Deck 3: Operating Systems

Full screen (f)
exit full mode
Question
Which of the following identifies the application to which a message arriving from the Internet should be given?

A) Protocol
B) Port number
C) Domain
D) Hop count
Use Space or
up arrow
down arrow
to flip the card.
Question
The primary purpose of which of the following is not the enhancement of security?

A) ICANN
B) Firewall
C) Encryption
D) CERT
Question
Which layer of the TCP/IP hierarchy presents incoming messages to the computer user?

A) Application
B) Transport
C) Network
D) Link
Question
Which layer of the TCP/IP hierarchy is responsible for obtaining the correct address for a message's destination?

A) Application
B) Transport
C) Network
D) Link
Question
Which layer of the TCP/IP hierarchy reassembles messages as their pieces arrive at the destination?

A) Application
B) Transport
C) Network
D) Link
Question
Which layer of the TCP/IP hierarchy decides the direction in which message segments are transferred across the Internet?

A) Application
B) Transport
C) Network
D) Link
Question
Ethernet is a means of implementing which of the following network topologies?

A) Star
B) WiFi
C) Bus
Question
Which of the following is not a way of classifying networks?

A) WAN versus LAN
B) Closed versus open
C) Router versus bridge
D) Star versus bus
Question
Which of the following connects existing networks to form an internet?

A) Bridge
B) Router
C) Switch
D) Repeater
Question
Which of the following is assigned the task of providing individual users access to the Internet?

A) Tier-1 ISPs
B) Tier-2 ISPs
C) Access ISPs
D) ICANN
Question
Which of the following is not a means of connecting networks?

A) Switch
B) Server
C) Router
D) Bridge
Question
Which layer of the TCP/IP hierarchy chops messages into units whose size is compatible with the Internet?

A) Application
B) Transport
C) Network
D) Link
Question
Which of the following is used to translate between IP addresses and mnemonic addresses?

A) File server
B) Mail server
C) Name server
D) FTP server
Question
Which of the following is an Internet application that is named after its underlying protocol?

A) Email
B) World Wide Web
C) FTP
D) UDP
Question
Which layer of the TCP/IP hierarchy decides which application should receive an incoming message?

A) Application
B) Transport
C) Network
D) Link
Question
Which of the following is not an application of the Internet?

A) FTP
B) Email
C) Telnet
D) CERT
Question
Which of the following is a protocol for controlling the right to transmit a message in a network?

A) UDP
B) CSMA/CD
C) TCP
D) FTP
Question
Which of the following is not a means of performing interprocess communication over a network?

A) Client/server
B) ICANN
C) Peer-to-peer
Question
Which standards organization produced the OSI reference model for internet communication?

A) ANSI
B) IEEE
C) ISO
Question
Which layer of the TCP/IP hierarchy actually transmits a message?

A) Application
B) Transport
C) Network
D) Link
Question
Write the entire URL required to retrieve the Web document named bulldogs.html from the Web server at animals.org assuming that the document is stored in the directory named dogs.
Question
What is the difference between hubs, switches, and routers?
Question
Identify two types of VoIP devices.
Question
What are some distinctions between UDP and TCP?
Question
What are HTML and XML?
Question
Draw a circle the portion of the URL below that identifies the directory containing the file being addressed. Underline the portion that identifies the protocol that should be used when accessing the file. Draw a rectangle around the portion that identifies the file name itself.
http://batcave.metropolis.com/heroes/superheroes/batpage.html
Question
The client/server model refers to a form of interprocess communication in which one process, known as the ________________ , runs continuously so that it can be contacted by other processes, known as ________________ , as needed. In contrast is the ____________________ model of interprocess communication in which two processes communicate as equals.
Question
Draw a rectangle around the portion of the email address below that identifies the "person" who should receive the message. Underline the portion that identifies the location of the mail server that handles the mail for that person.
Fido@dogmail.zoo.org
Question
As an encryption system, what is unique about public-key encryption (that is, why is public-key encryption so named)?
Question
Which generation of wireless network technology uses the packet-switched IP network?

A) 3G
B) 4G
C) 5G
D) All of the above
Question
What terms in the following HTML document are linked to other documents? What terms in the following HTML document are linked to other documents?  <div style=padding-top: 35px>
Question
Fill in the blanks with the missing tags to the following HTML document. Fill in the blanks with the missing tags to the following HTML document.  <div style=padding-top: 35px>
Question
Identify a protocol used in the implementation of the network layer in the TCP/IP hierarchy.
______________
Question
A ___________________ consists of software units that execute as processes on different computers.
Question
What is the difference between a repeater and a bridge?
Question
Many people use the terms Internet and world-wide web interchangeably. What is the difference between the Internet and the world-wide web?
Question
Which of the following is not a means of implementing server-side activities?

A) CGI
B) JSP
C) ASP
D) Applets
Question
Underline the portion of the URL below that identifies the classification (top-level domain) of the registered domain in which the pertinent Web server resides. Draw a rectangle around the portion that indicates the directory path the server should follow to find the designated document.
http://batcave.metropolis.com/heroes/superheroes/batpage.html
Question
Which of the following is not a protocol used in the basic TCP/IP software hierarchy?

A) POP3
B) UDP
C) TCP
D) IP
Question
Identify two protocols used in networks to determine the right to transmit an original message.

A) _________________
B) _________________
Question
What assumptions are made when a URL is denoted by merely zoo.org?
Question
What would happen if a user clicked the mouse on the term "pig" while viewing the HTML document shown below? What would happen if a user clicked the mouse on the term pig while viewing the HTML document shown below?  <div style=padding-top: 35px>
Question
To what do the terms "server side" and "client side" refer?
Question
Briefly summarize the steps performed by each of the four layers in the TCP/IP hierarchy at the computer at which a message originates.
Question
Draw a sketch showing how the following HTML document would appear on the computer screen when displayed by a browser. Draw a sketch showing how the following HTML document would appear on the computer screen when displayed by a browser.  <div style=padding-top: 35px>
Question
Briefly summarize what is meant by the term "cloud computing."
Question
What is the primary difference between using Telnet and SSH to connect to a remote server?
Question
Draw a sketch showing how the following HTML document would appear on the computer screen when displayed by a browser. Draw a sketch showing how the following HTML document would appear on the computer screen when displayed by a browser.  <div style=padding-top: 35px>
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/48
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Operating Systems
1
Which of the following identifies the application to which a message arriving from the Internet should be given?

A) Protocol
B) Port number
C) Domain
D) Hop count
B
2
The primary purpose of which of the following is not the enhancement of security?

A) ICANN
B) Firewall
C) Encryption
D) CERT
A
3
Which layer of the TCP/IP hierarchy presents incoming messages to the computer user?

A) Application
B) Transport
C) Network
D) Link
A
4
Which layer of the TCP/IP hierarchy is responsible for obtaining the correct address for a message's destination?

A) Application
B) Transport
C) Network
D) Link
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
5
Which layer of the TCP/IP hierarchy reassembles messages as their pieces arrive at the destination?

A) Application
B) Transport
C) Network
D) Link
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
6
Which layer of the TCP/IP hierarchy decides the direction in which message segments are transferred across the Internet?

A) Application
B) Transport
C) Network
D) Link
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
7
Ethernet is a means of implementing which of the following network topologies?

A) Star
B) WiFi
C) Bus
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is not a way of classifying networks?

A) WAN versus LAN
B) Closed versus open
C) Router versus bridge
D) Star versus bus
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following connects existing networks to form an internet?

A) Bridge
B) Router
C) Switch
D) Repeater
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is assigned the task of providing individual users access to the Internet?

A) Tier-1 ISPs
B) Tier-2 ISPs
C) Access ISPs
D) ICANN
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is not a means of connecting networks?

A) Switch
B) Server
C) Router
D) Bridge
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
12
Which layer of the TCP/IP hierarchy chops messages into units whose size is compatible with the Internet?

A) Application
B) Transport
C) Network
D) Link
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is used to translate between IP addresses and mnemonic addresses?

A) File server
B) Mail server
C) Name server
D) FTP server
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is an Internet application that is named after its underlying protocol?

A) Email
B) World Wide Web
C) FTP
D) UDP
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
15
Which layer of the TCP/IP hierarchy decides which application should receive an incoming message?

A) Application
B) Transport
C) Network
D) Link
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is not an application of the Internet?

A) FTP
B) Email
C) Telnet
D) CERT
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is a protocol for controlling the right to transmit a message in a network?

A) UDP
B) CSMA/CD
C) TCP
D) FTP
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is not a means of performing interprocess communication over a network?

A) Client/server
B) ICANN
C) Peer-to-peer
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
19
Which standards organization produced the OSI reference model for internet communication?

A) ANSI
B) IEEE
C) ISO
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
20
Which layer of the TCP/IP hierarchy actually transmits a message?

A) Application
B) Transport
C) Network
D) Link
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
21
Write the entire URL required to retrieve the Web document named bulldogs.html from the Web server at animals.org assuming that the document is stored in the directory named dogs.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
22
What is the difference between hubs, switches, and routers?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
23
Identify two types of VoIP devices.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
24
What are some distinctions between UDP and TCP?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
25
What are HTML and XML?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
26
Draw a circle the portion of the URL below that identifies the directory containing the file being addressed. Underline the portion that identifies the protocol that should be used when accessing the file. Draw a rectangle around the portion that identifies the file name itself.
http://batcave.metropolis.com/heroes/superheroes/batpage.html
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
27
The client/server model refers to a form of interprocess communication in which one process, known as the ________________ , runs continuously so that it can be contacted by other processes, known as ________________ , as needed. In contrast is the ____________________ model of interprocess communication in which two processes communicate as equals.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
28
Draw a rectangle around the portion of the email address below that identifies the "person" who should receive the message. Underline the portion that identifies the location of the mail server that handles the mail for that person.
Fido@dogmail.zoo.org
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
29
As an encryption system, what is unique about public-key encryption (that is, why is public-key encryption so named)?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
30
Which generation of wireless network technology uses the packet-switched IP network?

A) 3G
B) 4G
C) 5G
D) All of the above
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
31
What terms in the following HTML document are linked to other documents? What terms in the following HTML document are linked to other documents?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
32
Fill in the blanks with the missing tags to the following HTML document. Fill in the blanks with the missing tags to the following HTML document.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
33
Identify a protocol used in the implementation of the network layer in the TCP/IP hierarchy.
______________
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
34
A ___________________ consists of software units that execute as processes on different computers.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
35
What is the difference between a repeater and a bridge?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
36
Many people use the terms Internet and world-wide web interchangeably. What is the difference between the Internet and the world-wide web?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is not a means of implementing server-side activities?

A) CGI
B) JSP
C) ASP
D) Applets
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
38
Underline the portion of the URL below that identifies the classification (top-level domain) of the registered domain in which the pertinent Web server resides. Draw a rectangle around the portion that indicates the directory path the server should follow to find the designated document.
http://batcave.metropolis.com/heroes/superheroes/batpage.html
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is not a protocol used in the basic TCP/IP software hierarchy?

A) POP3
B) UDP
C) TCP
D) IP
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
40
Identify two protocols used in networks to determine the right to transmit an original message.

A) _________________
B) _________________
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
41
What assumptions are made when a URL is denoted by merely zoo.org?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
42
What would happen if a user clicked the mouse on the term "pig" while viewing the HTML document shown below? What would happen if a user clicked the mouse on the term pig while viewing the HTML document shown below?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
43
To what do the terms "server side" and "client side" refer?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
44
Briefly summarize the steps performed by each of the four layers in the TCP/IP hierarchy at the computer at which a message originates.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
45
Draw a sketch showing how the following HTML document would appear on the computer screen when displayed by a browser. Draw a sketch showing how the following HTML document would appear on the computer screen when displayed by a browser.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
46
Briefly summarize what is meant by the term "cloud computing."
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
47
What is the primary difference between using Telnet and SSH to connect to a remote server?
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
48
Draw a sketch showing how the following HTML document would appear on the computer screen when displayed by a browser. Draw a sketch showing how the following HTML document would appear on the computer screen when displayed by a browser.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 48 flashcards in this deck.