable technology is that:

A) it is more expensive than other signal-carrying systems.
B) it is liable to periodic replacement owing to physical wear and tear.
C) customers have to share bandwidth with neighbors.
D) it is incompatible with most modern communication systems.
E) the speed of the connection depends on the distance between the end customer from the central hub.
سؤال
The basic unit of expression for bandwidth is _____.
سؤال
Briefly describe a few of the measures being taken to speed up the Internet's last mile.
سؤال
A potential roadblock to transition of DSL to FTTH is the:

A) high costs of building entirely new networks.
B) exorbitant prices charged by service providers.
C) impracticality of switching to a technology that is not proven yet.
D) location driven quality of service offered by fiber optic technology.
E) high possibility of external interference and hence, fears of information security.
سؤال
The two parties to the debate surrounding the principle of net neutrality are:

A) mobile service providers and governments.
B) Internet service firms and the FCC.
C) cable broadband firms and FTTH firms.
D) wireless service providers and cable service providers.
E) governments and the movie industry.
سؤال
_____ technology is a broadband technology that uses wires of a local telephone network.

A) Fiber to the Home (FTTH)
B) Digital Subscriber Line (DSL)
C) Coaxial cable
D) Telecom-broadband hybrid
E) Broadband over power line (BPL)
سؤال
Explain the evolution of satellite wireless telecommunication technology.
سؤال
Most residential providers of cable technology use a system that requires customers to share bandwidth with neighbors.
سؤال
Which of the following statements is true of the term "FTTH"?

A) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
B) It refers to broadband service provided via light-transmitting fiber-optic cables.
C) It refers to the language used to compose Web pages.
D) It refers to a situation when separate ISPs link their networks to swap traffic on the Internet.
E) It refers to a system that connects end users to the Internet.
سؤال
DSL technology is expensive for service providers in the United States because of the sparsely populated cities.
سؤال
Mobile providers can be susceptible to poor coverage indoors as a result of:

A) spectrum used by most mobile phone firms that does not travel well through solid objects.
B) a high degree of latency.
C) network congestion that clogs up the network traffic.
D) a lack of sufficient number of towers owing to the not-in-my-backyard problem.
E) an increase in bandwidth demand placed on their networks.
سؤال
Which of the following refers to wireless systems provided by earth-bound stations like cell phone towers?

A) Geostationary wireless
B) Ground wireless
C) Terrestrial wireless
D) Geosynchronous wireless
E) High fidelity wireless
سؤال
_____ is the insulated copper cable commonly used by cable television providers with shielding to reduce electrical interference.

A) Optical fiber cable
B) Coaxial cable
C) Ribbon cable
D) Bowden cable
E) Straight cable
سؤال
To overcome reception and availability problems, mobile telecom services firms have begun _____ that provide a "five bar" coverage in a roughly 5,000-square-foot footprint.

A) providing incentives to communities that allow the construction of towers
B) building smaller towers that people don't mind seeing in the neighborhood
C) offering femtocells
D) providing wi-fi base stations at very low costs
E) providing unique IP addresses
سؤال
It is feared that innovation might suffer as a result of the transition of Internet services from flat-rate pricing to metered usage.
سؤال
Which of the following is true of the term Internet backbone?

A) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
B) It refers to broadband service provided via light-transmitting fiber-optic cables.
C) It refers to the language used to compose Web pages.
D) It refers to a situation when separate ISPs link their networks to swap traffic on the Internet.
E) It refers to a system that connects end users to the Internet.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/83
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: A Managers Guide to the Internet and Telecommunications
1
Servers or organizations do not need to be housed within a country in order to use a country code as part of their domain name.
True
2
When the Internet really took off, much of the Internet's operating infrastructure was transitioned to be supported by government grants rather than private firms.
False
3
The address one types into a Web browser is also known as a:

A) universal redirection link.
B) uniform resource locator.
C) unique resource locator.
D) universal redirection locator.
E) uniform resource link.
B
4
Changing the letter case in host and domain names does not affect the user's ability to reach the destination.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following statements holds true for the term "html"?

A) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
B) It refers to the broadband service provided via light-transmitting fiber-optic cables.
C) It refers to the language used to compose Web pages.
D) It refers to a situation when separate ISPs link their networks to swap traffic on the Internet.
E) It refers to a system that connects end users to the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
6
Popular sites like Google and Yahoo! have several computers assigned to their host names because:

A) they have operations in different countries.
B) they are registered under several generic top-level domain names.
C) of the disparity in the number of users accessing their sites in different parts of the world.
D) hoarding all information in one server increases the risk of damage in case of natural disasters.
E) it ensures that the load of requests to their sites do not overwhelm a single computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Internet has no center and no one owns it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
8
The http protocol is designed to be independent from the:

A) Web site's host name and domain name.
B) computer's Web browser and Web server.
C) Internet service provider and Web browser.
D) computer's hardware and operating system.
E) Web browser's domain name and mail server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
9
IP addresses can be used to identify a user's physical location.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
10
One of the factors that accelerated the development of the Internet during the 1990s was:

A) the introduction of the personal computer into households.
B) the government's taking over of the Internet's operating structure from private players.
C) Intel's invention of low power processors used in portable computers.
D) the creation of the Windows and Mac OS operating systems.
E) the invention of graphical Web browsing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
11
A Web address without a file name will load content from a default page.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
12
A device gets its IP address from whichever organization is currently connecting it to the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
13
Domain name registration is carried out on an auction basis to ensure the highest bidder gains rights to the desired domain name.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
14
A _____ enables communication by defining the format of data and rules for exchange.

A) nomenclature
B) regulation
C) protocol
D) dialect
E) convention
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
15
In the URL, the host name is the name of the network a user tries to connect to.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
16
A firm that provides hardware and services to run Web sites of others is known as a(n) _____.

A) Web site incubator
B) Internet service provider
C) Web domain name registrar
D) Web hosting service
E) Internet Web host
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
17
The language "http" is used to create and format Web pages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
18
The hypertext transfer protocol (http) defines the communication between:

A) Web browsers and Web servers.
B) operating systems and Web browsers.
C) hardware and operating systems.
D) mail servers and hardware.
E) hardware and Web browsers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
19
One of the functions of domain name registrars is to:

A) set standards for administering domain names.
B) run a user's Web site on their Internet-connected servers for a fee.
C) assign domain names and corresponding IP addresses.
D) regulate the registration of IP addresses and host names.
E) resolve disputes between parties contesting for the same ISP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
20
What protocol do most Web developers use to upload the Web pages, graphics, and other files for their Web sites?

A) HTTP
B) SMTP
C) FTP
D) SNMP
E) TCP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
21
The TCP works at both ends of Internet communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
22
Routers don't have perfect, end-to-end information on all points in the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
23
_____ is the language used to compose Web pages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
24
The domain name service (DNS) is a distributed database that allows users to communicate with other computers by:

A) assigning IP addresses to different domain names.
B) mapping host names to domain names.
C) creating IP addresses that are unique to servers.
D) assigning domain names to different IP addresses.
E) mapping host and domain names to IP addresses of computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
25
_____ involves distributing a computing or networking workload across multiple systems in order to avoid congestion and slow performance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
26
Key Inc., an American guitar maker, recently lost an action to recover the domain name piano-key.com, claiming that the defendant infringed on its registered trademark. What did Key Inc. specifically accuse the defendant of?

A) Sugging
B) Computer trespassing
C) Cybersquatting
D) Domain hoarding
E) Internet stalking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
27
"Html" is used to:

A) load content from default page.
B) create and format Web pages.
C) generate custom content for users.
D) exchange mail with other e-mail servers.
E) transfer files from flash drives.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
28
Routing protocol that is in charge of forwarding packets on the Internet is known as voice over Internet protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
29
An exploit in which a hole in DNS software allows hackers to redirect users to sites they did not request is known as:

A) cybersquatting.
B) phishing.
C) an online imposture.
D) cache poisoning.
E) a distributed denial of request.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
30
The fault-tolerant nature of the DNS ensures that:

A) if users can't reach a host computer, they are redirected back to the previous page.
B) mistyped or misspelled Web addresses are automatically corrected.
C) if a document or file can't be accessed, it won't result in a 404 error.
D) the service continues functioning even if one nameserver goes down.
E) mismatched host names and domain names are still assigned with the correct IP address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
31
_____ refers to the application transfer protocol that is used to copy files from one computer to another.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
32
The cache speeds up computing tasks by:

A) storing the domain names' users type in the Web browser.
B) placing bookmarks for favored Web pages.
C) storing IP addresses of hosts visited by users.
D) fetching Web addresses from the DNS.
E) loading content from default pages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
33
Briefly describe how the DNS helps users communicate with each other.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
34
The protocol used for exchange of mail between e-mail servers across the world is called _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
35
A(n) _____ is a temporary storage space used to speed computing tasks.

A) cache
B) IP address
C) Protocol
D) domain name service
E) hypertext markup language
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
36
Identify the various parts in the following Web address and briefly describe each of them:
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
37
_____ is the nonprofit organization responsible for managing the Internet's domain and numbering systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
38
TCP and IP operate above http and the other application transfer protocols.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
39
Network Address Translation (NAT) technique involves:

A) mapping devices on private networks to single Internet-connected devices acting on their behalf.
B) reassigning domain names and host names to different IP addresses.
C) translating IP addresses from the presently used IPv4 scheme to the advanced IPv6 scheme.
D) integrating domain names and host names to represent the same IP address.
E) forming a hybrid of IPv4 and IPv6 schemes that temporarily enable communication between two computers on these different schemes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
40
What is cybersquatting?

A) Overwhelming a firm's Web site by flooding it with seemingly legitimate messages
B) Acquiring a domain name that refers to a firm, individual, product, or trademark with the goal of exploiting it for financial gain
C) Causing an Internet-connected computer to malfunction
D) Threatening to destroy information stored in a firm's servers
E) Using the Internet to stalk or harass an individual or an organization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
41
The User Datagram Protocol (UDP) acts as a substitute to TCP when there is a need for speed of communication and quality can be sacrificed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
42
Compare circuit- and packet-switched networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
43
_____ act as storage places where a firm's servers get super-fast connections as close to the action as possible.

A) Colocation facilities
B) Incubation facilities
C) Internet exchange points
D) Dispatch facilities
E) Preening facilities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
44
Describe the process involving the transmission of a Web page from a Web server to a user's computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
45
____ repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination.

A) Firewall
B) Router
C) Pathfinder
D) Mapper
E) Traceroute
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
46
ISPs and IXPs that carry out peering generate revenue by charging each other fees based on their traffic contribution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which of the following applications is most likely to use UDP instead of TCP?

A) E-mail
B) Web transmissions
C) File transfer
D) Peer-to-peer downloads
E) Web-based phone calls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
48
When considering overall network speed, a system's speed is determined by its fastest component.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
49
Internet networks are _____.

A) bit-switched networks
B) circuit-switched networks
C) data-switched networks
D) packet-switched networks
E) byte-switched networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
50
Peering refers to:

A) high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
B) the broadband service provided via light-transmitting fiber-optic cables.
C) the language used to compose Web pages.
D) a situation when separate ISPs connect their networking equipment together to share traffic.
E) a system that connects end users to the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
51
A unit of data forwarded by a network is called _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
52
One of the functions of the IP is to:

A) route message packets to the final destination.
B) slice up the message into smaller chunks of data called packets, to be sent over the network.
C) check for damaged or corrupt message packets and request for replacements, if needed.
D) label message packets with source and destination addresses.
E) rearrange message packets in the same sequence as they were sent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
53
Peering usually takes place at neutral sites called _____.

A) https
B) IPs
C) ISPs
D) IXPs
E) STPs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
54
The Internet Protocol Suite consists of the Internet Protocol and _____.

A) File Transfer Protocol
B) Simple Mail Transfer Protocol
C) Session Initiation Protocol
D) Datagram Congestion Control Protocol
E) Transmission Control Protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
55
_____ involves allowing voice packets to gain delivery importance over packets for applications like e-mail.

A) Voice precedence
B) Data rationing
C) Right-of-way for voice
D) Information queuing
E) Packet prioritization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which of the following represents the correct sequence of actions taken by the TCP at the destination computer to ensure a perfect copy of the sent message is received?

A) Slice the message into packets; route the packets to the destination; check if packets are damaged; request for new copies of damaged packets
B) Check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets; put packets in correct order
C) Slice the message into packets; check if packets are damaged; put packets in correct order; request for new copies of damaged packets
D) Route the packets to the destination; put packets in correct order; check if packets are damaged; request for new copies of damaged packets
E) Put the packets in correct order; check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
57
A(n) _____ is a computing device that connects networks and exchanges data between them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
58
Circuit-switched networks are more efficient than packet-switched networks because of the nature of the dedicated connection they provide.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
59
Circuit-switched networks provide connection between two parties by:

A) assigning entire circuit capacity to the call on a first-come first-serve basis.
B) dedicating a part of the circuit capacity to the call.
C) repeatedly switching between an open and closed state depending on the duration of the call.
D) slicing up the conversation into smaller chunks and transmitting them over the circuit.
E) prioritizing voice calls over other connections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
60
Most mobile cell phone services are exempted from having to license the wireless spectrum for transmission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
61
The range of frequencies used for communication is known as _____.

A) communication orbit
B) mobile service array
C) wireless spectrum
D) communication backbone
E) communication bandwidth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
62
The ____ wireless technology is limited by its inability to support voice and data communication at the same time.

A) GSM
B) GPRS
C) 3G
D) 4G
E) CDMA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
63
4G technologies fall into two standards camps, namely _____ and _____.

A) Wi-fi; GPRS
B) LTE; WiMax
C) CDMA; GSM
D) WEP; WAP
E) PDC; TDMA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
64
Which of the following statements is true about Google's efforts aimed at bringing high-speed fiber to several U.S. communities, including Kansas City, Kansas, and Kansas City, Missouri?

A) It is aimed at becoming a nationwide ISP itself.
B) It will be "closed," preventing other service providers from using Google's infrastructure to resell services to consumers.
C) It is an effort to investigate ways to build and operate exclusive networks.
D) It is an effort to bring speeds of 5 Gbps to customers.
E) Google deems its effort an experiment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
65
One of the disadvantages of cable technology is that:

A) it is more expensive than other signal-carrying systems.
B) it is liable to periodic replacement owing to physical wear and tear.
C) customers have to share bandwidth with neighbors.
D) it is incompatible with most modern communication systems.
E) the speed of the connection depends on the distance between the end customer from the central hub.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
66
The basic unit of expression for bandwidth is _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
67
Briefly describe a few of the measures being taken to speed up the Internet's last mile.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
68
A potential roadblock to transition of DSL to FTTH is the:

A) high costs of building entirely new networks.
B) exorbitant prices charged by service providers.
C) impracticality of switching to a technology that is not proven yet.
D) location driven quality of service offered by fiber optic technology.
E) high possibility of external interference and hence, fears of information security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
69
The two parties to the debate surrounding the principle of net neutrality are:

A) mobile service providers and governments.
B) Internet service firms and the FCC.
C) cable broadband firms and FTTH firms.
D) wireless service providers and cable service providers.
E) governments and the movie industry.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
70
_____ technology is a broadband technology that uses wires of a local telephone network.

A) Fiber to the Home (FTTH)
B) Digital Subscriber Line (DSL)
C) Coaxial cable
D) Telecom-broadband hybrid
E) Broadband over power line (BPL)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
71
Explain the evolution of satellite wireless telecommunication technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
72
Most residential providers of cable technology use a system that requires customers to share bandwidth with neighbors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
73
Which of the following statements is true of the term "FTTH"?

A) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
B) It refers to broadband service provided via light-transmitting fiber-optic cables.
C) It refers to the language used to compose Web pages.
D) It refers to a situation when separate ISPs link their networks to swap traffic on the Internet.
E) It refers to a system that connects end users to the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
74
DSL technology is expensive for service providers in the United States because of the sparsely populated cities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
75
Mobile providers can be susceptible to poor coverage indoors as a result of:

A) spectrum used by most mobile phone firms that does not travel well through solid objects.
B) a high degree of latency.
C) network congestion that clogs up the network traffic.
D) a lack of sufficient number of towers owing to the not-in-my-backyard problem.
E) an increase in bandwidth demand placed on their networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
76
Which of the following refers to wireless systems provided by earth-bound stations like cell phone towers?

A) Geostationary wireless
B) Ground wireless
C) Terrestrial wireless
D) Geosynchronous wireless
E) High fidelity wireless
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
77
_____ is the insulated copper cable commonly used by cable television providers with shielding to reduce electrical interference.

A) Optical fiber cable
B) Coaxial cable
C) Ribbon cable
D) Bowden cable
E) Straight cable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
78
To overcome reception and availability problems, mobile telecom services firms have begun _____ that provide a "five bar" coverage in a roughly 5,000-square-foot footprint.

A) providing incentives to communities that allow the construction of towers
B) building smaller towers that people don't mind seeing in the neighborhood
C) offering femtocells
D) providing wi-fi base stations at very low costs
E) providing unique IP addresses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
79
It is feared that innovation might suffer as a result of the transition of Internet services from flat-rate pricing to metered usage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
80
Which of the following is true of the term Internet backbone?

A) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
B) It refers to broadband service provided via light-transmitting fiber-optic cables.
C) It refers to the language used to compose Web pages.
D) It refers to a situation when separate ISPs link their networks to swap traffic on the Internet.
E) It refers to a system that connects end users to the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 83 في هذه المجموعة.