Deck 13: Behind the Scenes: How the Internet Works
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Question
Match between columns
Question
Match between columns
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
Play
Full screen (f)
Deck 13: Behind the Scenes: How the Internet Works
1
High-speed ________ communication lines use fiber-optics.
A) IP
B) OC
C) DSL
D) cable
A) IP
B) OC
C) DSL
D) cable
B
2
IPV6 was needed when IPV4 ________.
A) became too old
B) was eliminated
C) no longer had enough unique addresses
D) was revoked
A) became too old
B) was eliminated
C) no longer had enough unique addresses
D) was revoked
C
3
The main suite of protocols used on the Internet is ________.
A) FTP
B) TCP/IP
C) SMTP
D) POP
A) FTP
B) TCP/IP
C) SMTP
D) POP
B
4
Individual Internet users connect to ISPs through a(n) ________.
A) User Datagram Protocol (UDP)
B) T line
C) optical carrier (OC) line
D) point of presence (POP)
A) User Datagram Protocol (UDP)
B) T line
C) optical carrier (OC) line
D) point of presence (POP)
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
By adding a network prefix to an IP address, supernetting or ________ lets a single IP address represent multiple unique IP addresses.
A) Internet Protocol version 4 (IPv4)
B) Dynamic Host Configuration Protocol (DHCP)
C) classless interdomain routing (CIDR)
D) Secure Sockets Layer (SSL)
A) Internet Protocol version 4 (IPv4)
B) Dynamic Host Configuration Protocol (DHCP)
C) classless interdomain routing (CIDR)
D) Secure Sockets Layer (SSL)
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following was created for the transfer of hypertext documents across the Internet?
A) SSL
B) HTTP
C) FTP
D) HTML
A) SSL
B) HTTP
C) FTP
D) HTML
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
is an example of an HTML ________.
A) marker
B) tag
C) indicator
D) key
A) marker
B) tag
C) indicator
D) key
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
An IP address in the form 197.169.100.1 is called a(n) ________.
A) sequential access number
B) dotted quad
C) encryption key
D) random number
A) sequential access number
B) dotted quad
C) encryption key
D) random number
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.
A) ISOC
B) ICANN
C) W3C
D) IAB
A) ISOC
B) ICANN
C) W3C
D) IAB
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
Text such as This should be bolded. is an example of an HTML ________.
A) element
B) script
C) instruction
D) marker
A) element
B) script
C) instruction
D) marker
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
In http://www.pearsonhighered.com, which of the following is the top-level domain?
A) http
B) www
C) pearsonhighered
D) com
A) http
B) www
C) pearsonhighered
D) com
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.
A) dynamic
B) static
C) assigned
D) transition
A) dynamic
B) static
C) assigned
D) transition
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is NOT a language used in developing websites?
A) XML
B) KML
C) DHTML
D) HTML
A) XML
B) KML
C) DHTML
D) HTML
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following information is NOT contained in a packet?
A) The size (in bytes) of the packet
B) The address to which the packet is sent
C) The address from where the packet originates
D) The data that are transmitted
A) The size (in bytes) of the packet
B) The address to which the packet is sent
C) The address from where the packet originates
D) The data that are transmitted
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
An IP address that does not change and is usually assigned manually by a network administrator is called a ________ address.
A) dynamic
B) static
C) fixed
D) stationary
A) dynamic
B) static
C) fixed
D) stationary
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
The main path of the Internet along which data travel the fastest is known as the Internet ________.
A) protocol
B) highway
C) backbone
D) cache
A) protocol
B) highway
C) backbone
D) cache
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet.
A) TCP
B) IP
C) SMTP
D) NetBIOS
A) TCP
B) IP
C) SMTP
D) NetBIOS
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server.
A) DNS
B) URL
C) FTP
D) XML
A) DNS
B) URL
C) FTP
D) XML
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
________ defines the content in terms of the data that is being described rather than how it is to be displayed.
A) CGI
B) JavaScript
C) XML
D) HTML
A) CGI
B) JavaScript
C) XML
D) HTML
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.
A) Packet switching
B) An open circuit
C) Circuit switching
D) A closed circuit
A) Packet switching
B) An open circuit
C) Circuit switching
D) A closed circuit
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
In the acronym HTTPS, the S stands for ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
The ________ defines items on a web page such as graphics, tables, and headers as objects.
A) SSL
B) MIME
C) JSON
D) DOM
A) SSL
B) MIME
C) JSON
D) DOM
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
________ provides a procedure by which a browser can request that a program file be run rather than just being delivered to the browser.
A) OC
B) ACK
C) UDP
D) CGI
A) OC
B) ACK
C) UDP
D) CGI
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
Strong encryption now requires ________-bit keys.
A) 40
B) 128
C) 256
D) 512
A) 40
B) 128
C) 256
D) 512
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
When using ________ addressing, a computer is assigned a temporary address from available IP addresses.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
The IPv4 protocol is beginning to be replaced by the ________ protocol.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following is an example of an instant messenger service?
A) LinkedIn
B) Monster
C) Yahoo Messenger
D) Flickr
A) LinkedIn
B) Monster
C) Yahoo Messenger
D) Flickr
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
The ________ IP addressing scheme uses 128-bit addressing.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
________ servers are computers that enable users to buy goods and services over the web.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
.com and .edu are examples of a(n) ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer.
A) CGI script
B) app
C) applet
D) JavaScript
A) CGI script
B) app
C) applet
D) JavaScript
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
________ permits two or more people to communicate over the Internet in real time.
A) LinkedIn
B) Snapfish
C) Flickr
D) Instant messaging
A) LinkedIn
B) Snapfish
C) Flickr
D) Instant messaging
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
In public-key encryption, the two keys-one for coding and one for decoding-are known as ________.
A) code keys
B) linked keys
C) keytags
D) a key pair
A) code keys
B) linked keys
C) keytags
D) a key pair
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
________ is a method of communication in which a dedicated connection is formed between two points and the connection remains active during the transmission.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
Which protocol is used when sending files as attachments by e-mail?
A) Multipurpose Internet Mail Extensions (MIME)
B) Post Office Protocol (POP)
C) Simple Mail Transfer Protocol (SMTP)
D) User Datagram Protocol (UDP)
A) Multipurpose Internet Mail Extensions (MIME)
B) Post Office Protocol (POP)
C) Simple Mail Transfer Protocol (SMTP)
D) User Datagram Protocol (UDP)
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
SMTP stands for ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
________ is a consortium of organizations that develops web protocols and sets standards.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
A typical ________ is made up of one or more network switches to which ISPs connect.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
197.169.73.63 is an example of a(n) ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
is an example of an HTML ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for decoding.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
When using ________-key encryption, only the message sender and recipient have the code.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
CGI scripts are known as ________ programs because these programs run on a web server.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
________ combines HTML, cascading style sheets, and JavaScript.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
A(n) ________ program is a computer program that runs on the client computer and requires no interaction with a web server.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
In http://example.gov, what is the second-level domain?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
A(n) ________ links a URL to an IP address when a web page is requested.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
File Transfer Protocol (FTP) is used to transmit e-mail messages across the Internet.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
FTP enables files to be downloaded or uploaded between computers.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
________ is the process of encoding e-mail so that only the person with a corresponding key can decode and read the message.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
MIME stands for ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
DHTML stands for ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
When using packet switching, packets are always sent over the same route.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
When a(n) ________ address is assigned to a computer, its IP address will not change.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
A(n) ________ is a small program that resides on a server, is downloaded to the client, and runs when needed without additional data transfers between the client and server.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
IPv6 uses six groups of 16-bit numbers.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
Transport Layer Security (TLS) and ________ are two protocols that provide data integrity and security for Internet transmission.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
________ is the most commonly used scripting language for creating DHTML effects.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
The United States government is in charge of the Internet.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
XML technologies allow web pages to change after they have been loaded.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
Most instant messaging services provide a high level of encryption for their messages.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
LinkedIn is one the most popular instant messaging services.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
Client-side programs run on a web server rather than on your computer.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
An applet is a small application that resides on a server but is downloaded to, and run on, the client computer.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
HTML is a simple programming language.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
The tag informs a browser that the text that follows the tag should be italicized.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
JavaScript commands are executed on a server computer.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
Dynamic IP addressing is accomplished using a DHCP server.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
Java and JavaScript refer to the same language.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
Match between columns
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
Match between columns
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
Match between columns
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
Match between columns
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
Match between columns
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck